{"schemaVersion":"1.0","exportedAt":"2026-05-15T12:38:30.757Z","occupation":{"soc":"33-1091.00","title":"First-Line Supervisors of Security Workers","group":"Protective Service","sector":"92","jobZone":2,"jobZoneInferred":false},"framework":{"version":"v.26.05","description":"","contextCovered":"This framework covers first-line security supervision in commercial, institutional, and public-sector facilities, from entry-level patrol and reporting duties through executive-level security strategy and workforce development.","levels":{"emerging":{"label":"Emerging","statements":["Premises patrol routes — execute under direct supervision to detect signs of intrusion or disorder at an assigned facility.","Entry and exit points — secure by locking doors and gates according to established shift protocols at a commercial or institutional site.","Security alarms and disturbance alerts — respond to and report findings to a supervising officer upon initial notification.","Visitor and employee access logs — monitor and record authorized entry using a sign-in register or basic access-control terminal.","Shift observation reports — draft written documentation of patrol activities using standardized templates provided by the organization.","Security post orders and procedures — read and follow written instructions to maintain compliance during a scheduled shift.","Radio and telephone communications — receive and relay basic messages clearly under guidance on a security operations channel.","Suspicious activity indicators — recognize and escalate to senior staff using the facility's reporting chain of command.","Scheduling software and electronic mail — use basic features to review shift assignments and communicate routine updates.","Coworker interactions and customer contacts — apply active listening to gather information and de-escalate low-level disputes on site."]},"developing":{"label":"Developing","statements":["Security patrol coverage — conduct independently across an entire shift, adjusting routes in response to observed conditions at a multi-building property.","Disturbance investigations — gather witness statements, document findings, and coordinate with law enforcement when required at a commercial facility.","Access-control monitoring — authorize or deny entry for employees, contractors, and visitors by applying standing site policies with minimal oversight.","Daily incident reports — compose clear, accurate written summaries of patrol observations and disturbances for supervisory review.","Security team members — provide on-the-spot coaching on procedure compliance and quality standards during shared patrol assignments.","Customer and tenant complaints — advise frontline officers on resolution strategies, applying personal-service principles in a facility setting.","Time and attendance records — maintain accurate data using scheduling or time-accounting software to support payroll and shift coverage needs.","Situational risk cues — apply inductive reasoning to identify emerging safety concerns before they escalate during routine operations.","Radio and telecommunications systems — operate and troubleshoot basic equipment to sustain communications across a distributed security post.","Staff performance observations — monitor individual officer behavior against posted standards and document deviations for supervisory follow-up."]},"proficient":{"label":"Proficient","statements":["On-site disturbance investigations — lead end-to-end inquiries involving alarms, altercations, or trespassing and produce formal case documentation at a complex commercial or institutional site.","Security officer teams — supervise daily performance autonomously, applying judgment to reassign personnel in response to non-routine incidents or staffing gaps.","Entry-control procedures — evaluate and refine access-authorization protocols to close observed vulnerabilities at a high-traffic facility.","Post orders and security plans — draft and update written operational documents that translate regulatory requirements into actionable shift instructions.","Recruitment and selection process — conduct structured interviews, assess candidate suitability, and recommend hiring decisions for security positions.","Complex complaints and detainee interactions — resolve escalated conflicts by applying negotiation and persuasion techniques within legal and policy boundaries.","Multi-area patrol strategy — design patrol schedules and post assignments that balance risk coverage with available staffing resources.","Incident data and shift reports — analyze patterns across multiple reports using spreadsheet or database tools to identify recurring security risks.","New officer onboarding — deliver structured on-the-job instruction covering patrol techniques, report writing, and emergency response protocols.","Emergency and law-enforcement coordination — serve as the primary site liaison during critical incidents, communicating clearly with external agencies under stress."]},"advanced":{"label":"Advanced","statements":["Security department strategy — establish goals, standards, and performance metrics aligned with organizational risk tolerance and executive priorities.","Workforce planning and talent pipeline — design recruitment, screening, and retention programs that ensure consistent staffing quality across all shifts and posts.","Security policy and procedure library — author and own comprehensive operational frameworks governing patrol, access control, investigations, and emergency response.","Cross-functional leadership team — coordinate with facilities management, HR, and legal counsel to align security operations with broader organizational compliance requirements.","Officer development curriculum — design and oversee training programs that build competency from entry level through supervisory roles across the security division.","Enterprise risk assessment — apply complex problem-solving and deductive reasoning to evaluate facility-wide vulnerabilities and recommend capital or operational mitigation investments.","Budget and resource allocation — manage personnel scheduling, equipment procurement, and technology adoption using ERP and administrative software platforms.","Organizational culture of integrity — model and enforce ethical standards, dependability, and self-control expectations that shape department-wide conduct.","Regulatory and legal compliance — interpret law-and-government requirements and translate them into enforceable site-specific security policies that protect the organization from liability.","Stakeholder reporting and executive communication — present security performance data, incident trends, and strategic recommendations to senior leadership and external partners."]}}},"sources":{"onet":"v30.2 (CC BY 4.0)","crosswalk":"https://skillscrosswalk.com","generator":"LER.me"},"attribution":"© EBSCOed"}