{"schemaVersion":"1.0","exportedAt":"2026-05-15T11:14:05.232Z","occupation":{"soc":"11-3013.01","title":"Security Managers","group":"Management","sector":"72","jobZone":4,"jobZoneInferred":false},"framework":{"version":"v.26.05","description":"","contextCovered":"This framework covers security management practice across commercial, corporate, and hospitality environments, spanning operational security, emergency management, risk assessment, policy development, budget oversight, and personnel leadership calibrated to Job Zone 4 preparation.","levels":{"emerging":{"label":"Emerging","statements":["Security protocols and procedures — follow and apply under direct supervisor guidance during daily patrol and access control operations at a commercial facility.","Security incident reports — draft and submit using standard templates after observing or responding to minor breaches on company property.","Emergency response procedures — recognize and initiate correct protocols for fire alarms, medical emergencies, or intrusion alerts under senior manager direction.","Security operations budgets — assist in tracking and recording expenditures using office suite software under close oversight from a department manager.","Risk identification checklists — complete and document potential vulnerabilities during routine facility walkthroughs as directed by a supervisor.","Security standards and policy documents — read, comprehend, and apply existing guidelines when carrying out assigned post duties in an organizational setting.","Facilities management software — navigate and enter basic data to log security events and personnel schedules under instruction from experienced staff.","Security team communications — listen actively and relay accurate information to colleagues and supervisors during shift briefings and radio exchanges.","Personnel resource assignments — support scheduling tasks by tracking officer availability and shift coverage using provided human resources software tools.","Security audit observations — collect and organize data for review cycles by documenting inspection findings under the guidance of a senior security manager."]},"developing":{"label":"Developing","statements":["Security breach investigations — identify, document, and resolve moderately complex incidents by gathering evidence and interviewing witnesses with limited supervisory oversight at a mid-sized organization.","Emergency contingency plans — participate in planning exercises and contribute operational input to emergency management documents for a corporate or hospitality facility.","Security operations budgets — prepare routine budget proposals and monitor spending against approved allocations using management software in a departmental setting.","Risk assessments — conduct structured evaluations of physical and procedural vulnerabilities and recommend corrective actions to management based on established frameworks.","Security policies and procedures — draft updated standard operating procedures in response to identified gaps and submit for leadership review and approval.","Security personnel — coordinate daily assignments, provide on-the-job guidance, and evaluate officer performance across assigned shifts at a single-site operation.","Incident response activities — lead initial response to alarms, threats, and medical emergencies by applying practiced protocols and coordinating with external agencies when needed.","Network security and access control systems — configure and monitor VPN and facilities management software to maintain perimeter integrity across organizational IT and physical environments.","Security audit findings — analyze results of periodic reviews and present written recommendations for operational improvements to department leadership.","Stakeholder communications — coordinate clearly with law enforcement, HR, and facility management teams through written and verbal channels to resolve security concerns efficiently."]},"proficient":{"label":"Proficient","statements":["Security operations — plan, direct, and coordinate all site safety activities autonomously to safeguard employees, guests, and assets across a complex multi-function facility.","Security breaches and investigations — lead thorough investigations of significant incidents, applying deductive and inductive reasoning to resolve cases and prevent recurrence.","Comprehensive risk mitigation plans — assess organizational exposure across physical, personnel, and cyber domains and develop detailed response and recovery frameworks independently.","Emergency management programs — design and lead contingency planning cycles, tabletop exercises, and live drills that align with legal requirements and industry best practices.","Security budgets — develop, justify, and manage full departmental budgets by analyzing operational data and aligning resource requests with organizational strategic priorities.","Security standards and policy systems — author, implement, and enforce enterprise-level security policies that integrate regulatory compliance, public safety law, and organizational values.","Security technology infrastructure — evaluate, procure, and oversee implementation of network security, surveillance, and communications server solutions across organizational facilities.","Personnel development — design training programs using adult learning strategies to build competency across security staff in emergency response, legal authority, and threat assessment.","Security audits and systems evaluations — lead end-to-end audit cycles, synthesize findings across multiple risk categories, and drive measurable improvements in security posture.","Cross-functional incident coordination — serve as primary security liaison with executive leadership, legal counsel, and external agencies during high-stakes incidents requiring complex decision making."]},"advanced":{"label":"Advanced","statements":["Enterprise security strategy — set long-range direction for organizational security programs across multiple sites or business units, aligning objectives with executive leadership and board-level governance.","Organizational risk posture — lead enterprise-wide risk assessments, establish tolerance thresholds, and institutionalize a culture of proactive threat identification and mitigation across all departments.","Security policy and regulatory frameworks — establish authoritative standards and governance structures that satisfy public safety law, industry regulations, and international compliance requirements.","Security budget portfolio — secure and allocate multi-year capital and operational funding by presenting evidence-based cases to C-suite executives and finance committees.","Emergency and crisis management leadership — direct organizational response to large-scale crises by commanding cross-functional teams and interfacing with government and media stakeholders under extreme pressure.","Security leadership pipeline — mentor and develop managers and senior specialists through structured coaching, succession planning, and targeted learning strategies that build organizational capability.","Technology and innovation roadmap — evaluate emerging security technologies and lead enterprise adoption of advanced surveillance, analytics, and cybersecurity tools to future-proof organizational defenses.","Interagency and external partnerships — cultivate strategic relationships with law enforcement, intelligence agencies, industry associations, and vendors to enhance organizational security intelligence and response capacity.","Security performance and accountability systems — design and implement organizational metrics, audit frameworks, and continuous improvement processes that hold all levels of security leadership accountable for outcomes.","Organizational resilience programs — lead development and integration of business continuity, crisis communications, and workforce safety programs that ensure operational endurance across catastrophic incident scenarios."]}}},"sources":{"onet":"v30.2 (CC BY 4.0)","crosswalk":"https://skillscrosswalk.com","generator":"LER.me"},"attribution":"© EBSCOed"}