WHAT DOES A SECURITY DO?

Published: Dec 15, 2025 - The Security Professional is responsible for protecting an organization’s assets, personnel, and systems by implementing and monitoring effective security protocols. This role involves assessing risks, responding to incidents, and ensuring compliance with relevant security standards and policies. The individual also collaborates with internal teams and external agencies to maintain a secure environment and promote ongoing security awareness.

A Review of Professional Skills and Functions for Security

1. IT Security Administrator Details

  • Security Solutions: Create, design, optimize, and implement integrated security technology platform solutions.
  • Infrastructure Protection: Identify, prioritize, and coordinate the protection of critical cyber defense infrastructure and key resources.
  • Risk Coordination: Coordinate with appropriate departments to ensure appropriate actions are taken to minimize security risks.
  • Security Oversight: Oversees all security applications and tools.
  • Employee Support: Provides insight, guidance, and support for employees' onboarding, changes, and termination.
  • Training Implementation: Implements all security training and phishing simulation requirements.
  • Patch Management: Manages patch and update requirements for security systems and services.
  • Alert Support: Supports alert review and remediation for multiple security monitoring products.
  • Access Control: Supports the IT Team with physical access control management and oversight.
  • Task Administration: Take on administrative-level tasks independently with limited supervision.

2. Security Agent Responsibilities

  • Access Control: Control access to parking gates
  • Staff Verification: Control access to temporary staff, visitors, deliverers, and subcontractors
  • Dock Management: Control access to goods delivery docks and receive deliveries according to the system in place
  • Breach Reporting: Report any security breaches immediately.
  • Safety Rounds: Conduct exterior and interior rounds at the frequency specified by the safety manager
  • Safety Reporting: Report any situation that may affect the safety of people and places.
  • Rule Enforcement: Inform occupants of the rules issued by Hypertec and intervene when it detects a breach of the rules.
  • Discrepancy Documentation: Document any discrepancies to properly follow up on the advice given.
  • Camera Monitoring: Monitor cameras to quickly detect abnormal situations.
  • Alarm Monitoring: Monitor the alarm panel and intervene in alarms.
  • Incident Escalation: Immediately refer to the superiors in situations beyond the control.
  • Emergency Response: Respond to fires, medical emergencies, bomb threats, floods, water leaks, breakdowns, the presence of hazardous materials, and bad weather
  • Document Filing: File and storage of internal documents

3. Security Analyst Accountabilities

  • Log Review: Review and assess security logs, performing daily, weekly, and monthly log reviews
  • Vulnerability Scanning: Coordinate, perform, and assess vulnerability scans.
  • Ticket Management: Create and manage tickets to remediate vulnerabilities and address security events
  • Incident Reporting: Create Security Incident Reports
  • Incident Response: Respond to Security Incidents
  • Violation Investigation: Respond to security incidents, investigate, and report security violations and incidents.
  • Incident Documentation: Document when an incident or vulnerability has been discovered within a system.
  • Customer Assessment: Respond to and answer customer security assessments
  • Incident Escalation: Report all security-related incidents to the appropriate internal and external officials.
  • System Auditing: Conduct periodic information system audits, log analysis, and procedural reviews to verify compliance with the security policies.
  • Review Coordination: Coordinate periodic reviews and inspections as established in the certification and accreditation documentation.

4. Security Architect Functions

  • Architectural Design: Complete architectural designs on innovative new projects and improve existing business processes and IT systems to ensure security is developed from the ground up.
  • Security Expertise: Coordinate and work with cross-functional and development units as a Security Subject Matter Expert
  • Requirement Development: Develop security non-functional requirements and design patterns, supporting the IT and Application Architects
  • Threat Modelling: Support Threat Modelling workshops across all applications and infrastructure within the company.
  • Security Documentation: Create or modify security documentation for systems
  • Security Recommendations: Present security recommendations and implement improvements to the security of new or existing applications, services, and infrastructure.
  • Practice Definition: Define security practices and standards to ensure that the security of applications, services, and infrastructure is delivered to meet the needs of the business.
  • System Understanding: Clear understanding of complex software and system interactions
  • Secure Architecture: Deliver thoroughly secure system architectures
  • Threat Knowledge: Knowledge across threat modelling applications, services, and infrastructure
  • Design Review: Review engineering designs and enhance security solutions against company standards

5. Security Assistant Overview

  • Security Advising: Serves as principal advisor to the Government Security Officer on security matters.
  • Clearance Management: Ensures personnel are appropriately cleared commensurate with position, and that timely action is taken when significant adverse information arises.
  • Material Safeguarding: Ensures procedures are implemented for the proper safeguarding of classified material received by, stored within, and transmitted from the facility.
  • Violation Handling: Provides for complete and timely action in regard to security violations/incidents and resulting inquiries/investigations.
  • SCI Advising: Serves as principal advisor to the facility SIO in all matters relevant to SCI.
  • Education Oversight: Oversees and tracks both the general security and network security education programs for all occupants of the facility.
  • Visit Coordination: Coordinates with contractor Facility Security Officers to ensure personnel collateral clearances are passed for visit requests.
  • Request Assistance: Assists in processing visit requests for incoming and outgoing personnel.
  • Alarm Checks: Performs the facility security alarm checks.
  • Record Maintenance: Maintains security records for all Program personnel.

6. Security Associate Details and Accountabilities

  • Building Security: Maintain internal and perimeter security of the building
  • Environmental Safety: Maintain a safe/secure environment for all customers, patients, guests, employees, and vendors
  • Premise Patrol: Inspect and patrol premises regularly for security and safety issues
  • Access Monitoring: Monitor all access and egress points on the property
  • Entrance Authorization: Authorize the entrance of people and vehicles
  • Camera Monitoring: Monitor surveillance cameras
  • Alarm Response: Respond to applicable alarms in a timely and effective manner
  • Surveillance Reporting: Submit daily surveillance reports
  • Delivery Security: Assist with the physical security for deliveries
  • Personnel Security: Assist with the physical security for any customer or employee
  • Suspicion Reporting: Report any suspicious behaviors or activities, and submit and maintain records of all reports

7. Security Consultant Tasks

  • Cloud Architecture: Lead the design and development of cloud (e.g., Azure) security architectures
  • Security Advice: Provide advice on security requirements from the business unit.
  • Technology Implementation: Manage or support to implementation of security technologies
  • Control Implementation: Manage to implement the company security control
  • MLPS Management: Manage to implement and track MLPS 2.0
  • Process Maintenance: Be responsible for the security operation process maintenance
  • Issue Resolution: Quickly respond, troubleshoot, and implement resolutions for user issues
  • Incident Diagnosis: Take care of troubleshooting and diagnosis to find the root cause of the incident

8. Senior Security Consultant Additional Details

  • Engagement Support: Key member of the teams performing engagements in IT audit, risk management consulting, attestation in HITRUST/PCI/SOC Reporting, etc., and supply finished work product, testing, and reporting.
  • Regulatory Familiarity: Advance the familiarity with pronouncements of the key State, Federal, and International Cybersecurity Regulators.
  • Paper Preparation: Prepare clear and concise working papers and reports to the engagement principal or partner.
  • Recommendation Development: Assess and prepare meaningful and well-written recommendations for inclusion in client correspondence.
  • Issue Identification: Identify issues and apply data protection principles and auditing procedures.
  • Independent Work: Work independently on client projects in and out of the office.
  • Client Relationships: Develop positive working relationships with clients.
  • Question Response: Develop an ability to effectively respond to questions from supervisors and clients.
  • Active Listening: Strengthen the ability to actively listen and question appropriately to gain a full understanding.
  • Report Assistance: Assist in the preparation of reports and testing outcomes.
  • Tool Application: Effectively apply technology tools and software in assigned areas.
  • Service Support: Recognize and proactively support the fact that the firm is in the business of providing quality client service.

9. Security Coordinator Essential Functions

  • Security Expertise: Act as the subject matter expert in regards to interpreting National Industrial Security Program Operating Manual (NISPOM) requirements, preventing unauthorized disclosure of classified, ITAR-controlled, or confidential information.
  • Program Development: Assist in developing/implementing security programs for other sites requiring a facility clearance to do defense work.
  • Requirement Awareness: Ensure functional management and Business management are aware of and understand the principles and expectations associated with the above-mentioned requirements.
  • Process Implementation: Develop and implement security systems/processes meeting the requirements of the NISPOM.
  • Security Training: Develop and deliver security training to Circuit employees.
  • Classified Training: Develop and deliver training to those employees handling classified information/material.
  • Clearance Liaison: Act as liaison with Defense Security Services in gaining personal clearances for employees.
  • Record Maintenance: Maintain security records of all cleared personnel, including briefing/debriefing of cleared personnel traveling outside the United States.
  • Site Evaluation: Evaluate the overall security of the site (security audits).
  • Agency Communication: Communicate with governmental agencies regarding matters of security.
  • Incident Investigation: Investigate all security incidents/violations, develop corrective/preventive actions for these incidents, and submit reports to appropriate federal agencies.
  • System Management: Direct and manage the Information System Security Management system to ensure communication/information security.

10. Security Director Role Purpose

  • Vendor Oversight: Oversee security vendor to ensure compliance with terms of contract, including billing oversight and invoice audits.
  • Manager Supervision: Supervise site vendor security managers to ensure security violations and incidents are observed, investigated, resolved, and reported
  • Operations Development: Continuous development and growth of security operations and staff appearance, training, and conduct.
  • Quality Management: Manage quality control of security operations and ensure security incidents are handled in a comprehensive, diligent, and timely manner.
  • Staff Readiness: Ensure operational readiness of security staff.
  • Bid Development: Develop a competitive bid, standard requirements, and analysis to review and change security vendors.
  • Relationship Building: Build relationships with facility representatives through customer service and relationship building.
  • Staff Development: Supervise professional development of vendor security staff.
  • Plan Delivery: Develop and deliver Emergency Action Plans.
  • Program Proficiency: Become proficient with and assist with the policies and management of the national Emergency Management Program.
  • Continuity Review: Utilize contemporary Business Continuity principles to review and improve upon national readiness.
  • Security Advising: Advise the company on security-related policies, procedures, emergencies, and infrastructure matters.
  • Drill Conducting: Conduct emergency action drills and training.

11. Security Engineer General Responsibilities

  • Strategy Understanding: Developed an understanding of the security strategy and the focus areas
  • Security Contribution: Contribute to improving the cloud security, application security, data security, or corporate security
  • Tool Development: Developed internal tooling to automate security detection and configuration
  • Vulnerability Detection: Improved the ability to detect vulnerabilities in the applications
  • Vendor Vetting: Vet the security posture for third-party vendors
  • Team Partnership: Partner with internal engineering teams to implement projects and respond to ad-hoc requests
  • Alert Monitoring: Monitor and respond to alerts from SIEM and other alerts

12. Security Manager Key Accountabilities

  • System Deployment: Participate in the design and deployment of new software systems, services, components, features, etc.
  • Weakness Mitigation: Develop appropriate plans to proactively mitigate potential security weaknesses.
  • Vulnerability Resolution: Work with internal teams to identify and resolve vulnerabilities continuously
  • Security Training: Develop and deliver ongoing training/awareness programs throughout the company to ensure all staff and appropriate contracted staff are aware of policies, common risks, and how to identify and respond to potential security incidents
  • Compliance Partnership: Partner with external security teams to ensure compliance with network requirements
  • Client Relations: Foster and maintain strong relationships with client teams
  • Application Management: Work alongside the infrastructure and marketing operations teams to assess, design, implement, and manage enterprise applications
  • Workflow Redesign: Review and redesign existing workflows to create operational efficiencies
  • Trend Monitoring: Maintain up-to-date knowledge of emerging security trends, risks, new guidance or standards (internal and external), and security-enhancing technologies
  • Metric Reporting: Collect, analyze, and report security metrics (incident and performance-based) that demonstrate security’s impact and risk reduction
  • Policy Enforcement: Develop, maintain, and enforce information security policies, standards, and procedures
  • Risk Communication: Communicate security posture, risks, and concerns to executive-level audiences

13. Security Supervisor Roles and Details

  • Team Leadership: Leadership of the Security Team
  • Team Professionalism: Maintaining a professional level of the team
  • Roster Management: Management of rosters and timesheets
  • Team Communication: Communication with other team members and management
  • Loss Prevention: Supporting the Loss Prevention Team
  • Service Provision: Providing an exceptional level of service to all staff and visitors to the site
  • Emergency Contact: Serving as the point of contact for all emergencies
  • CCTV Operation: Operating and controlling the CCTV system
  • Site Patrols: Ensuring regular patrols of the site while ensuring all standards are maintained
  • Rota Management: Managing team rotas and timegate systems