Search

Proof of Competency

Applicants must select at least one sub-discipline for assessment. Evidence of competency against each selected sub-discipline must be provided.

Due to the nature of professional security services, 'sanitised' or redacted documents may be accepted.

All items of evidence must be accompanied by the contact details of a person who can confirm the applicant's involvement in the provided, or similar, activity.


Examples for the selected security sub-disciplines

The following are indications of elements of each security sub-discipline and are not exclusive:

Physical Security, including:

Identification of Assets

  • Assessment of importance and value
  • Asset interrelationships 

Identification of Physical Vulnerabilities

  • Asset attributes
  • Location
  • Accessibility

Design of Protective Systems

  • Perimeter design and mitigations
  • Hardware integration
  • Surveillance system integration
  • Guardpost and control room design
  • Alert and warning systems

Integration with Building and Other Systems

  • Communications systems
  • IT systems
  • Fire and emergency alarm systems
  • Personnel systems

Security Engineering

  • Design and integration of security hardware and systems
  • integrating various mitigations into protective design solution
  • integration of security engineering with building design (including CPTED)

Selection of Appropriate Security Technologies

  • Security specific project management
  • Security implementation and training

Personnel Security, including:

  • Authorisation of access to assets
  • Selection of appropriate personnel for tasks/responsibilities
  • Vetting
  • Security-specific investigation management
  • Personal protective planning
  • Protective security briefings
  • Security training

Information/Communications Security, including:

  • Protection of ITC systems
  • Security design of systems
  • ITC security training
  • Integration of security with other systems
  • Protection of written and verbal communications
  • Meeting security (audio/electronic counter measures)

Security Risk Management, including:

  • Defining the Security Context
  • Identification of Asset Value and Attractiveness
  • Identifying Threats
  • Determining Vulnerabilities
  • Analysis of Risks
  • Development of Appropriate Mitigation measures
  • Planning and Managing Risk Management plans
  • Allocation of security resources
  • Integration with other organisation functions

Security Enterprise Management, including:

  • Managing security functions
  • Developing security-specific policies, procedures, training, and assurance systems
  • Integrating security with other organisation functions
  • Providing leadership in the security field
  • Shaping the security knowledge environment ( e.g., publishing of security-specific articles, presentations, etc.,)

<Previous                                                                                                                                         Next>