Top Security Specialist Skills

Below we've compiled a list of the most important skills for a Security Specialist. We ranked the top skills based on the percentage of Security Specialist resumes they appeared on. For example, 17.5% of Security Specialist resumes contained Security Personnel as a skill. Let's find out what skills a Security Specialist actually needs in order to be successful in the workplace.

The six most common skills found on Security Specialist resumes in 2020. Read below to see the full list.

1. Security Personnel

high Demand
Here's how Security Personnel is used in Security Specialist jobs:
  • Provide integrated security personnel and security-related technology solutions.
  • Supervised the physical security and protection of all company assets, supervised the contract security personnel and provided assignments.
  • Interacted with security personnel from other governmental agencies regarding motorcade travel, scheduled business appointments and personal matters.
  • Communicated with Sub-contracts security personnel to assure all needed information has been received prior to arrival on contract.
  • Worked collaboratively with police and other contracted security personnel in addressing situations and events beyond granted jurisdiction.
  • Organized, maintained and reviewed work, equipment inventory and training of security personnel flying daily operations.
  • Maintained effective communication with other security personnel regarding the safety of customers, store employees and merchandise.
  • Ensured that quality of service and contract compliance by regularly inspecting security personnel assigned to his/her site.
  • Hire, train and evaluate security personnel; initiate disciplinary actions and terminations as required.
  • Managed security personnel in support of classified projects, nuclear and conventional weapon systems worldwide.
  • Supervised night shift security operations to include briefing fifty full-time security personnel for one year.
  • Analyzed building floor plans to assist security personnel with creating a safer environment during emergencies.
  • Organized and trained a team of security personnel in order to safeguard several military aircraft.
  • Direct and Coordinate on site contract security personnel for screening procedures and overall facility security.
  • Assisted in developing and implementing a training program for all dispatchers and security personnel.
  • Coordinated, trained and evaluated overall function of rotating security personnel while on shift.
  • Maintained communication with the Telecommunications Department, other security personnel and the on-duty Sheriff.
  • Instructed and coordinated security personnel response to emergencies in simulated exercises and real scenarios.
  • Handled all security issues and acted as supervisor to all scheduled security personnel.
  • Managed more than 20 contracted security personnel at various Dominion resource locations nationwide.

Show More

2. Security Procedures

high Demand
Here's how Security Procedures is used in Security Specialist jobs:
  • Ensured operation security/communication security procedures were followed.
  • Executed training for all non-security personnel to include department heads on Hospital Security procedures, access procedures and emergency response procedures.
  • Designed and implemented new electronic security system and administrative security procedures that saved over $250,000.00 annually in operating budget expenses.
  • Conduct security indoctrination, education and training in order to assist the contractor in establishing requisite baseline knowledge of security procedures.
  • Performed duties in the development and implementation of counterintelligence security procedures and operating policies as applied to a Special Access Program.
  • Produced written reports on all shift activities with oral reports and emergency notifications delivered as directed by established security procedures.
  • Manage and coordinate security operations ensuring that security procedures are implemented and followed as per the Public Housing Administration guidelines.
  • Managed security personnel to ensure the protection of hospital while developing and enforcing security procedures and hospital regulations are met.
  • Coordinated with division staff members, security specialists and command leaders at subordinate commands concerning security procedures and policies.
  • Authored and maintained information security procedures and processes for companies to enable application and network access to internal/external personnel.
  • Coordinated with the local security provider and business unit on developing and executing physical security procedures and plans.
  • Implemented site specific security procedures, process controls and practices for preparation of documentation through security screening processes.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Established security procedures for companies engaged in manufacturing products and processing data and material for federal government.
  • Manage and coordinate security operations ensuring that security procedures are implemented and followed as per IMC policy.
  • Determined compliance of adequacy and effectiveness of communication security procedures, physical security measures and operational policies.
  • Planned, coordinated, directed and updated security procedures for assigned jurisdiction of over 1500 personnel.
  • Supervised security procedures ensuring the best in customer service, location protection, and client protection
  • Keep up with current regulations and national security procedures, Communication Security and Operations Security.
  • Coordinated and maintained systems applications of security to ensure adherence to the airport security procedures.

Show More

3. Public Safety

high Demand
Here's how Public Safety is used in Security Specialist jobs:
  • Cloud State University: Supervised the daily operations of the Patrol/Communications Division of the Public Safety Department.
  • Provided uniformed security services for the Public Safety Division and secured the Downtown locations.
  • Standardized organizational procedure for drafting Public Safety Alerts on crime trends.
  • Provided public safety, while enforcing company policies and regulations.
  • Establish and maintain intelligence & public safety regarding operations.
  • Assessed and implemented public safety procedures.
  • Investigated and reported maintenance and safety conditions that would potentially endanger the client, its associates, and public safety.
  • Investigated and reported maintenance and safety conditions which might endanger the client, its associates, or public safety.
  • Coordinated the development of local disaster and preparedness plans with public safety agencies, businesses, departments and agencies.
  • Provided public safety by maintaining order, responding to emergencies, protecting people, and promoting good community relations.
  • Establish MOU's with Local Public Safety Agencies and Internship locations.
  • Acted as liaison to state police and local public safety departments.
  • Assist hospital staff and visitors with issues dealing with public safety.
  • Collaborated with residence life staff and university public safety to organize safety programming for residence halls.
  • Coordinated with HQ partners to resolve investigations Professional interaction with public safety partners.
  • Enforced policies and public safety guidelines implemented by Detroit Public Schools and Securitas.
  • Assist general public with security concerns and address public safety questions.

Show More

4. Emergency Situations

high Demand
Here's how Emergency Situations is used in Security Specialist jobs:
  • Qualified in training of planning and execution emergency plan in the event of a plane/terrorist/natural disaster attack or other emergency situations.
  • Responded to emergency situations in accordance with established Bureau of Diplomatic Security protective security policies, standards, and procedures.
  • Responded to emergency situations and established effective perimeter control, crime scene management, and liaison with security officials.
  • Developed security plans and procedures for safeguarding classified information and sensitive materials in daily operations and emergency situations.
  • Monitor lobby activity, reporting unusual or emergency situations to the Security Control Center and Management.
  • Maintain visibility and be immediately available for assisting staff and students in routine and emergency situations.
  • Followed standard of operating procedures and served as a quick response officer during emergency situations.
  • Responded to Emergency Management Plans and assisted with response in emergency situations until relieved.
  • Prepared directives and guidance to field operations for different alert levels and emergency situations.
  • Assist law enforcement, fire department and emergency medical services during emergency situations.
  • Supervised flight response to real world security and/or emergency situations as needed.
  • Responded to and coordinated emergency situations to prevent casualties and damages.
  • Respond to emergency situations in accordance with department policies and procedures.
  • Responded immediately to radio calls to investigate alarms and emergency situations.
  • Operated weapons and equipment during emergency situations and crisis intervention.
  • Responded to all security, medical or fire-related emergency situations.
  • Conduct research and risk assessment analysis of potential emergency situations.
  • Protect personnel and property and respond to emergency situations.
  • Provided immediate response and support for all emergency situations.
  • Report security and emergency situations to the appropriate managers.

Show More

5. Security Clearance

high Demand
Here's how Security Clearance is used in Security Specialist jobs:
  • Enforce government security policies; provide direction and guidance with regards to these program security regulations, processed personnel security clearances.
  • Contacted other security offices and agencies to confirm and investigate identities and security clearance levels for incoming visitors and employees.
  • Analyze information applying national adjudicative criteria and grants interim security clearances, public trust certifications, and final security clearances.
  • Process proper documentation to obtain new industrial security clearances or continuation of current clearances for individuals within Strategic Business Units.
  • Reviewed for possible disqualifying issues, summarize and render security clearance eligibility recommendations on subjects working for a government agency.
  • Research and conduct preliminary investigations on applicants, and prepare documentation to obtain a security clearance from the granting agency.
  • Supervised in the selection of military police assigned to the Squadron as to Security Clearance eligibility meet manpower requirements.
  • Managed personnel security clearance records, processed background investigation requests and validated personnel security clearances via JPAS and EQUIP.
  • Assist in adjudicating personal background investigations for suitability for employment with the FBI and/or issuance of a security clearance.
  • Provide guidance to supervisors and applicants on submission procedures for employee security clearance and contractor suitability background investigation requests.
  • Coordinated with external agencies in order to adjudicate security clearance packages, investigation discrepancies and initiate sanctions for violations.
  • Conducted technical reviews of special security files involving possible impropriety, resulting in possible revocation of security clearance.
  • Conducted reviews and recommended approval or denial of requests for interim security clearances for military and civilian personnel.
  • Compiled, entered, managed and ensured accuracy of daily itinerary of Director of Personnel Security Clearance Office.
  • Prepared, reviewed and processed personnel security clearance requests utilizing the Electronic Personnel Security Questionnaire (EPSQ).
  • Review security clearance applications for accuracy and completeness IAW Defense Industrial Security Office (DISCO) investigation standards.
  • Process personnel security clearance transactions: initial requests, transfers, conversions, upgrades/downgrades, and periodic re-investigations.
  • Process standard and investigative forms to support access to government information systems, security clearance and suitability determinations.
  • Processed security clearance notifications for off-site visits and incoming visitors via JPAS and Security Specialist Message Tool.
  • Processed international documentation to verify subject compliance enabling the subject to obtain security clearance for subject contractor.

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. Access Control

high Demand
Here's how Access Control is used in Security Specialist jobs:
  • Designed and maintained online access control request form with automated approval request sent to appropriate department head to authorize access requested.
  • Monitored personnel access controls to the facility and general operations centers utilizing digitally encoded cards and wireless proximity readers.
  • Performed access control monitoring at building entrances to ensure that employees and visitors display passes/identification before entering the facility.
  • Supported physical facility security, access control, business continuity, crisis management, and emergency response team.
  • Conducted assessments of all Intrusion Detection Systems and access control points; recommended technology upgrades to ensure effectiveness.
  • Supervised a contract security force providing physical security/access control for all corporate facilities in a 7x24 environment.
  • Provided first-line customer support for security clearances, access control, and coordinated appropriate support activities.
  • Monitored overall security administration for USAFRL ensuring access control for high value unique national level assets.
  • Developed voice verification access control system, terminal security system, and personnel tracking systems.
  • Provide expertise in the development of access control levels and personnel identification policies and procedures.
  • Regulate facility access control, while assisting visitors and enforcing the proper regulations and protocols.
  • Executed daily operations of access control, personal security, and monitored sensitive areas.
  • Managed access control system, created badges, provided database information in security investigations.
  • Implemented change management and access control which provided heightened security, integrity and availability.
  • Established entry control points, conducted access control inspections and performed random anti-terrorism measures.
  • Operated and supervised the operation of access control points to a military installation.
  • Performed installation, maintenance and troubleshooting of fiber optic cable and access control equipment
  • Developed and implemented a safety/operational procedure for three access control Hydraulic Vertical Barriers.
  • Conducted surveillance of office perimeter through networked video and access control systems.
  • Supported implementation and ongoing operations of access controls and user access rights.

Show More

7. Security Program

high Demand
Here's how Security Program is used in Security Specialist jobs:
  • Provided assistance to contractors in establishing security programs and to maintain an effective security program that includes security education and training.
  • Controlled administration of an Operational Security program, procedures and physical controls to ensure compliance with government and company regulations/ requirements.
  • Provided guidance to senior leadership in matters involving critical security programs including physical, information, personnel, and industrial security.
  • Assisted in the maintaining proactive information and personnel security programs with goals and objectives to protect classified and sensitive unclassified information.
  • Ensured continuous improvement of base security programs by performing security assessments, implementing enhancements, and providing feedback to command.
  • Provide independent feedback on the overall adequacy, effectiveness, and efficiency of security posture and TSA-approved air-cargo security programs.
  • Implement the personnel security program by establishing local procedures for processing requests for security clearances for military and civilian personnel.
  • Project Manager for SIPRNET installation, as Security Specialist responsible for provided security management of the entire MISTC security program.
  • Developed and implemented company security policies, procedures, and threat mitigation strategies in support of the corporate security program.
  • Implemented prevention procedures, physical security postures, information security programs, personal security and basic personal protection escorting missions.
  • Provide advice and guidance on physical security programs, processes and procedures to identify deficiencies and provide recommendations on countermeasures.
  • Applied a comprehensive knowledge of security program interrelationships to coordinate the objectives and plans of specialized security programs for BUMED.
  • Evaluated security program resources within the organization and initiate programming, budgeting, and manpower actions to address requirements.
  • Monitored personnel and information security programs; coordinated and maintained proper storage and facilitation of clearances and classified materials.
  • Perform access control duties and entry/exit foreign visit requests to ensure compliance with organization security program policies and procedures.
  • Assisted the Command Security Officer in the development and implementation of the command security program and standard operating procedures.
  • Communicate and exchange complex and highly technical security program information and requirements among outside agencies that are DA/DoD affiliated.
  • Conducted assessments of physical security programs, surveys, inspections, processes and procedures to identify necessary revisions.
  • Remain cognizant of command security functions and ensure the security program is coordinated and inclusive of all requirements.
  • Assist in the administration of the Security Education and Training Program for organizational information protection and security programs.

Show More

8. Law Enforcement

high Demand
Here's how Law Enforcement is used in Security Specialist jobs:
  • Investigate customer claims, loss occurrences, identifying patterns within the facility, interview potential suspects assist local and federal law enforcement
  • Lead activities to investigate security related accidents/incidents, completed reports and provided follow-ups with management teams as well as law enforcement.
  • Coordinated with local and state law enforcement, prosecutors, and attorneys to ensure appropriate legal actions executed against criminal offenders.
  • Produced high quality incident reports that were disseminated to various federal law enforcement agencies to include State Department Diplomatic Security Services.
  • Corresponded with local and national law enforcement agencies to verify and determine current status of open warrants on specific applicants.
  • Present investigative findings to corporate, Human Resources and management personnel and make recommendations for administrative or law enforcement action.
  • Provide guidance to management officials in all aspects of security and law enforcement, to include interpretation of agency guidelines.
  • Administered a comprehensive, state-wide training program for all law enforcement, emergency management, and homeland security officials.
  • Assist in modifications to security plans for safety, communications, emergency planning and coordinate with law enforcement agencies.
  • Performed special security functions, and supported personnel engaged in law enforcement activities and military working dog teams.
  • Investigated and reported incidents to law enforcement authorities and police agencies; maintained detail activity logs and reports.
  • Performed various law enforcement and security tasks including investigating criminal activities and performing fire and riot control duties.
  • Selected Contributions: * Coordinated closely with law enforcement officers and agencies regarding various security and safety considerations.
  • Contributed to repeat business by cultivating strong working relationships with representatives from local law enforcement and state agencies.
  • Worked with emergency management teams and local law enforcement on proper procedure of emergency handling and disaster training.
  • Skilled in developing, managing and conducting security forces, law enforcement and expeditionary unit training program activities.
  • Supervised and mentored security force personnel in carrying out law enforcement and anti terrorism duties and operations.
  • Confirmed Treasury Department warrants with federal state, local and international law enforcement agencies and facilitated extradition.
  • Conducted law enforcement security operations to ensure safe and secure operations within the Port of Providence.
  • Coordinated multiple base security situation with local law enforcement agencies and ensured safety of base populace.

Show More

9. Data Entry

high Demand
Here's how Data Entry is used in Security Specialist jobs:
  • Process personnel security requests and maintains personnel security folders performing accurate data entry to maintain security records database.
  • Managed security related data entry, record keeping, customer notifications, scheduling of appointments for customers.
  • Provided administrative security and data entry support to a high profile U.S. Government Intelligence Agency.
  • Perform production-level computer work which includes accurate data entry, retrieving and editing records.
  • Verified clearances and provided data entry to Joint Personal Access Security System database.
  • Provided administrative support including data entry of checkpoints and client badge activation.
  • Analyzed database information entered by data entry personnel for quality control.
  • Provided daily production support for data entry, payment repairs, received and deliver handling (DTC and FED wire).
  • Assisted in all areas of administrative work including data entry, file organization, and mobility records for over300 Airmen.
  • Provide data entry of all actions in the facility data base and the Industrial Security Reporting System (ISRS).
  • Performed all other administrative functions to include typing, data entry, ordering office supplies and operating office equipment.
  • Performed clerical work such as data entry, production record maintenance, stock replenishment, and output material distribution.
  • Perform personnel security data entry of incoming civilian, military and contractor DIA employees with 100% accuracy.
  • Performed data entry of candidates resume, rate of pay, contact information and other required documents.
  • Provide data entry, querying, and reporting on the Safeguards and Security Information Management System.
  • Assist in data entry, filing, and daily interface with all levels of management.
  • Performed other functions such as data entry, management reporting and inventory control.
  • Tackled and edited data entry composition; corrected and edited files and records.
  • Performed data entry and records checks and maintains all customer badge requests.
  • Prepared data entry for weekly billing report for the Data General systems.

Show More

10. Customer Service

high Demand
Here's how Customer Service is used in Security Specialist jobs:
  • Served as Customer Service/Receptionist/Dispatcher/Console Operator.
  • Facilitated Communication Security Operations for multiple programs in fast paced demanding business environment with superior customer service and results.
  • Liaised among senior operations, security specialist, contractors and customers to ensure shipment integrity and enhance customer service.
  • Provided customer service guidance to installation engineers and scientists as they developed or enhanced new technologies and weapon systems.
  • Achieved customer loyalty and generated new business by effectively educating clients on products and providing outstanding customer service.
  • Maintained user security, scheduled and trained customer service and claims representatives, senior representatives and team leaders.
  • Conducted daily customer service, office administration; documentation verification and input sensitive information into company database system.
  • Provided customer service assistance to the airport community stakeholders to ensure a safe and secure environment.
  • Process claimants' unemployment claims and actively interacts with customers to provide excellent customer service.
  • Managed customer service operations pertaining to security related inquiries for an organization of 1,500 personnel.
  • Adhere to internal department procedures and deadlines to ensure regulatory compliance and exemplary customer service.
  • Assisted with coordinating inter-departmental processes and procedures to ensure the highest level of customer service.
  • Provided exceptional customer service safety interactions that ensured security for both inside and outside premises.
  • Provided administrative coordination including contracts, budgeting, processing payments, and customer service.
  • Provide quality customer service to all INSCOM/tenant personnel while carrying out personnel security functions.
  • Provide superior customer service to claimants calling in to file initial unemployment benefits.
  • Received Customer Service Letters regarding my abilities to interact effectively with the public.
  • Direct the department specific processes for quality improvement and positive customer service programs.
  • Provided customer service to patrons in various buildings contracted through Security Industry Specialist.
  • Provided positive professional customer service and accommodation to high-level officials with security information.

Show More

11. Security Policies

high Demand
Here's how Security Policies is used in Security Specialist jobs:
  • Received incoming calls, provided program information and assistance to staff and applicants on personnel security policies and related matters.
  • Served as head of computer security team, managing full internal and external host security and establishing/enforcing internal security policies.
  • Formulated and established enterprise-wide computer security policies and data security classification for information ownership assignment including business continuity plans.
  • Served as a liaison for the Naval District Washington Security Office regarding various security policies and security related incidents.
  • Develop and implement security awareness programs as aids in achieving employee compliance with Corporate Security Policies and Procedures.
  • Perform periodic security reviews of existing information systems for compliance with security policies and procedures and security architecture.
  • Conducted inquiries and investigations into the mishandling of classified information and failure to follow established Security policies.
  • Communicate security policies and procedures through meetings, written documentation, verbal presentations and electronic media.
  • Developed and implemented security policies and procedures to foster safe environment and positive school- community relations.
  • Supervised and conducted security inspections/violations and random inspections for compliance with current security policies and directives.
  • Provide accurate and timely guidance allowing organization to be within requirements of security policies and regulations.
  • Ensured physical security of facility and ensured that residents were compliant with National Industrial Security policies.
  • Supervised 25 to 35 juvenile offenders through enforcement of state facility security policies and procedures.
  • Monitored the safety and security of assigned youth, enforced facility security policies and procedures.
  • Provide authoritative information to assist organization officials by advising on decisions effecting personnel security policies.
  • Interpret security policies on matters pertaining to processing, dissemination and controlling of classified material.
  • Developed a protection methodology along with the supporting security policies and standards for the infrastructure.
  • Followed and enforced facility security policies, alarm response protocols and access card guidelines.
  • Provided recommendations on or develops agency security policies, standards, and guidelines.
  • Standardized corporate security policies and procedures for eight domestic and two international locations.

Show More

12. Security Systems

high Demand
Here's how Security Systems is used in Security Specialist jobs:
  • Responded to customer questions regarding security protocol and performed routine backup operations to ensure continued operations of the CCURE security systems.
  • Implemented and monitored junior security specialists on their knowledge of and compliance with automated information security systems.
  • Recommend methods for enhancing efficiency of information security systems through modification and application of evolving technology.
  • Reviewed security systems, identified vulnerabilities, and recommended improvements and countermeasures to offset weaknesses.
  • Performed monitoring of residential and commercial premises security systems, acting as primary client point-of-contact.
  • Perform compensatory measures for temporarily degraded security systems to maintain compliance with applicable licensing requirement.
  • Designed developed and submitted proposals for the implementation of manual and automated security systems.
  • Maintain security system/equipment effectiveness, conducting installation, maintenance and repair of security systems/equipment.
  • Revised plan to ensure compatibility of planned security measures with established computer security systems.
  • Provided physical security coordination and implementation of security designs and maintenance of security systems.
  • Analyzed, developed, and recommend upgrades/enhancements of existing or additional security systems/features.
  • Monitored all installed security systems and conducted analysis to identify vulnerabilities within facilities.
  • Remedied long-standing problems in security response support and operation of electronic security systems.
  • Engineered Systems and developed construction documents and AutoCAD drawings for integrated security systems.
  • Designed Security Systems in townhouses and single-family homes based on adequacy and price.
  • Provided recommendations for improvement of security systems through use of up sale equipment.
  • Configured and assisted in the integration of security systems with existing network/IT infrastructure.
  • Maintained an organization's automated security systems and employee identification card system.
  • Inspect and adjust security systems and safety equipment to ensure operational use.
  • Worked with security contractors to ensure maintain and install security systems.

Show More

13. Cctv

high Demand
Here's how Cctv is used in Security Specialist jobs:
  • Tested CCTV, access control, intrusion detection, and area illumination systems for operational effectiveness, vulnerabilities, and reliability.
  • Supervised perimeter security team, managed CCTV security system, and assisted in emergency medical situations.
  • Demonstrate integrity and quality of work in providing solutions on CCTV ground/facility surveillance.
  • Maintain operational CCTV functions for utilization in high profile security investigations.
  • Monitor CCTV cameras to identify and address suspicious activity.
  • Monitor digital CCTV/Dispatch security, maintenance and cleaning personal.
  • Manage technology to ensure systems are operational, including remote and electronic access systems, CCTV cameras and video surveillance system.
  • Developed and managed the CCTV backup archives, insuring the last 12-months of information was available for viewing at all times.
  • Acted as an adviser to the Navy Exchange when planning a new exchange in the placement of CCTV and intrusion devices.
  • Monitor CCTV cameras, verification of employee's identification, Patrol parking garage monitor all trespassers, entering parking garage.
  • Maintain access control, key control, and closed-circuit TV (CCTV) systems and software with attention to detail.
  • Monitored Closed Circuit Television (CCTV) security video and alarms for county corrections, law enforcement and court locations.
  • Utilized various electronic security equipment including night vision goggles, FLIR cameras, CCTV, and alarm monitoring software.
  • Conducted restriction muster, physical security checks, operated X-Ray and Closed Circuit Television (CCTV) systems.
  • Designed Specific Security Plans to Include: Burglar Alarm, Fire Alarms, CCTV and Access Control Solutions.
  • Prepared weekly vulnerability reports to include: CCTV monitoring, security post orders, and driver/ couriers orders.
  • Utilized knowledge of security, CCTV, access control and communications products in new sales and established customers.
  • Install and maintain DMP alarm, DSX door access, and CCTV systems in new and existing buildings.
  • Guarded over battalion, inside Continental United States from company headquarters building using CCTV and traffic camera technologies.
  • Involved in all areas of Security and installation of closed circuit television (CCTV) throughout the store.

Show More

14. DOD

high Demand
Here's how DOD is used in Security Specialist jobs:
  • Established resource requirements and allocations for all training within security departments as well as for other DoD and DoN institutionalized training.
  • Interfaced with subcontractors to ensure documentation and equipment authorized for classified processing was secured according to DOD and NSA regulations.
  • Maintained a case management system containing security data on DOD serviced Non-Sensitive, Sensitive, and Special Sensitive positions.
  • Maintain constant/accurate communication with other National Intelligence Agencies and DOD Agencies to ensure compliance with security policies and procedures.
  • Interfaced with all Federal government and DoD agency Special Security Offices concerning access and clearance verification requirements.
  • Have familiarity with the classification management process and classification guides associated with special program and DoD information.
  • Provided expertise on the interpretation of DoD and HQ Personnel Security Policy to external/internal stakeholders.
  • Recommended critical policy and resourcing decisions having far-reaching implications within theater and across DOD.
  • Provide security management and oversight and conduct quarterly security training to all DoD CAF employees
  • Developed security implementation procedures and performed oversight of DoD programs at cleared contractor facilities.
  • Reviewed and submitted requests for personnel security clearances in accordance with DOD regulations.
  • Processed initial and periodic security clearance investigations for military and DoD/DA civilian personnel.
  • Produced and reviewed correspondence for supervisor s approval and signature within DoD regulations.
  • Manage detailed databases used in coordinating uncleared personnel movements throughout DOD-CIFA facilities.
  • Monitor declassification of mainframe hard drives in accordance with DoD requirements.
  • Managed all mandatory personnel security actions/processes required by DOD for USTRANSCOM.
  • Established technology control plans for foreign national visitors per NISPOM/DoD regulations.
  • Ensured technical security of critical infrastructure for DoD.
  • Ensured delivery of classified documentation through INSCOM/DOD networks.
  • Conducted security inspections of DoD contractor's facilities.

Show More

15. SCI

average Demand
Here's how SCI is used in Security Specialist jobs:
  • Provided and created investigative reports for FBI security officers in accordance with SCIF access violations and other infractions requiring administrative action.
  • Managed in-country human resources for approximately 1,500 personnel to include indoctrination and disciplinary actions; coordinated travel and shipping arrangements.
  • Provide technical and supporting information to Human Resources, Operating units and Legal in order to determine appropriate disciplinary action.
  • Inspected and accredited 10 temporary and 25 permanent SCI Facilities in accordance Director Central Intelligence Directives and Intelligence Community Directives.
  • Maintained security clearance records and processed security clearance documents for personnel requiring SCI access under multiple government contracts and subcontracts.
  • Support SCIF accreditation and management actions to include requirements integration, Fixed Facility Checklist development, and customer engagement.
  • Implement and administer SCI information, industrial security, physical security, personnel security and security education programs.
  • Gathered environmental information through government publications, scientific journals and organizations to provide in reports to members.
  • Communicated effectively by using performance evaluations for members in my charge to maintain close order and discipline.
  • Support security functions within the Office of Security where staff responsibilities overlap other security disciplines.
  • Processed SCI clearance nominations and other related security request for approval by the Contractor Representative.
  • Conducted investigations on violations of government and company policy with recommended corrective and disciplinary actions.
  • Manage and oversee all security operations for the Intelligence Readiness Facility SCIF and collateral areas.
  • Enforced recruit discipline and recommended expulsion for those soldiers lacking required motivation and aptitude.
  • Ensured compliance with all regulations governing SCIF operations and associated SCI contract-related security support.
  • Conduct security investigations for classified containers, sensitive compartmentalized information facilities (SCIF).
  • Maintain discipline to ensure only legal patrons entered the property and enforced capacity regulations.
  • Delivered captivating orientation briefings, SCI debriefings and security awareness training.
  • Investigate SCI security infractions, making recommendations and preparing required reports.
  • Processed and coordinated nomination packages for personnel requiring access to SCI.

Show More

16. Jpas

average Demand
Here's how Jpas is used in Security Specialist jobs:
  • Utilized JPAS to enter personnel information to begin background investigation for military, civilian, and government contractors.
  • Coordinated and trained government/contractors and military security managers on how to indoctrinate personnel in (JPAS).
  • Communicated with clearance granting agencies JPAS/JAMS regarding status of clearances and periodic re-investigations for employees/consultants/foreign nations.
  • Received reviewed and approved incoming visit authorization letters in JPAS from supporting agencies and companies.
  • Monitored personnel entering and exiting classified facility containing open storage using JPAS.
  • Used JPAS for personnel security administration.
  • Processed indoctrination assistance messages via JPAS.
  • Prepare SCI Nomination request, input appropriate entries into JPAS, and maintain individual security records in accordance with security guidelines.
  • Input appropriate data into the personnel database, DCADS; while ensuring that all information was valid or current using JPAS.
  • Managed various Security databases including JPAS / Scattered Castles, which provides the up to date information on personnel with clearances.
  • Use of JPAS and other security verification software to verify clearance of visitors to issue cleared or uncleared entry to facility.
  • Create and review within JPAS visit requests for 300 employees; receive and process visit request from 100 plus outside agencies.
  • Developed new Standard Operating Procedures for Security department in subjects of Courier Cards and Visit Access Request procedures using JPAS.
  • Approved and received incoming visitors through JPAS, Scattered Castles database, M3 Message Trafficking and the Unclear Visitors Database.
  • Processed outgoing JPAS visits, and verified Visit Authorization Letters, as well as issuing employee and visitor access badges.
  • Assisted in the submission of personnel clearance requests through e-QIP/JPAS; and obtained all required security forms and documentation.
  • Assign cases for adjudicator in Toolbox /JPAS, handle all Priority Investigations by distributing the cases to appropriate personnel.
  • Prepare visit request messages via the Multi-Media Message Traffic (M-3), JPAS, fax or e-mail.
  • Retained working knowledge of E-QIP, JPAS and implement and maintain Industrial Security Facilities Database (ISFD).
  • Assisted in operating the visitor control desk utilizing passage point, JPAS to maintain controlled access and security.

Show More

17. Security Operations

average Demand
Here's how Security Operations is used in Security Specialist jobs:
  • Coordinated security operations including emergency response.
  • Conduct patrolling, special operations, and internal security operations to neutralized and control any terrorist activities of the enemy forces.3.
  • Conduct performance assessment of Security Contractors and quality control of Security Operations, manage contractor Verification System (CVS).
  • Interview and interrogate suspicious individuals based on security threats during protective security operations, while remaining courteous and respectful.
  • Provide mission planning, preparation and execution of mobile protective security operations in support of US State Department personnel.
  • Supervised and lead the contracted security officers efforts and related activities of the Physical Security Operations Center staff.
  • Planned and managed screening and area security operations for the protection of military personnel and United States Diplomats.
  • Directed and managed the physical security operations at deployed training locations and vehicular convoys to support training locations.
  • Maintained full accountability for handling all aspects of day-to-day security operations in support of organizational goals and objectives.
  • Provide oversight to security operations for seven different third party security providers globally, directing over 300 Officers.
  • Directed cleared American security operations, protection and counter measure requirements for American Embassy construction sites.
  • Optimized physical security operations by effectively examining the credentials of persons desiring entrance to restricted areas.
  • Prepared overall security plans and managed security operations of organization, including assignments and staffing.
  • Directed and maintained accountability of a team of 5 personnel during highly classified security operations.
  • Execute full-spectrum security operations including roving patrols, access control and command post operations.
  • Prioritized and delegated the day to day site security operations to include logistical support.
  • Coordinate security operations in conjunction with Base Defense Operation Center by supervising key areas.
  • Trained lower ranks in security operations, medical procedures and general military knowledge.
  • Developed and implemented security operations protocols in accordance with established directives and policies.
  • Completed more than 400 security operations and provided critical protections to vital infrastructure.

Show More

18. Information Security

average Demand
Here's how Information Security is used in Security Specialist jobs:
  • Developed and distributed information security-related guidelines and procedures.
  • Develop and implement policies and procedures for personnel and information security determining suitability or security eligibility for job position and retention.
  • Created and maintained personnel files in accordance with regulations and maintained within freedom of information act and information security guidance.
  • Interpreted regulations and formulated policy pertaining to the Information Security, Personnel Security, Industrial Security and PRP Programs.
  • Ensured that WPS Medicare Division information security risks are mitigated in accordance with the Business Partners System Security Manual.
  • Planned and conducted inspections of physical security/personnel security/information security/operation security and force protection vulnerabilities throughout the JIEDDO headquarters.
  • Participated in implementing and evaluating information security, personnel security, industrial security, and resource protection programs.
  • Provide guidance with access management, facility physical security, and information security management and maintenance IAW NISPOM.
  • Train personnel on Information Security classification and markings to ensure proper handling, storage and transmission of information.
  • Provided agency level technical expertise concerning physical security, industrial security, foreign disclosure/release and information security.
  • Provide support services across all security disciplines such as personnel, physical, communications and information security.
  • Process corporate information security policy and technology policy violations and assess security risks of policy exceptions.
  • Provided assistance to Information Security regarding the implementation of program visits with thirty-five base agencies.
  • Ensured each member receiving courier instruction understood the requirements and control of information security.
  • Directed and consulted others in information security related risk, threat and/or vulnerability analysis.
  • Ensured that all necessary information security-related reports and documents are filed promptly with CMS.
  • In-processed personnel and conducted initial security orientation, briefings and information security inspections.
  • Lead meetings with Area Leaders to provided continuing privacy and information security education.
  • Author and update training modules focusing on internal information security and disaster recovery.
  • Provide policy and guidance to assist directorates on all aspects of information security.

Show More

19. Incident Reports

average Demand
Here's how Incident Reports is used in Security Specialist jobs:
  • Check security clearances-Patrolled premises-Filled out incident reports
  • Developed and implemented enterprise wide incident reports to provide leadership metrics to enhance security strategy and operations at Target headquarters locations.
  • Submitted status reports and detailed Incident reports concerning violations of policy to management and the appropriate military agency as needed.
  • Reviewed and generated various force protection information products and incident reports prior to submitting to security and project management.
  • Conducted life safety and physical security patrols/checks, completed daily activity logs/reports, maintenance requests, and incident reports.
  • Worked on multiple projects including Site Incident Management Exercises and incident reports related to burglary and video surveillance.
  • Served as back up risk-management coordinator in processing and taking appropriate action on critical incident reports and complaints
  • Oversee the preparation and distribution of daily operational and incident reports to program management and senior leadership.
  • Managed all security concern reports, led subsequent investigations and provided security incident reports.
  • Maintain records and prepare incident reports and other documents pertinent to Security activities.
  • Conduct investigations of alleged criminal activities and submit incident reports for administrative purposes.
  • Prepared detailed, factual incident reports in compliance with regulations and requirements.
  • Produced detailed incident reports and enforced policies and procedures with security team.
  • Prepared incident reports and accurately updated all applicable databases and spreadsheets.
  • Compiled investigative, use of force and incident reports maintaining accuracy.
  • Prepare security Incident Reports and reporting all information to DIA Security.
  • Responded to emergencies situations wrote and distributed incident reports as required.
  • Analyzed job-related data and prepared required incident reports, i.e.
  • Complete daily paperwork including security logs and detailed incident reports.
  • Document incident reports for a variety of security-related occurrences.

Show More

20. Security Requirements

average Demand
Here's how Security Requirements is used in Security Specialist jobs:
  • Reported and analyzed financial and security data as established to ensure Government Security Requirements were being adhered to for all Government contracts
  • Reviewed physical security requirements and ensured their proper implementation; authored various security related correspondences for own or Group Leaders signature;
  • Ensured accountability for company to abide by required security requirements mandated by DSS (Defense Security Services) and Corporate Security.
  • Oversee subcontractors and vendors to verify compliance with information security requirements, government regulations and company mandated information security protection programs.
  • Performed analyses to validate established security requirements and recommend additional security requirements to ensure compliance with applicable DOS guidelines and requirements.
  • Performed convoy operations in support of logistics and personnel while closely adhering to special security requirements, policies and regulations.
  • Prepared for and participated in security reviews and self-assessment inspections to ensure Government and company security requirements were met.
  • Determined technical security requirements, selected appropriate security devices, determined wiring configurations and infrastructure, and device placement.
  • Experienced adapting technical and physical security requirements to account for unusual country conditions that may occur during project duration.
  • Advised on personnel security policies and related matters and on the impact of personnel security requirements on organizational missions.
  • Support the in-processing of new civilians, foreign nationals, contractors and providing guidance on implementing security requirements.
  • Provided security briefings and training as required to ensure wing personnel were current on new security requirements.
  • Access control, implementing and the administration of internal facility security functions including maintaining customer security requirements.
  • Served as subject matter expert on proposed security policies, programs, and operational security requirements.
  • Interpret written and oral communication per contractors to interlink security requirements off and on site locations.
  • Conduct inquiries to identify current personnel security requirements and identify corrective measures and document best practices.
  • Communicated security requirements and participated in SiteMinder integration meetings with application development and network engineering teams.
  • Advised the Security Manager on issues and policies regarding special access security requirements for sensitive programs.
  • Trained security coordinators as well as other command employees on new security requirements and procedures.
  • Performed analyses to validate established security requirements and to recommend additional security requirements and safeguards.

Show More

21. Suspicious Activity

average Demand
Here's how Suspicious Activity is used in Security Specialist jobs:
  • Monitored cameras using Video Viewer for any suspicious activity and breaches in company policy to facilitate tight security of the property.
  • Experienced in resolving suspicious activity complaints, conducting investigations, handling escalated issues, and preparing for crisis management.
  • Observed and reported any suspicious activity, emergency events, safety conditions, and other security anomalies.
  • Investigated suspicious activity around installation as first line of defense and up channeled incidents as necessary.
  • Operated video surveillance systems to assist with investigations and to monitor bank facilities for suspicious activity.
  • Liaised between law enforcement for real-time exchange of information when responding to suspicious activity or disturbances.
  • Responded to and investigated suspicious activity reported by local national security guards.
  • Assisted in mentoring the terminals and reporting any suspicious activity/prohibited items immediately.
  • Performed surveillance of suspicious activity using binoculars, cameras and camcorders.
  • Reported to Service Supervisor or Service Manager on any suspicious activity
  • Observed & reported suspicious activity within assigned sector of observance.
  • Investigate any suspicious activity, and report findings to management.
  • Keep all events safe and organized Report any suspicious activity
  • Patrolled grounds and alerted authorities of any suspicious activity.
  • Documented suspicious activity as reported by branch employees.
  • Monitor suspicious activity and violations of venue policies.
  • Report and escalate suspicious activity to manager.
  • Assist customer with fraudulent transactions or suspicious activity
  • Report Suspicious activity and persons to Supervisor.
  • Patrol hospital premises and identify suspicious activity.

Show More

22. Security Issues

average Demand
Here's how Security Issues is used in Security Specialist jobs:
  • Resolved all data security issues encountered by monitoring, updating and providing support virtually and by phone to the University community.
  • Prepared reports, disseminated information, and advised management concerning all relevant security issues on current and potential operations at camp.
  • Subject Matter Expertise: Provided subject matter expertise in area personnel security to assist with resolution of significant security issues.
  • Research case law and regulations to identify precedents for current personnel security issues and compiles information as necessary.
  • Identify new techniques to improve and ensure continued operations in times of natural disaster or operations security issues.
  • Provided concise briefings of safety and security issues along with recommended resolutions to executive level management including CEO.
  • Educated IT and management about security policies and provided consultation on security issues regarding user built/managed systems.
  • Monitored and evaluated unit performance on key security issues, recommending corrective action programs where appropriate.
  • Communicated with hospital security on possible security issues to help develop security policies and/or procedures.
  • Reviewed personal identifications and other vital records, determined, recorded and addressed security issues.
  • Established professional relationships among INSCOM's organizations that facilitated interaction to solve Command-wide security issues.
  • Supported investigators by evaluating personnel security files and advised Security Manager on security issues.
  • Coordinated with government security teams and other security offices to resolve complex security issues.
  • Brief executive and management officials on controversial or potentially high risk security issues.
  • Analyzed complex physical security issues and provided cost-effective recommendations that met policy requirements.
  • Resolved security issues concerning conflicting or insufficient data, evidence, and/or testimony.
  • Provided customer service to branch employees relating to security issues and emergency management.
  • Conducted security briefings for twenty employees and resolved intense security issues.
  • Accommodated employees and other government representatives on security issues and/or actions.
  • Work closely with other functional leaders and contractors regarding security issues.

Show More

23. Nispom

average Demand
Here's how Nispom is used in Security Specialist jobs:
  • Authorized the release of information and provides guidance on policies and procedures concerning investigative requirements through NISPOM.
  • Reviewed classified holdings to ensure required markings and distribution requirements were in accordance with NISPOM regulations.
  • Provide guidance to executive management on all security administrative functions in support of NISPOM.
  • Utilize NISPOM/JFAN/DCID/ICD Regulations for any questions concerning security matters.
  • Classified asset packaging in accordance within the NISPOMS guidelines, responsible for destruction of classified material in accordance with the NISPOM.
  • Represented the Army as a member of the NISPPAC working group for the NISPOM revision and adjudication of informal comments.
  • Managed, audited, and updated changes to the AIS systems in accordance with the NISPOM, Chapter 8.
  • Conducted random monthly package inspections to make sure employees were properly handling/transporting classified materials in accordance with the NISPOM.
  • Ensured the company remained in compliance with National Industrial Security Program Operating Manual (NISPOM) regulations and directives.
  • Performed all functions in support of employees, customers, and visitors in compliance with policy and NISPOM regulations.
  • Process classified materials through the receipt, distribution, and transmittal or destruction cycle in accordance with NISPOM/PCI requirements.
  • Submit instructions and monitor progress of Web Base Training as well as other required briefings by the NISPOM.
  • Evaluated closed rooms and performed inspections to address the exacting guidelines of the NISPOM and DCIDS standards.
  • Ensured all classified shipments, courier carried documents were reviewed and verified in accordance with NISPOM requirements.
  • Conducted audits of Seller compliance with NNPI controls as defined in the Facility-Wide DD-254s and NISPOM/DOE Orders.
  • Implement visitor control procedures ensuring compliance with the National Industrial Security Program Operating Manual (NISPOM).
  • Process security clearances with site management and recruiters as needed according to contract requirements and NISPOM.
  • Implemented policies and procedures as outlined in the National Industrial Security Program Operating Manual (NISPOM)
  • Maintained procedural guidelines for classified documentation and closed areas, following the parameters of the NISPOM.
  • Enforced and utilized the policies and procedures of the NISPOM and corporate Standard Practice and Procedures.

Show More

24. Ensure Compliance

average Demand
Here's how Ensure Compliance is used in Security Specialist jobs:
  • Coordinated and monitored sensitive aspects of the industrial security program to ensure compliance with government and company security policies and procedures.
  • Conducted self-inspections to ensure compliance with all security policies and procedures as directed by Defense Intelligence Agency and higher headquarters.
  • Developed, administered, and coordinated programs and procedures to ensure compliance with government and regulatory laws and regulations.
  • Directed organization charged with administering and monitoring regulated activities to interpret and clarify laws and ensure compliance with laws.
  • Assisted with Internal Security Controls through performance of compliance assessment reviews to ensure compliance with government and company regulations/requirements.
  • Worked with the Information Privacy/Security Officer to implement security policies/procedures to ensure compliance with applicable state and federal laws.
  • Conduct audits of Cargo operations throughout the Worldwide Delta system to ensure compliance with frequently changing security regulations.
  • Coordinate security operations of control center to ensure compliance with corporations, emergency policy and procedure.
  • Reviewed work requests, blueprints and other proposed construction documents to ensure compliance with security regulations.
  • Work with program management to ensure compliance with established program security plans and customer directives.
  • Reviewed classified contracts and internal WHCA contracts to ensure compliance with required industrial security mandates.
  • Selected to oversee certain security features of the facility to ensure compliance with department regulations.
  • Monitored security access to ensure compliance with established security policies and procedures.
  • Assist in conducting reviews to ensure compliance with accreditation/ certification support.
  • Perform general audits to ensure compliance and identify continuous improvement opportunities.
  • Conduct periodic self-inspection and review of security process to ensure compliance.
  • Implemented quality assurance procedures to ensure compliance with regulatory mandates.
  • Conduct audits to ensure compliance with company and regulatory requirements.
  • Conducted inspection of clients, rooms and the facility to ensure compliance with facility regulations and decrease the introduction of contraband.
  • Follow procedures which ensure compliance with requirements of the Defense Security Service National Industrial Security Program Operating Manual (NISPOM).

Show More

25. Security Services

average Demand
Here's how Security Services is used in Security Specialist jobs:
  • Monitor security equipment ensuring equipment is functioning by performing quarterly alarm testing, coordinate security services with vendors and bank personnel.
  • Worked as liaison between branches and account managers of contracted security services arranging equipment repair, and invoice reconciliation.
  • Negotiated personal contracts for security services provided to different establishments and events throughout the Washington DC area.
  • Provided armed security services to businesses and individuals from construction sites to banking industry.
  • Provided security services by monitoring property, security patrols and other duties as required.
  • Processed security paperwork to obtain clearances through Defense Security Services and other agencies.
  • Provided specialized security services in support of risk management and protective missions.
  • Delegated, coordinated, and maintained the activity of contracted security services.
  • Functioned as a liaison between Terminal Operations Manager and Security Services Officials.
  • Provided professional security services to the cabaret industry and to private clients
  • Supervised outside contracted security services for new site construction projects.
  • Provided security services to upscale commercial building tenants and visitors.
  • Provided security services for support of Operation Enduring Freedom.
  • Solicited security services to businesses and privet sector.
  • Trained and supervised in-house and contract security services.
  • Provided administrative security services to the hospital.
  • Provided security services to employees/contractors/visitors of QVC.
  • Provided catering security services to airline.
  • Hired to focus primarily on providing armed front-line security services for the MDA by conducting roving foot patrols within MDA facilities.
  • Assisted the FSO with the self inspection of the facility resulting in a Commendable rating from the Defense Security Services.

Show More

26. TSA

average Demand
Here's how TSA is used in Security Specialist jobs:
  • Conducted security audits monthly to identify potential problems related to TSA security protocols, staff safety and asset protection.
  • Provided guidance to TSA's Aviation Operations and the Maritime and Land Security operational units on proper methodology implementation.
  • Provided a security chain of custody throughout the assembly; following transportation security administration regulations (TSA).
  • Supervised TSA's strategic and operational risk management operations; prepared periodic transportation security risk management reports.
  • Performed airline catering security services in compliance with TSA standards and customer specifications.
  • Screened aircraft and passengers in accordance with TSA aviation security requirements.
  • Inform clients of TSA regulations and examine passenger security documentation.
  • Promoted to Transportation Security Specialist at TSA/HQ.
  • Reviewed fundamental weaknesses in TSA standard operating procedures (SOP) and instated critical recommendations that were adopted as new SOP.
  • Experience includes providing incident management guidance and support to the TSA Critical Incident Management Group (CIMG) and senior leadership.
  • Supervised three TSA flying armed escorts resulting in the return of two soldiers to their units and one to Fort Leavenworth.
  • Provide TSA senior officials with immediate and accurate information regarding incidents or threats received to the Nation's transportation systems.
  • Negated invalid matches and referred valid matches to TSA Vetting Encounter Analysts and the Terrorist Screening Center for further analysis.
  • Keep daily records of Authorized Vendors in IACMS for Change 5A, & Recurrent Direct Employees for our TSA audits.
  • Serve as a Subject Matter Expert (SME) for the implementation of newly implemented TSA Risk Based Security initiative.
  • Partner with Branch Managers and Facility Security Coordinators to drive TSA compliance and develop best-in-class air cargo security best practices.
  • Supported TSA in the Washington Operations Center Complex and the Transportation Security Command Center on a rotational 24/7 schedule.
  • Keep the ATSAIC and other supervisors informed of unanticipated issues and controversies that arise and recommending solutions where appropriate.
  • Supported protection and monitoring activities for maritime commerce and critical infrastructure covered under MTSA, ISPS and SOLAS.
  • Served as a Transportation Security Specialist, for the Assistant Secretary, Transportation Security Administration (TSA).

Show More

27. Security Awareness

average Demand
Here's how Security Awareness is used in Security Specialist jobs:
  • Implemented security awareness training and education programs to educate, refresh and motivate personnel to protect people, property and information.
  • Created, implemented and managed an effective security awareness and education program to address security shortfalls and satisfy annual training requirements.
  • Coordinated annual security awareness training and conducted briefings to ensure all personnel were aware of the latest security directives and procedures.
  • Served as liaison to government officials in facilitating briefings on construction security matters and provided improvement methodologies to maximize security awareness.
  • Coordinate and conduct individual and group security awareness briefings at all levels to include General Officers and Senior Executive Service personnel.
  • Initiate and conduct Experienced in activities to create information privacy and security awareness and education within the company and contractors.
  • Implemented security awareness marketing plans, such as security awareness surveys, phishing email education and global liaison training meetings.
  • Designed training presentations, posters for security awareness, and employee security booklets and supplement badges for important security information.
  • Communicate with all employees to increase their security awareness regarding corporate policy and procedure regarding safety & security.
  • Managed the development and dissemination of products and materials to increase security awareness and reinforce compliance with security policy
  • Provided updates to emergency contacts.- Conducted security indoctrination, providing initial security awareness, education and training.
  • Planned, developed, and implemented security awareness programs for FedEx operational management and all employee groups.
  • Initiated, managed and maintained caseloads while providing support services for a comprehensive security awareness program.
  • Developed a security awareness program, publishing articles on intranet and creating departmental role-based training materials.
  • Research and develop materials to present an accurate and interactive security awareness program within G3.
  • Provide foreign travel and security awareness briefings utilizing State Department and other intelligence resources.
  • Implemented and briefed quarterly and annual security awareness training for personnel within the command.
  • Established and managed the Security Awareness and Education programs for all supported elements.
  • Protected classified government information and publish security awareness for all cleared personnel.
  • Developed security information training pamphlet that enhanced security awareness throughout the command.

Show More

28. Commander

average Demand
Here's how Commander is used in Security Specialist jobs:
  • Advised Commanders on military personnel readiness; reviewed consolidated reports, statistics, applications, and prepared recommendations for personnel actions.
  • Commanded multiple security teams in tactical operations, supervised training, and provided personnel/vehicle administrative support as vehicle commander.
  • Advised Senior Executives and Commanders on matters of Security and Counter Terrorism while conducting operations in developing nations.
  • Authorized appropriate course of action to take upon receipt of derogatory information with commanders and higher authority.
  • Hand selected for personal security details protecting the Battalion Commander and other high-ranking government officials.
  • Consulted commanders and security managers regarding contractor security protocol and safety matters.
  • Guarded and inventoried high-valued government equipment for Company Commander and Command Chain.
  • Initial on-scene commander for all incidents related to security or safety.
  • Testified to military commanders on evidence found during investigations.
  • Maintained air-to-ground and point-to-point radio contact with aircraft commanders.
  • Served as Incident Commander/Emergency Coordinator for site emergencies.
  • Company Commander's Personal Security Detail.
  • Report all violators to supervising commanders.
  • Prepared offender correspondence for the commander.
  • Appointed to the vehicle commander seat and was responsible for the vehicle and three other men during operations and training.
  • Presented extensive expert opinion to design team for new public housing complex and the assigned police Commander and officers.
  • Selected to step in as the tactical commander, serving second in command to the shift leader on missions.
  • Serve as Shift Commander and liaison with the client on a daily basis to include providing Subject Matter Expert.
  • Conducted over 400 convoy security missions as a Lead Machine Gunner and an additional 50 as the Vehicle Commander.
  • Resourced, planned and led multiple motorcade operations without incident in Baghdad, Iraq as the Vehicle Commander.

Show More

29. Security Training

average Demand
Here's how Security Training is used in Security Specialist jobs:
  • Inspected and provided assistance and security training to contractor personnel, ensuring their adherence to Government Security Regulations and Contractual Procedures.
  • Conducted initial security briefings, debriefings, annual refresher security training, courier briefings and other security briefings required.
  • Created innovative and entertaining annual security training session that maximized attendance, increased learning retention and communicated critical information.
  • Aided with security training, theft investigations, crisis management planning, risk analysis, and vulnerability assessments.
  • Prepare and presented organization's initial and recurring specialized annual security training to all accessed personnel.
  • Contacted Diplomatic Security Training Center s Curriculum Development lead and informed him of the findings.
  • Tracked all required training requirement and documented completion and input to security training database.
  • Commanded convoy operations/security: conducted IED, weapons, safety, perimeter security training.
  • Developed security training materials to meet changing environments and technologies within the region.
  • Conducted annual security training for 25 members maintaining heightened awareness with zero incidents.
  • Conducted program reviews to examine security training of visitor groups contractors for compliance.
  • Administered security training to all program personnel on a regular and recurring basis.
  • Conducted security briefings and develop and conduct security training and education programs.
  • Conducted all security training on identification, safe serving and altercation prevention.
  • Updated and maintained security training files for all personnel of supported organization.
  • Provided weekly security training to employees promoting security policies and requirements.
  • Conducted security training sessions and briefings in accordance with established policies.
  • Instructed personnel in country clearance briefings and construction security training.
  • Monitor safety and security training requirements throughout Volunteer cycles.
  • Specialized Training 1999 NYPD Intelligence Division Protective Security Training Course

Show More

30. Comsec

low Demand
Here's how Comsec is used in Security Specialist jobs:
  • Conducted Communications Security (COMSEC) audits/inspections, facility approvals/physical security inspections of existing and newly established facilities worldwide.
  • Report immediately to the Facility Security Officer and known or suspected incidents of a COMSEC insecurity.
  • Directed COMSEC management of all sensitive material and equipment ensuring national security of all information.
  • Conducted Communication Security (COMSEC) duties and responsibilities in compliance with government regulations/requirements.
  • Monitored COMSEC (Communications Security) to insure secure communications between security forces.
  • Maintain accountability of classified documents and COMSEC material.
  • Provided and maintained daily safeguarding of COMSEC information.
  • Managed applicable program-related COMSEC services.
  • Prepared, reviewed and released official Naval messages to the appropriate entities granting a final clearance message of all COMSEC holdings.
  • Provided advice and assistance on industrial security matters and conducted numerous security-related briefings such as COMSEC, NATO and threat awareness.
  • Perform inventories of all accountable items under the COMSEC security briefings and inspections of all hand receipt holders for compliance.
  • Demonstrate proficiency in all matters pertaining to COMSEC/EKMS/CMS and Secure Telephone Equipment (STE) in support of mission readiness.
  • Assist in the Command COMSEC Inspection program, and brief personnel on DACAP requirements before receiving TS level keying material.
  • Ensured physical, administrative and personnel requirements were in compliance with the NSA Industrial COMSEC Manual and other regulatory requirements.
  • Conducted initial assessments to determine storage, contracts, personnel, COMSEC, Information Systems, and Physical Security needs.
  • Appointed as the United States Government (USG) ACOR and Alternate Custodian for the Joint Staff COMSEC Program.
  • Provided appropriate security briefings to cleared contractor personnel to include NATO, CNWDI, COMSEC, and threat awareness.
  • Set policy and procedures for handling FBI COMSEC materials and equipment for field offices as well as Legal Attaches.
  • Provided assist to the Communications Security (COMSEC) Custodian in the management and accountability of COMSEC material.
  • Functioned as Corporate COMSEC Liaison interfacing with five COMSEC accounts and Corporate FSO, NSA, and Custodians.

Show More

31. Joint Personnel

low Demand
Here's how Joint Personnel is used in Security Specialist jobs:
  • Utilized (JPAS) Joint Personnel Security System; Personnel Security System (PS3) and Scattered Castle
  • Updated employee clearances in the Joint Personnel Access System (JPAS).
  • Joint Personnel Adjudicative System (JPAS) Account Manager.
  • Utilize JPAS (Joint Personnel Ajudication system) on a daily basis checking status of investigations.
  • Account Manager for Joint Personnel Adjudications Systems (JPAS) for Fort Benning, Georgia.
  • Define, update, maintain, and produce reports from Joint Personnel Adjudication (JPAS) database.

Show More

32. Alarm Systems

low Demand
Here's how Alarm Systems is used in Security Specialist jobs:
  • Monitored motion intrusion and/or panic alarm computer systems and other alarm systems.
  • Monitored intrusion/alarm systems to verify proper function and timely maintenance.
  • Monitor alarm systems and respond to any alarms immediately.
  • Designed, installed and maintained commercial and residential burglar and fire alarm systems along with closed circuit camera surveillance systems.
  • Watch alarm systems and video cameras, and receive guest and visitors after verifying they have proper access and clearance.
  • Make sure all alarm systems, camera systems and key systems are all operational and certifications up to date.
  • Operate various security systems, and equipment such as Computer, Alarm Systems, burglar, and fire alarms.
  • Sell burglar, fire, and medical emergency alarm systems and security monitoring services to individuals and businesses.
  • Used computers for data input, incident reports, monitoring of alarm systems & granting card access.
  • Monitor branch security cameras and alarm systems; conduct audit reviews and place service calls when needed.
  • Worked in the central alarm center for Barnett Bank which housed all their property alarm systems.
  • Monitor security and fire alarm systems and notify proper law enforcement to respond to alarms.
  • Oversee the removal of same equipment and alarm systems upon termination of property lease.
  • Monitor fire and burglar alarm systems acknowledge triggered alarms and dispatch officers when needed.
  • Assisted in maintenance and upkeep of military-grade alarm systems hardware at multiple worldwide locations.
  • Monitored electronic notification alarm systems in the Global Security Operations Center (GSOC).
  • Monitored access to security areas through CCTV, surveillance equipment and alarm systems.
  • Monitor all alarm systems and cameras for the property and secured areas.
  • Monitored cameras and various equipment alarm systems to include fire alarm system.
  • Monitor all alarm systems, including CCTV and Digital Video Records.

Show More

33. Security Management

low Demand
Here's how Security Management is used in Security Specialist jobs:
  • Analyzed and translated business requirements into control objectives, designing security controls and implementing them along with a security management cycle.
  • Provide technical support to Business Leader/Chief Specialist in identifying and streamlining new/existing processes and tools in the area of Security Management.
  • Support automation and enhancements around existing IS tools and processes ensuring innovation and advancement in the area of Security Management.
  • Developed and maintained database to assist with security management for purposes of payroll, store location information and crucial contacts.
  • Directed, coordinated and had oversight of contractors while advising government officials, units and organizations on security management.
  • Report residual risk, security exposures, vulnerabilities, noncompliance and maltreatment of information assets to IT security management.
  • Possess a wide range of ordnance operational knowledge from the first line supervisory level to specialized security management considerations.
  • Analyzed the security needs and implemented security management and protection tactics at executive functions involving senior management.
  • Maintain oversight of physical security, and security compliance programs and consult security management on relative issues.
  • Reported all building utility, service and life safety issues to appropriate personnel and Security Management.
  • Gathered clearances and personnel information for management through the Integrated Security Management System (ISMS)
  • Developed progressive strategies and presentations on security management procedures for Air Force Base Security.
  • Provided security management across a broad spectrum of areas within various business sectors.
  • Assist in security management necessary to execute various aspects of security, i.e.
  • Produce documentation and reports by creating custom report queries via security management software.
  • Make recommendations to security management based upon threat vulnerability assessments and security assessments.
  • Managed and implemented a Web-Based Enterprise Personnel Security Management Solutions System.
  • Performed all administrative duties for Security Management, security officers.
  • Provided security management with solutions for potential and existing problems.
  • Generated incident reports to ensure proper documentation for Security management.

Show More

34. Security Education

low Demand
Here's how Security Education is used in Security Specialist jobs:
  • Developed various security awareness presentations in support of organizational security educational program.
  • Worked closely with KO Operations Center management to establish and implement loss prevention, asset recovery, and security education programs.
  • Conducted various security, anti-terrorism and threat (force protection) briefings and developed ongoing security education materials.
  • Conducted security education classes for hundreds of people on how to properly safeguard classified material and documents.
  • Assisted in conducting security education, awareness training, new hire orientation, and conducts briefings/debriefings.
  • Ensured OPSEC training was incorporated into the organization's security education and awareness program.
  • Performed studies and surveys, prepared and presented security education awareness briefs and lectures.
  • Provided physical security education and awareness training to various company personnel as needed.
  • Develop and manage security education/refresher training, and track training on all personnel.
  • Assisted in maintaining the physical security electronic equipment and base security education programs.
  • Develop and maintain an effective security education program to meet mission requirements.
  • Developed security plans and was responsible for the state security education program.
  • Ensured security policies/procedures are adequately portrayed and conveyed in security education initiatives.
  • Assist base units/staff security managers in implementing security education/ resource protection programs.
  • Supported the Security Manager in administering the Security Education and Awareness Program.
  • Developed and presented quarterly security educational briefings for over 600 people.
  • Developed security education curriculum and facilitated training of 3000+ employees/managers annually.
  • Designed and conduct security education awareness training for 1000 employees annually.
  • Increased security awareness by developing & delivering security education & training.
  • Assist in the development of security education and instructional programs.

Show More

35. Special Access

low Demand
Here's how Special Access is used in Security Specialist jobs:
  • Implemented SAP requirements review and evaluate reports of investigations and other data to determine personnel security to Special Access Programs.
  • Interpret National Disclosure Policy and coordinated proposed releases of collateral and special access program classified material.
  • Reviewed Statements of Work and Specifications and all other documents concerning supported Special Access Programs.
  • Developed and maintained a database of designated personnel granted special access to selected classified information.
  • Reviewed and approved contractor/bidder security plans and special access protection and overall contractor qualifications.
  • Prepare Visit Authorization letters for personnel traveling abroad and those requiring special access.
  • Implemented security policy and procedures on special access computers.
  • Prepare Special Access memorandums to the security supervisory.
  • Provided special access training to new adjudicators.
  • Provided guidance and training in all areas of Special Access Program security for Government and contractor personnel through annual security seminars.
  • Coordinated Special Access Programs (SAP) Working Group meetings; assisted in the development of agendas and related materials.
  • Coordinate with functional areas such as Security Architecture, Information Assurance and various Special Access Programs to create/present relevant training.
  • Ensured the integrity of day-to-day closed area, restricted area, and Special Access Program (SAP) security operations.
  • Provided assistance and direction, for control and management of personnel security for Special Access Program (SAP).
  • Provided training to the Special Access Program, Mid-level Course regarding demonstrating treaty compliance while protecting critical information.
  • Provide formal and informal SAP (Special Access Program) security guidance to USMC staff and support contractors.
  • Updated the internal database by creating records to track all special accesses individuals has been briefed into.
  • Managed personnel security records for 4200 exercise participants for access to Special Access Programs (SAP).
  • Developed Standard Operating Procedures (SOP) to establish the Special Access Program Facility (SAPF).
  • Initiated, processed, and maintained clearances via JPAS, Scattered Castles and other special access sites.

Show More

36. Crowd Control

low Demand
Here's how Crowd Control is used in Security Specialist jobs:
  • Received State of California Fire Safety Certification, Counter-Terrorism, Training and Crowd Control Evacuation Procedures.
  • Assisted in investigations by effectively communicating to interview observers, collect data and managing crowd control.
  • Crowd control in and around establishment, verified identification of patrons entering premises.
  • Manage crowd control and assist with evacuations during emergency situations.
  • Supervised and organized crowd control.
  • Performed identification checks, Secured inside/outside perimeters, escort management to and from safe, crowd control, customer service.
  • Provide Physical response to emergencies (incident commander, crowd control, emergency vehicle direction, etc.).
  • Worked to provide traffic control and crowd control as well as operating security checkpoints and providing premise security.
  • Assist police as required by rerouting traffic, crowd control, obtaining facts, taking statements, etc.
  • Conducted Crowd Control Security for Major Events (Thanksgiving Parade, Dream Cruise, etc.)
  • Managed crowd control and customer flow at popular snow-tubing ride, ensuring effective operations.
  • Provided protective services, crowd control, safety checks and responded to emergency situations.
  • Provide crowd control during hours of operation and up to one hour following closing.
  • Provide first aid, crowd control, animal safety, and customer service.
  • Maintain crowd control to ensure the safety of spectators and event performers.
  • Crowd control to keep patrons moving along as the clubs let out.
  • Assisted law enforcement officers with crowd control and surveillance at large events.
  • Performed risk assessment and regular safety checks; crowd control and maintenance.
  • Directed and maintained crowd control in peak occupancy hours of operation.
  • Employed crowd control measures to maintain peaceful public areas and events.

Show More

37. Security Violations

low Demand
Here's how Security Violations is used in Security Specialist jobs:
  • Conducted administrative inquiries of serious security violations occurring at contractor facilities including loss, compromise or suspected compromise of classified information.
  • Investigated security violations and prepared reports specifying corrective and preventative actions to be taken while always enforcing OPSEC rules and regulations.
  • Participate in security investigations when security violations are discovered and satisfy regulatory and procedural administrative requirements for compromise situations.
  • Investigated security violations and recommended corrective actions; Maintained a classified document accountability system and conducts document inventories.
  • Conducted formal and informal investigations as appropriate of security violations, missing, lost and stolen government property.
  • Conducted administrative inquiries of security violations to determine whether loss or compromise of classified information had occurred.
  • Advised company and building engineers of potential security violations and proposed ways to increase staff effectiveness.
  • Conduct inquiries and investigation of any security violations of classified information that may have been compromised.
  • Resolve security violations, administer and execute existing guidelines for controlling and handling of classified material.
  • Monitored more than 50 security cameras to track normal inmate movement and identify security violations.
  • Maintained files referencing physical security violations; prepared documents citing violations for manager's signature.
  • Monitored & reported security violations for classified or proprietary materials, documents, and equipment.
  • Identified security violations and weaknesses and conducted preliminary inquiries of actual or suspected compromises.
  • Monitored, reported and provided subject matter expertise of SCI security violations and compromises.
  • Prepare security presentations/briefings, training materials, policies and guidance, investigate security violations.
  • Investigated security violations, formulated preliminary reports and provided recommendations for corrective actions.
  • Briefed Preliminary Inquiry Official for security violations and coordinate procedures to be taken.
  • Identify, follow-up, and manage reported security violations and potential compromises.
  • Investigated security violations and prepared reports specifying preventive actions to be taken.
  • Investigated and reported security violations in accordance with applicable guidance and regulations.

Show More

38. Adjudication System

low Demand
Here's how Adjudication System is used in Security Specialist jobs:
  • Processed personnel security applications, terminations, and update status in the Joint Personnel Adjudication System.
  • Performed security investigations through Government system (JPAS) Joint Personnel Adjudication System.
  • Managed personnel security folders for Joint Personnel Adjudication System security clearances.
  • Initiated/approved over 300 individual e-QIP submissions in Joint Personnel Adjudication System.
  • Process and update information in JPAS (Joint Personnel Adjudication System), to include clearances, accesses and passing visits.
  • Verified Security Clearances and sent out CONCUS and OCONUS visit requests using the Joint Personnel Adjudication System (JPAS).
  • Monitored and reviewed SCI clearances through the Joint Personnel Adjudication System and processed incoming and outgoing visit requests and certifications.
  • Managed personnel security clearances, access, and visit certification through the Joint Personnel Adjudication System (JPAS).
  • Utilized Joint Personnel Adjudication System (JPAS) to maintain a Cage Code of more than 2000 defense contractors.
  • Initiated and modified official visit requests and security clearance renewals through the Joint Personnel Adjudication System (JPAS).
  • Keep track of clearance status using Joint Personnel Adjudication System (JPAS) and processed new employee security clearances.
  • Assist the SSO in managing and overseeing the unit's Security Management Office under the Joint Personnel Adjudication System.
  • Create and modify incoming and outgoing visitor authorization requests using the Joint Personnel Adjudication System (JPAS).
  • Perform visitor control operations and management of Joint Personnel Adjudication System (JPAS) for all of USASAC.
  • Send, receive, and verify clearances via Joint Personnel Adjudication System (JPAS) and Scattered Castles.
  • Prepared and received visit requests using the Joint Personnel Adjudication System (JPAS) for program personnel.
  • Provide quality control of Joint Personnel Adjudication System (JPAS) Security Clearance Questionnaire (SF-86).
  • Maintain Personnel Security Management Network (PSM) through the Joint Personnel Adjudication System (JPAS).
  • Verified the status of investigations and clearances using the Joint Personnel Adjudication System (JPAS).
  • Maintained clearance and access rosters and update the Joint Personnel Adjudication System (JPAS) database.

Show More

39. Security Briefings

low Demand
Here's how Security Briefings is used in Security Specialist jobs:
  • Provided training to new personnel during monthly new employee security briefings, ensuring accurate and timely completion of security paperwork.
  • Provided Government-regulated security briefings and training to new hires and yearly refresher briefings to current employees and consultants.
  • Improved security briefings and saved time by automating initial/recurring indoctrination briefings; program rated as exceeding requirements.
  • Conduct in-processing and security briefings of new hires, out-processing and security debriefings of retired/ resigned employees.
  • Prepared and maintained personnel security files for program security briefings while conducting access certification for incoming/outgoing visitors.
  • Developed initial and comprehensive security briefings to comply with newly released DOE Orders and Directives.
  • Provided Security briefings to personnel regarding foreign travel and recommended safety concerns in International travels.
  • Conducted all security briefings, indoctrination, and annual refresher training for accountability as required.
  • Educated staff on matters relating to correct security practices and conducts comprehensive security briefings.
  • Administered initial and annual refresher security briefings, indoctrination, and courier training.
  • Conducted all in/out processing security briefings for Government and contractor personnel assigned.
  • Ensured that appropriate defensive security briefings are administered to all area employees.
  • Provided security briefings and oversaw required training of internal and customer staff.
  • Conducted initial indoctrination security briefings and debriefings to all appropriate personnel.
  • Conducted collateral security briefings, including foreign travel and defensive travel.
  • Provided Security Briefings and Security Awareness Training to Marines and Civilians.
  • Prepared and conducted operational and program security briefings and debriefings.
  • Conducted annual and initial security and program security briefings.
  • Assisted employees/consultants/clients in completing e-QIP and various security briefings.
  • Developed and delivered all personnel security briefings and debriefings.

Show More

40. Security Incidents

low Demand
Here's how Security Incidents is used in Security Specialist jobs:
  • Assist in the identification, reporting, investigation and documenting security incidents in accordance with applicable policies and directives.
  • Conducted timely and accurate Administrative Inquiries (investigations) concerning security incidents and violations associated with Government classified programs.
  • Investigated security incidents and violations of policy, prepared results of investigations for management for corrective and preventative actions.
  • Maintain departmental filing; maintain confidentiality of sensitive information related to customers and security incidents on the network.
  • Provided immediate response to security incidents, hostile situations and alarms emanating from restricted and controlled areas.
  • Designed and implemented drills and procedures for security incidents and response from security and hospital staff.
  • Detail documentation of security incidents, generate reports and conduct standby holds pertaining to emergency situations.
  • Reviewed reports of security incidents/violations from both domestic and overseas offices and make appropriate recommendations.
  • Conducted and analyzed information received on personnel background checks, security incidents and violation investigations.
  • Investigate, document and report security incidents or violations and ensures follow-up action as appropriate.
  • Investigate security incidents and generate reports for The Defense Security Service and InnovaSystems Executive Management.
  • Investigated security incidents, counseled employees, and presented security recommendations to senior leaders.
  • Created detailed documentation tracking all security incidents and composed activity reports detailing compliance issues.
  • Manage security incidents and provide mitigation actions and provide second level escalation support.
  • Interacted with Charter customers to assist in resolving security incidents and concerns.
  • Prevented the possibility of several national security incidents from occurring.
  • Ensured security incidents were handled in accordance with established procedures.
  • Relayed information regarding security incidents from guards to head of security
  • Identify and report communication security incidents and practices dangerous to security
  • Assisted customer base with resolving security incidents and concerns.

Show More

41. Background Checks

low Demand
Here's how Background Checks is used in Security Specialist jobs:
  • Processed approximated 500 Local Background checks Kept the battalion commander informed on all physical, informational and personnel security matters.
  • Conduct investigations and background checks for individuals and organizations requesting security access privileges at the airport.
  • Worked with senior level specialist to conduct preliminary background checks on government applicants and contractor personnel.
  • Confirmed background checks accurately using specialized computers and granted badges for access to secure facilities.
  • Implemented, innovative technical safety measures including adding increased background checks for visitors.
  • Conducted interview scheduling, background checks and prepared personnel security investigation forms.
  • Compile, interpret, screen, and review results of preliminary background checks to identify whether they contain derogatory information.
  • Utilized the Virginia Criminal Information Network (VCIN) to perform background checks prior to personnel entrance into the facility.
  • Familiarized self with the National Crime Information Center Database to conduct background checks on personnel trying to enter the Installation.
  • Engaged civilians and provided security clearances upon entrances as well as background checks (both civilian and staff).
  • Assisted with the adjudication of background checks for federal contractors and DA (Department of the Army) Civilians.
  • Train in services to employees and parents >Conduct interviews and background checks on possible new hires.
  • Organized and conducted background checks on over 3000 Iraqi workers in support of US Mission Iraq Baghdad.
  • Submit background checks for all contractors through contractor advantage programs and monitor status until approved or denied.
  • Reviewed and analyzed the results of preliminary background checks through NCIC, credit, fingerprint, etc.
  • Obtain lists of attendees and perform criminal background checks on members of press for special events.
  • Conduct interviews and background checks that help to ensure the safety and security on Kandahar Airfield.
  • Process all background checks and maintain their security files for the Respite Care Providers and subcontractors.
  • Conducted interviews, background checks, and screened personnel prior to issuing access badges.
  • Manage Do Not Admit list for failed background checks at DHS Nebraska Avenue Complex.

Show More

42. Document Control

low Demand
Here's how Document Control is used in Security Specialist jobs:
  • Performed additional duties for classified document control office which included classified material inventories and combination changes on GSA safes/doors.
  • Assist Security team with inventory management, security inspections and provide input on Document Control processes and procedures.
  • Conducted briefings on document control procedures, courier responsibilities and security awareness; assist with classified meetings.
  • Conduct property management inventory for Federal Government Agency, Process and initiate top secret document control procedures.
  • Assigned accountable document control numbers and issued bar codes for accountable/controlled items in accordance with local policy.
  • Support Document Control-handle proprietary material for internal delivery or shipping out proprietary material by approved vendors.
  • Train new personnel in Document Control, Physical Security, Security Administrator Functions and Personnel Security.
  • Assisted and supported security briefings to include Security Education, Document Control, and Personnel Security.
  • Maintained document control database for classified documents administered, performed classified reproduction, and destruction.
  • Maintain various daily logs for a variety of administrative functions associated with document control.
  • Supervised seven contractor support personnel with respect to SAP security and document control procedures.
  • Generated courier letters, executed document/media destruction, and other various document control functions.
  • Managed the JSF Document Control Database and distributed classified correspondence, including hardware/disks/media.
  • Received and transmitted collateral classified information utilizing An in-house document control system.
  • Managed document control and served as classification management for sponsor documents.
  • Perform classified document control functions including document transmittal preparation and packaging.
  • Managed classified document control, classification management and processing.
  • Maintained material control systems and assigned document control numbers.
  • Classified Security Specialists worked closely with Document Control.
  • Maintain and operate document control register/database.

Show More

43. CPR

low Demand
Here's how CPR is used in Security Specialist jobs:
  • Trained in the use of armed and unarmed defensive tactics, hand-to-hand combat, evasive driving, surveillance techniques and CPR.
  • Conduct presentations during CPR classes on VA policies regarding medical emergencies, disbursement of rapid response teams, and 911's.
  • Respond to emergency situations and provide First Aid and CPR as needed and if necessary contacting emergency services for assistance.
  • Distributed medication as prescribed and administer first aid and CPR as required with the officer of the day.
  • Certified by the American Heart Association for adult / child first aid, CPR, and AED.
  • Develop, plan, and conduct initial training and continuing training for CPRP Certifying/Administration Officials.
  • Performed skills evaluations according to American Heart Association guidelines to certify CPR and AED use.
  • Assisted in medical emergencies by applying CPR, first-aid, and other life-saving procedures.
  • Handled employees' and visitors' medical needs by providing CPR and First Aid.
  • Completed Certifications in AED, First Aide, and CPR to retain my position.
  • Monitor Campus on computer, provide first aid and CPR should circumstances warrant such.
  • Trained in CPR, and the use of First-Aid equipment, and AED Operation.
  • Certified annually in First Aid/CPR/AED, HIPAA, CBT Safety and fire extinguisher training.
  • Prepared CPRL Add/Modify/Delete forms for new and terminating employees as required per contract.
  • Provide CPR and First Aid to student and adult population when deem necessary.
  • Administered immediate medical attention and acquired my CPR/First-Aid & AED Certification through AHA.
  • Completed CPR course and honed cardiac arrest saving techniques enhancing first response capabilities.
  • Distribute medications as prescribed and administer first aide and CPR as required.
  • Retain a current certification in CPR, AED, and First Aid.
  • Certified in CPR, First Aid & AED (Automated External Defibrillator)

Show More

44. Daily Activities

low Demand
Here's how Daily Activities is used in Security Specialist jobs:
  • Managed administrative support for the daily activities needed in transitioning the analytic workforce from legacy tools to an enterprise capability.
  • Provide management with reports that reflect daily activities noted by individual officers.
  • Coordinate daily activities to Control Center Operators.
  • Reported all daily activities to management.
  • Provided a monthly report to the OPS Security Branch Chief on daily activities and updated statuses on pending cases submitted.
  • Write reports of daily activities, property damage, theft, presence of unauthorized persons, or unusual occurrences.
  • Write reports of daily activities and irregularities, such as equipment or property damage, theft and unusual occurrences.
  • Write reports of daily activities and irregularities such as; theft, fire, rocket or ground attacks.
  • Documented, and maintained a 24 hour security event log involving sensitive data, and daily activities.
  • Used Microsoft Word, Excel, Access, Outlook and PowerPoint for daily activities.
  • Monitored their daily activities, interactions and any out of normal behaviors.
  • Recorded reports of daily activities such as property damage or unusual occurrences.
  • Transported patients to and from classes and daily activities.
  • Complete records and other logs for daily activities.
  • Provided support to GSI leads and Security Coordinators in daily activities established by the customers requirements.
  • Record daily activities and submit logs and other related reports and paperwork to appropriate authorities.
  • Structure the client's daily activities, coordinating deliveries, processing new arrivals and visitors.
  • Answer multi phone system, record daily activities in computer log.
  • Write reports of daily activities in a log book, responsible contacting Nypd, Fdny, EMS in case of emergancies.

Show More

45. Government Agencies

low Demand
Here's how Government Agencies is used in Security Specialist jobs:
  • Prepare and submit status reports to applicable government agencies, with review as appropriate from security management and/or Company management.
  • Educated businesses, institutions and government agencies on policies and solutions for document security issues.
  • Provide support/assistance FNS Executive Team, Project Managers and Security Personnel at various government agencies.
  • Communicate directly with representatives from three letter government agencies to ensure transparency during unique situations.
  • Managed relationships with third-party contractors, external government agencies, and community leaders.
  • Provide assistance to Verizon Project Managers and Security Personnel at various government agencies.
  • Maintain open lines of communication with various government agencies and security professionals.
  • Process employee security clearance requests for submission to appropriate government agencies.
  • Compose consolidated reports for government agencies to facilitate risk mitigation.
  • Interfaced with appropriate government agencies relating to industrial security.
  • Coordinate with government agencies on industrial security matters.
  • Coordinated security issues with high-level government agencies.
  • Determine suitability recommendations based on reports of investigations that were submitted by OPM, DSS and other government and non-government agencies.
  • Verify security clearances for all incoming visitors using JPAS or visit requests from government agencies, and maintaining access control.
  • Recruit promoters such as health care providers, home health agencies and government agencies and serve as point of contact.
  • Collaborate with numerous government agencies to confirm security clearances and convert them to Computer Sciences Corp Federal Sector employees.
  • Search, distribute, and retrieve, personnel security records and files throughout DIA and other government agencies.
  • Developed and implemented security policies and direction consistent with company and other government agencies directives (NOAA).
  • Coordinated 10 government agencies in port security operations for 3rd largest commercial port in the United States.
  • Work with other government agencies to manage White House Access by providing weekly reports and statistical data.

Show More

46. Security Support

low Demand
Here's how Security Support is used in Security Specialist jobs:
  • Provide security support for all aspects of programs including personnel records, document control, security compliance and administrative support.
  • Provided operational, technical security support to American Embassy staff personnel supporting regional Engineering Service Centers and Security Engineering Officers.
  • Provided security support that ensured individual and organizational protection throughout a combat zone; impacted national relations and growth.
  • Conducted security reviews at facilities within area of responsibility to maintain an optimum level of security support and awareness.
  • Volunteered to provide security support for senior level military and civilian personnel consistently resulting in incident free ceremonies.
  • Provided emergency response team security support for high-ranking officials including the U.S. Vice President and Secretary of Defense.
  • Provided security support in personnel security, physical security, office administration, and visitor control.
  • Program security support to National Programs communications engineering staff in meeting new communications network requirements.
  • Provided high-level security support concerning air base law enforcement and secret-level flight-line security operations.
  • Provided professional security support to fifteen customer programs with varying sponsorship and requirements.
  • Provided special security support to sensitive programs and facilities throughout the Laboratory.
  • Provide administrative support services for the Environmental Protection Agency Security Support Contract.
  • Provided direct security support to management team and U.S. government agency counterparts.
  • Served in Operation Enduring Freedom, providing military security support.
  • Provided security support for multiple agencies within a vaulted environment.
  • Oversee technical and administrative security support staffs and functions.
  • Provided closed-in armed security support for highly sensitive material.
  • Provide security support for the Department of Homeland Security.
  • Provided security support to the Director of Corporate security.
  • Provide security support by monitoring a weekend basketball league.

Show More

47. DSS

low Demand
Here's how DSS is used in Security Specialist jobs:
  • Achieved a DSS Commendable rating during the organization's annual Security Vulnerability Assessment.
  • Provided assistance to DSS Personnel with annual auditing requirements.
  • Complete EFCL packages for facility clearances via DSS and successfully passed DSS inspections of managed facilities with a rating of Commendable.
  • Managed all security issues with employees, Defense Security Services (DSS) and Office of Personnel Management (OPM).
  • Marketed DSS as their partner in dealing with these issues and creating document policies in order to minimize scrutiny.
  • Prepare for and assist FSO and ISSM with facilities periodic security audits, and interface with DSS during reviews.
  • Verify classified mailing addresses and cage codes using the DSS Industrial Security Facilities Database (ISFD system).
  • Assisted Senior Security Staff with preparing the necessary paperwork in support of a DSS investigation or annual visit.
  • Coordinated with DSS and contractors for inspection contractor facilities to assure compliance with government regulations and NISPOM.
  • Conduct safe audits to prepare for the DSS inspection to ensure classified material is marked properly.
  • Implemented the EPSQ program on the RCI system in order to transmit information directly to DSS.
  • Maintain written and automated requirement and official facility records of all companies under the DSS cognizant.
  • Participated in company IPT s, team meetings, program meetings and annual DSS inspections.
  • Report Security Violation of any sort to DSS Security and take appropriate action if necessary.
  • Conduct Self Inspection to prepare for yearly DSS Inspection and update Classified Contracts List.
  • Completed DSS(CDSE)Course Introduction to Special Access Programs in 2012.
  • Conduct security inspections of Special Access Programs (SAP) under DSS cognizance.
  • Receive, process, and distribute personnel investigative reports from OPM and DSS.
  • Coordinated Defense Security Service (DSS) annual CI representative Threat Awareness Training.
  • Updated security and registry manuals and am highly proficient with DSS JPAS system.

Show More

48. Sensitive Information

low Demand
Here's how Sensitive Information is used in Security Specialist jobs:
  • Planned, organized, and/or conducted program briefings instructing program personnel on the proper procedures of protecting sensitive information.
  • Assured non-cleared personnel and visitors properly escorted, helped in protecting employee's property and sensitive information.
  • Generated inspection reports outlining vulnerabilities and directed corrective actions to prevent loss or compromise of sensitive information.
  • Conducted preliminary inquiries into any loss, compromise, or suspected compromise of classified and/or sensitive information.
  • Facilitate timely sensitive information sharing and emergency planning and notification between the Embassy and required personnel...
  • Denied and safeguarded access to sensitive information, material and areas to all unauthorized personnel.
  • Conduct investigations into policy and regulatory violations in the protection of sensitive information.
  • Supervised security teams responsible for safeguarding our nation's assets and sensitive information.
  • Inspected Catering Services Process, recorded and delivered sensitive information as courier.
  • Analyze to determine appropriate FDOT response and disseminate sensitive information as required.
  • Handled extremely sensitive information using appropriate protocol in storing and delivering methods.
  • Managed sensitive information and issues concerning confidential subject matter with discretion.
  • Perform within the guidelines of confidentiality and handling sensitive information.
  • Developed specialized expertise in electronically procuring or protecting sensitive information.
  • Determined eligibility for access to classified or sensitive information.
  • Handled confidential and sensitive information when processing paperwork.
  • Protect and control classified and sensitive information.
  • Prevented invasive electronics from obtaining sensitive information.
  • Secured sensitive information for high profile representatives.
  • Process and protect sensitive information.

Show More

49. Ensure Security

low Demand
Here's how Ensure Security is used in Security Specialist jobs:
  • Developed and implemented plans to ensure security capabilities, vulnerability assessments with completion of applicable forms and reports.
  • Conducted program orientations and debriefings to ensure security awareness across all appropriate levels of personnel population.
  • Provide excellent customer service support to Program Offices to ensure security clearance request were processed expeditiously.
  • Performed risk and vulnerability assessments and network scanning to ensure security measures are appropriate and effective.
  • Identify and counter vulnerabilities in garrison and off-site locations to ensure security regulatory requirements are met.
  • Served as daily liaison with external alarm monitoring facility to ensure security of controlled areas.
  • Developed and analyzed models to ensure security needs for commercial and residential sites.
  • Communicate with leadership and personnel to ensure security of pharmacy and personnel.
  • Patrolled industrial and commercial premises to prevent and detect signs of intrusion and ensure security of doors, windows and gates.
  • Inspect Equipment, sign offs, doors, and gates at correctional facilities to ensure security and help prevent escapes.
  • Conducted security inspections for Department of Defense cleared contractor facilities to ensure security programs were in compliance with NISPOM.
  • Contracted by various businesses to ensure security of locations as well as clients at various public and private events
  • Worked with other IT groups to ensure Security policy and procedures are met concerning PKI implementations and usage.
  • Conducted routine patrols of naval installations, facilities and buildings to ensure security measures were being adhered to.
  • Respond to building alarms and ensure security of over 5 billion dollars in government assets.
  • Patrol industrial and commercial premises to prevent and detect intrusion as well as ensure security.
  • Assist with quarterly audits to ensure security records are up to date.
  • Conduct roving patrols on foot to ensure security of federal property.
  • Inspect Airline catering food and supply carts to ensure Security measures.
  • Downloaded credit card machine devices to ensure security was not breached.

Show More

50. Security Checks

low Demand
Here's how Security Checks is used in Security Specialist jobs:
  • Performed laboratory-wide security checks, including wireless access point scans, perimeter checks, and restricted area inspections.
  • Maintained communication with the internal security and Arlington County Police while conducting security checks throughout the area.
  • Performed physical security checks of live fire gunnery ranges while under the supervision of a military police battalion
  • Perform end-of-day security checks to maintain integrity of storage areas and classified material.
  • Reviewed Security Police Blotters daily, ensured required Physical Security checks were annotated.
  • Conducted after hours routine security checks around secured/unsecured areas assigned by the contractor.
  • Conducted monthly security checks for physical security of facility inside and out.
  • Assess incoming personnel for suitability issues through interview and various security checks.
  • Conducted hourly security checks and provided access control and alarm monitoring.
  • Manage criminal history and national agency security checks as required.
  • Conduct security checks and implementing preventative ways to minimized lost.
  • Conduct background investigations and safety and security checks.
  • Performed daily security checks while performing guard shift
  • Conducted internal security checks of entire property.
  • Lead security force patrols, responded to alarms, conduct security checks, controlled access to high priority areas.
  • Conducted entry point access, vehicle searches, and random security checks aboard military installation encompassing 10K+ personnel.
  • Make security checks, daily counting of residents - also responsible for checking resident's rooms daily.
  • Implement resource protection/loss prevention requirements, and conduct security checks of personnel, grounds, and facilities.
  • Coordinate and manage a Staff Duty Roster for end-of-day security checks consisting of 36 staff members.
  • Conduct security checks of DynCorp grounds/facilities to prevent theft, violence, or infractions of rules.

Show More

20 Most Common Skill for a Security Specialist

Security Personnel22.1%
Security Procedures13%
Public Safety10.8%
Emergency Situations7%
Security Clearance5.1%
Access Control4.2%
Security Program4.1%
Law Enforcement4%

Typical Skill-Sets Required For A Security Specialist

RankSkillPercentage of ResumesPercentage
1
1
Security Personnel
Security Personnel
17.5%
17.5%
2
2
Security Procedures
Security Procedures
10.3%
10.3%
3
3
Public Safety
Public Safety
8.5%
8.5%
4
4
Emergency Situations
Emergency Situations
5.5%
5.5%
5
5
Security Clearance
Security Clearance
4%
4%
6
6
Access Control
Access Control
3.3%
3.3%
7
7
Security Program
Security Program
3.2%
3.2%
8
8
Law Enforcement
Law Enforcement
3.2%
3.2%
9
9
Data Entry
Data Entry
3.1%
3.1%
10
10
Customer Service
Customer Service
3%
3%
11
11
Security Policies
Security Policies
2.8%
2.8%
12
12
Security Systems
Security Systems
2.1%
2.1%
13
13
Cctv
Cctv
2%
2%
14
14
DOD
DOD
1.9%
1.9%
15
15
SCI
SCI
1.7%
1.7%
16
16
Jpas
Jpas
1.6%
1.6%
17
17
Security Operations
Security Operations
1.6%
1.6%
18
18
Information Security
Information Security
1.4%
1.4%
19
19
Incident Reports
Incident Reports
1.2%
1.2%
20
20
Security Requirements
Security Requirements
1%
1%
21
21
Suspicious Activity
Suspicious Activity
1%
1%
22
22
Security Issues
Security Issues
1%
1%
23
23
Nispom
Nispom
0.9%
0.9%
24
24
Ensure Compliance
Ensure Compliance
0.9%
0.9%
25
25
Security Services
Security Services
0.9%
0.9%
26
26
TSA
TSA
0.8%
0.8%
27
27
Security Awareness
Security Awareness
0.8%
0.8%
28
28
Commander
Commander
0.8%
0.8%
29
29
Security Training
Security Training
0.8%
0.8%
30
30
Comsec
Comsec
0.8%
0.8%
31
31
Joint Personnel
Joint Personnel
0.7%
0.7%
32
32
Alarm Systems
Alarm Systems
0.7%
0.7%
33
33
Security Management
Security Management
0.7%
0.7%
34
34
Security Education
Security Education
0.7%
0.7%
35
35
Special Access
Special Access
0.7%
0.7%
36
36
Crowd Control
Crowd Control
0.6%
0.6%
37
37
Security Violations
Security Violations
0.6%
0.6%
38
38
Adjudication System
Adjudication System
0.6%
0.6%
39
39
Security Briefings
Security Briefings
0.6%
0.6%
40
40
Security Incidents
Security Incidents
0.6%
0.6%
41
41
Background Checks
Background Checks
0.6%
0.6%
42
42
Document Control
Document Control
0.6%
0.6%
43
43
CPR
CPR
0.6%
0.6%
44
44
Daily Activities
Daily Activities
0.6%
0.6%
45
45
Government Agencies
Government Agencies
0.6%
0.6%
46
46
Security Support
Security Support
0.6%
0.6%
47
47
DSS
DSS
0.5%
0.5%
48
48
Sensitive Information
Sensitive Information
0.5%
0.5%
49
49
Ensure Security
Ensure Security
0.5%
0.5%
50
50
Security Checks
Security Checks
0.5%
0.5%

36,949 Security Specialist Jobs

Where do you want to work?