Management & LeadershipAdministrative and commercial managersISCO 1219
security manager
Security managers ensure security for people, such as customers and employees, and company’s assets either fixed, movable, machines, vehicles, and real state. They ensure safety and security by enforcing security policies, keeping track of different events, implementing security protocols, creating emergency response procedures, conducting security evaluations, and supervising security staff members.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (27)
internal risk management policyinternal risk management policyThe internal risk management policies that identify, assess and prioritise risks in an IT environment. The methods used to minimise, monitor and control the possibility and the impact of disastrous ev...legal use-of-forcelegal use-of-forceThe characteristics of the use-of-force, which is a legal doctrine employed by police and army forces, to regulate acts of violence during interventions. Use-of-force is ought to balance security need...corporate social responsibilitycorporate social responsibilityThe handling or managing of business processes in a responsible and ethical manner considering the economic responsibility towards shareholders as equally important as the responsibility towards envir...security engineeringsecurity engineeringInterdisciplinary field of study that focuses on the realisation of secure systems and the technology to protect individuals or information from malice, errors, or unauthorized access. It involves def...organisational resilienceorganisational resilienceThe strategies, methods and techniques that increase the organisation's capacity to protect and sustain the services and operations that fulfil the organisational mission and create lasting values by ...security regulationssecurity regulationsThe body of regulations, legal procedures and policies regarding security and safety management.manage suppliesmanage suppliesMonitor and control the flow of supplies that includes the purchase, storage and movement of the required quality of raw materials, and also work-in-progress inventory. Manage supply chain activities ...investigate security issuesinvestigate security issuesLook out for information and evidence revolving around security and safety issues in order to analyse possible threats, track incidents, and improve security procedures.manage budgetsmanage budgetsPlan, monitor, report on the budget and prepare set production budgets.strive for company growthstrive for company growthDevelop strategies and plans aiming at achieving a sustained company growth, be the company self-owned or somebody else's. Strive with actions to increase revenues and positive cash flows.oversee planning of security systemsoversee planning of security systemsMonitor the selection and installation of security systems such as fire protection and soundproofing equipment and make sure it is sufficiently efficient and compliant with current legislation.manage staffmanage staffManage employees and subordinates, working in a team or individually, to maximise their performance and contribution. Schedule their work and activities, give instructions, motivate and direct the wor...maintain incident reporting recordsmaintain incident reporting recordsKeep a system for recording details of unusual events that occur at the facility, such as job-related injuries.establish site security routinesestablish site security routinesSet up security routines on site.manage disaster recovery plansmanage disaster recovery plansPrepare, test and execute, when necessary, a plan of action to retrieve or compensate lost information system data.establish daily prioritiesestablish daily prioritiesEstablish daily priorities for staff personnel; effectively deal with multi-task workload.ensure equipment availabilityensure equipment availabilityEnsure that the necessary equipment is provided, ready and available for use before start of procedures.manage the security teammanage the security teamPlan, organise and schedule work, equipment and procedures to be followed for the security staff under your supervision.manage security equipmentmanage security equipmentOversee and conduct inventory of security tools and equipment.handle surveillance equipmenthandle surveillance equipmentMonitor surveillance equipment to observe what people are doing in a given area and ensure their safety.supervise daily information operationssupervise daily information operationsDirect daily operations of different units. Coordinate program/project activities to assure the respect of costs and time.manage logisticsmanage logisticsCreate logistic framework for transporting goods to customers and for receiving returns, execute and follow up the logistics processes and guidelines. Adapt the production processes to the contingenci...write security reportswrite security reportsCompile data on inspections, patrols and security incidents into a report for management purposes.ensure equipment maintenanceensure equipment maintenanceEnsure that the equipment required for operations is regularly checked for faults, that routine maintenance tasks are performed, and that repairs are scheduled and performed in the case of damage or f...lead disaster recovery exerciseslead disaster recovery exercisesHead exercises which educate people on what to do in case of an unforeseen disastrous event in the functioning or security of ICT systems, such as on recovery of data, protection of identity and infor...liaise with managersliaise with managersLiaise with managers of other departments ensuring effective service and communication, i.e. sales, planning, purchasing, trading, distribution and technical.follow company standardsfollow company standardsLead and manage according to the organisation's code of conduct.
Optional (15)
ethical hacking principlesethical hacking principlesThe set of actions that are carried out to detect vulnerabilities within a computerised system in order to improve security within an organisation. They aim to identify and address data breaches and t...consultation methodsconsultation methodsTechniques used to facilitate clear and open communication and the provision of advice between individuals, communities or the government, such as discussion groups or one-on-one interviews.cyber securitycyber securityThe methods and best practices that protect ICT systems, networks, computers, devices, services, processes and people against unauthorised access, modification and/or denial of service of assets.information confidentialityinformation confidentialityThe mechanisms and regulations which allow for selective access control and guarantee that only authorised parties (people, processes, systems and devices) have access to data, the way to comply with ...implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...advise on strengthening securityadvise on strengthening securityProvide information and guidance to clients on how to prevent security threats and incidents.define security policiesdefine security policiesDesign and execute a written set of rules and policies that have the aim of securing an organisation concerning constraints on behaviour between stakeholders, protective mechanical constraints and dat...perform internal investigationsperform internal investigationsSeek advice and collaborate with union officials responsible for topics that are relevant to you and your business or your work.protect important clientsprotect important clientsKeep clients safe who have extraordinary level of risk by organising and providing the relevant security.liaise with government officialsliaise with government officialsConsult and cooperate with government officials who handle matter that is relevant to you or your business.maintain facility security systemsmaintain facility security systemsEnsure that proper and functional security systems are in place, including alarm systems, fire alarms, sprinklers and emergency exits.plan health and safety proceduresplan health and safety proceduresSet up procedures for maintaining and improving health and safety in the establishment or workplace.undertake employee screeningundertake employee screeningScreen employees by compiling criminal records, commercial records and financial records of an individual.liaise with security authoritiesliaise with security authoritiesRespond quickly to security incidents and violations by calling the police and keep in touch with other relevant parties involved in the potential prosecution of the offender.manage outsourced securitymanage outsourced securityOversee and regularly review external security provision.
Related Occupations
Other occupations in the Administrative and commercial managers category that share similar skill requirements.
AI Replacement Risk
37/ 100
Moderate Risk
Low riskHigh risk
Quick Facts
SectorManagement & Leadership
ISCO GroupAdministrative and commercial managers
Essential Skills27
Core Skills0