Security Guards and Related Occupations
Security guards and related occupations guard property against theft and vandalism, control access to establishments, maintain order and enforce regulations at public events and within establishments.
 
Security Activities
Reading
Read information sheets, e.g. read information sheets to learn security and surveillance techniques for underpasses and tunnels. (Complexity: 2)
Read instructions and best practice procedures, e.g. read emergency response procedures to learn how to correctly respond to medical emergencies, fires, hazardous material spills, bomb threats, hostage situations, storms, gas leaks and acts of terrorism. (Complexity: 2)
Read short reports, e.g. read short reports to learn the details of security incidents. (Complexity: 2)
Read security alerts and bulletins, e.g. read detailed security bulletins issued by police departments to learn about potential terrorist threats and how to report suspicious activities. (Complexity: 3)
May read regulations, e.g. read sections of the Trespass Act to learn which premises are covered by the legislation. (Complexity: 4)
Document Use
May interpret maps and floor plans, e.g. interpret floor plans to locate entrances, exits and security threats. (Complexity: 2)
Oral Communication
Make and listen to announcements over two-way radios. (Complexity: 1)
Talk to members of the public when providing access to a building or grounds. (Complexity: 1)
Talk to suppliers and delivery personnel, e.g. talk to delivery personnel to determine the content of parcels. (Complexity: 1)
Discuss building security with clients and building owners, e.g. discuss security concerns and the features and limitations of electronic surveillance systems with building owners. (Complexity: 2)
Exchange information with co-workers, e.g. speak with co-workers to coordinate activities and learn about incidents. (Complexity: 2)
Defuse and de-escalate confrontations with hostile and uncooperative people, e.g. use appropriate language, gestures and tone of voice to de-escalate potentially violent situations. (Complexity: 3)
Provide detailed descriptions of events and people, e.g. provide police officers with detailed accounts of events that occurred during robberies. (Complexity: 3)
Writing
Write short text passages in log books, e.g. describe noteworthy incidents in log books at the end of shifts. (Complexity: 2)
May write detailed accounts of incidents, e.g. write detailed accounts of events involving people in distress, violence, thefts and security breaches. (Complexity: 3)
Thinking
May choose routes, areas and locations to patrol. (Complexity: 1)
Decide the order of tasks and their priorities, e.g. decide the order in which to conduct security sweeps using the best available information. (Complexity: 2)
Evaluate the operating condition of equipment, e.g. evaluate the operation of surveillance equipment by considering factors, such as the quality and usefulness of images and recordings. (Complexity: 2)
Choose security and emergency response measures, e.g. decide how to safely and effectively contend with suspicious activities, intruders and thefts. (Complexity: 3)
Evaluate safety and security threats. They consider the behaviour of people and the risks to property and bystanders. They observe the location of exits and take note of burned out lights, blocked emergency exits and other potential hazards. (Complexity: 3)
Evaluate the severity of emergencies. They evaluate the condition of people in physical and emotional distress to determine the most appropriate course of action. (Complexity: 3)
Numeracy - Measurement and Calculation Math
May measure distances at accident and crime scenes. (Complexity: 1)
Numeracy - Numerical Estimation
Estimate the height and weight of people. (Complexity: 1)
Estimate the extent of damage at accident and crime scenes. (Complexity: 2)
 
General Administrative Activities
Reading
Read log book entries and short notes, e.g. read log book entries and short notes from co-workers to learn about events that occurred during other shifts. (Complexity: 1)
Read short instructions on forms, e.g. read short instructions to learn how to complete incident report forms. (Complexity: 1)
Read email and memos, e.g. read email messages and memos from supervisors to learn about changes to operating procedures and schedules. (Complexity: 2)
Document Use
Enter data into daily logs, e.g. enter data, such as equipment identification numbers, times, odometer readings, addresses and locations, into log books. (Complexity: 1)
Locate data in lists and logs, e.g. locate the names of authorized visitors, dates and times of incidents in daily logs. (Complexity: 1)
Complete a variety of forms, e.g. enter information, such as names, dates and times, in incident report forms. (Complexity: 2)
Writing
Write reminder notes to themselves about tasks to be completed. (Complexity: 1)
Write short notes to co-workers, e.g. write short notes to co-workers to inform them about faulty video display units. (Complexity: 1)
Enter comments on a variety of forms, e.g. write comments in fire alarm and police statement forms. (Complexity: 2)
Numeracy - Money Math
May pay for cash-on-delivery parcels and receive change. (Complexity: 1)
Numeracy - Scheduling, Budgeting and Accounting Math
May record totals of denominations of money delivered to banks or bank machines by armoured cars, keeping separate totals for American or other foreign currency. (Complexity: 1)
Numeracy - Data Analysis
May calculate summary statistics, e.g. calculate the number of false alarms received each month. (Complexity: 2)
 
Use of Technology, Tools and Equipment
Reading
Read equipment and operating manuals, e.g. read operating manuals for the set-up and use of electronic surveillance equipment. (Complexity: 3)
Document Use
May study images generated by security cameras and scanners, e.g. study X-ray images produced by scanners to locate prohibited goods, such as knives, explosives and firearms. (Complexity: 2)
Digital Technology - Word Processing
May use word processing software to prepare reports. (Complexity: 2)
Digital Technology - Databases
May use databases to retrieve client information, such as names, addresses and telephone numbers. (Complexity: 2)
May use specialized security databases to retrieve previously completed incident reports and input new ones. (Complexity: 2)
Digital Technology - Communication Software
May use communication software to exchange email with clients, building owners and co-workers. (Complexity: 2)
Digital Technology - Internet
May use specialized Internet applications to complete and submit electronic incident reports. (Complexity: 2)
May use the Internet to access security alerts and bulletins issued by police departments and other security organizations. (Complexity: 2)
May use the Internet to access training courses and seminars offered by trainers, suppliers, colleges, employers and associations. (Complexity: 3)
Digital Skills - Other Digital Technology
May use X-ray scanners and metal detectors to locate prohibited goods, such as knives, explosives and firearms, in packages and concealed under clothing. (Complexity: 1)
May use electronic surveillance equipment to monitor codes, alarm systems, buildings and the activities of people. (Complexity: 1)
Use calculators and personal digital assistant (PDA) devices to complete numeracy-related tasks, such as summing the value of bank deposits. (Complexity: 1)
May use electronic surveillance equipment to produce VHS, CD-ROM and DVD copies of surveillance footage captured by security cameras. (Complexity: 2)