JOB PROFILE NAME:
Security Officer LINE MANAGED BY:
Facilities Service Manager PROFESSIONALLY REPORTS TO:
Facilities Service Manager
ROLE OVERVIEW Reporting to the Facilities Service Manager, the role of Security Officer involves working with a team of security guards to provide an efficient and professional security service to everybody on site. This is a permanent opportunity working various shifts. PURPOSE OF THE JOB The Security Guard is responsible for ensuring that all staff and visitors are in a safe and secure environment. KEY OBJECTIVES OF THE JOB
- Provide a professional, efficient, and approachable security service whilst maintaining a high level of customer service to staff and visitors at all times.
- Carry out internal and external patrols, day and night to ensure a safe and secure environment, recording maintenance issues, potential breaches of security or unusual occurrences in the Daily occurrence book .
- To provide visitors to BT, with helpful advice, guidance and information and if not able to do so, direct to other members of staff who can assist.
- Ensure that those who should not be granted access to the building are professionally and politely prevented from gaining access or escorted from the building.
- Provide support in an emergency or evacuation situation, in a calm and professional manner. Actively provide information to any emergency services when requested to do so.
- As part of the team undertake regular testing of fire alarms and other security equipment, completing the appropriate logs, and notifying the Facilities Service Manager of any issues of malfunctioning equipment.
- Ensure and regularly check that all fire exit doors are maintained free of obstructions, reporting any defects or maintenance issues as appropriate.
- Monitor and respond immediately to alarm system activations to check designated areas of concern. Effectively use the PA system to notify BT staff and patrons of situations or actions required of them.
- Ensure that BT s CCTV system is professionally, effectively and sensitively monitored in compliance with BT s agreed standards.
- Conduct individual bag or property searches, if directed to do so by the Security Manager or other senior manager.
- Ensure the effective control and maintenance of keys and security equipment including any equipment e.g. radios.
- Conduct routine security administration including the issue of staff and visitor passes.
Ensure that any lost property left is securely stored, recorded and retrieved for the owner where appropriate.
- Maintain all security related equipment and working areas to a high standard of cleanliness and safety and ensure all defects are reported.
- Complete relevant records and log books, in a professional manner providing sufficient detail.
- Where necessary assist in the removal or escort of members of the public from the building where their behaviour is disruptive or presents a risk to others.
- Support and comply with the Fire, Health and Safety, and Security policies and procedures.
- Undertake first aid training and provide first aid services to staff, visitors or patrons as requested.
- Working with a Building Service Technician or Fire Officer, carry out the evacuation of people from lifts, to minimise panic and ensure the safety of all concerned.
- Assist in the induction and training of new members of the team.
- Deal with any suspicious packages, maintaining own and others safety and dealing with these in accordance with BT procedures.
- Actively maintain the confidentiality of information to which Officers will be privy, be this around individuals or security sensitive information in relation to the Building, and using appropriate language, particularly within the public door working environment.
- Undertake any other duties as may reasonably be required by the Security Manager, Facilities Manager and/or BT management.
- Adhere to company policies, including PPE Procedures
- May be required from time to time to support the FM team
- The colleague must understand their environmental responsibilities and follow the BTFS environmental policy.
They must follow BTFS procedures and routines correctly to make sure that their work is in line with the environmental policy and support the business in achieving its environmental objectives.
- Responsible for the completion of a variety of straightforward, stand-alone tasks or high-volume transactions within set rules and instructions
- Takes instruction and will be subject to regular local supervision of progress against results and escalates issues when required
- Likely to be a member of a team that focuses on day-to-day routine tasks
- Responsible for the delivery of their own defined set of work including planning and decision-making
- Interacts with stakeholders around specific work efforts and deliverables
- Supports delivery of Health and Safety policy and standards
- Plays a role in a One Team approach, assisting other departments when possible
- Has awareness of cost/benefit as applicable to tasks performed
- Not typically responsible for supervising others- if they do, spends more than 80% of time as a team member rather than supervisor
- Not responsible for the development of others
KNOWLEDGE AND APPLIED SKILLS
- Able to perform role to the required standard within a short period after completion of training
- Current first aid certificate from a recognised Institution
- Current SIA essential
- Capable of using the Microsoft Office packages (Work, Excel, Outlook) and generally IT literate with knowledge of electronic security systems.
People Success Factors:
- Planning & Organising
- Building Relationships
- Delivery through People
- Business Awareness
- Customer Focus
- Contributing to Continuous Improvement
- Dealing with Change
- Be customer focused with a smart presentable appearance and willing to uphold the BT s customer service approach
- Strong verbal and written communication skills
- Excellent inter-personal skills
- Security experience preferably as part of an in-house team
- Ability to maintain a sense of calm and control in difficult situations, minimising panic in others
- Reliable with excellent timekeeping
- Ability to use initiative and be adaptable
- Self-motivated with a willing and friendly approach
- Willingness to undertake a flexible shift pattern, to include night shifts in accordance with BT Sport s roster
- Ability to respond appropriately to alarms
- A good knowledge and appreciation of current security environments, the potential risks and threats and actions to mitigate these
ADDITIONAL ROLE INFORMATION
- To liaise daily with your Line Manager reporting to them any information relevant to the provision of the service
- Good communication skills
- Understanding of security specification
- Ability to work as a team
- Health and Safety awareness
- To perform any other duties which may be reasonably required by your Line Manager or the company
He/she may be required to attend any training at the company s request.
To apply please send your CV to Rachel.email@example.com
TECHNOLOGY companies must allow the security services access to messages in times of emergency, Home Secretary Amber Rudd has said. It follows reports that Khalid Masood, the man responsible for the terrorist attack in London on Wednesday, used the WhatsApp service to send someone a message just three minutes before he mowed down 40 people on Westminster Bridge. The inbuilt encryption of WhatsApp means police and MI5 have reportedly not seen the contents of that message.
Doing the rounds on the Sunday morning political TV shows, the Home Secretary said technology firms must build in back doors to allow security services to eavesdrop.
Rudd also insisted WordPress, and Google, who run YouTube, must realise that they are now publishers rather than simply technology companies, and so should do more to tackle extremist videos and blogs.
Although the Home Secretary said she would like companies to do this voluntarily and independently, she refused to rule out changing the law to force their hand.
Rudd told BBC One s Andrew Marr Show: It is completely unacceptable, there should be no place for terrorists to hide.
We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don t provide a secret place for terrorists to communicate with each other.
It used to be that people would steam-open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warrantry.
But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.
Asked if she opposed end-to-end encryption on Sky News s Sophy Ridge on Sunday, Rudd said: End-to-end encryption has a place, cyber security is really important and getting it wrong costs the economy and costs people money.
So I support end-to-end encryption, it has its place to play.
But we also need to have a system whereby when the police have an investigation, where the security services have put forward a warrant signed off by the Home Secretary, we can get that information when a terrorist is involved.
She denied what she was describing was incompatible with end-to-end encryption, adding: You can have a system whereby they can build it so that we can have access to it when it is absolutely necessary.
Rudd said she was calling in a fairly long list of relevant organisations for a meeting on the issue on Thursday, including social media platforms.
I would rather get a situation where we get all these people around the table agreeing to do it, she told Marr.
I know it sounds a bit like we re stepping away from legislation but we re not.
What I m saying is the best people who understand the technology, who understand the necessary hashtags to stop this stuff even being put up, not just taking it down, but stopping it being put up in the first place are going to be them.
Security distributor Ignition Technology is “avoiding appliances like the plague” as it focuses on pure software security solutions, according to chief strategy officer Sean Remnant. Speaking at Ignition’s partner update event at The Shard in London, which saw the distributor showcase its vendors, Remnant explained that Ignition and its emerging vendors are leading the way in moving security away from appliances and into fully software-based solutions. Founded in 2015, Ignition currently carries 3GRC, Cato Networks, Cloudistics, Cylance1, Digital Guardian, Illusive networks2, Menlo Security, RiskIQ and WhiteHat Security in the UK.
“Appliances and boxes are on a slippery slope,” Remnant said. “We believe that everyone, including the consumers, is interested in software-based delivery models, consumption-based models, and they absolutely want annuity and subscription services.
“Going down that route means that we are doing away with the old-school, hardware-based approach and that’s really hard for the channel to swallow, including the vendors.”
Remnant explained that these software-led vendors are looking to displace legacy technology that has been failing customers for the past three decades. He said the security sector has got itself stuck in a rut of adding layer upon layer of products to the security stack, which has left users with complicated security infrastructures producing a mass of security data that is impossible to interpret. Because of this, there needs to be a shift towards more intelligent solutions that can assess the data themselves and act accordingly in an automated fashion, he explained.
“There is a lot of legacy technology – signatures, behavioural analysis, sandboxing – it’s all very old tech and a lot of it has been around for 30 years,” he said.
“The CISO in a lot of enterprises is getting a really hard time . All of us in this room have sold the CISO a number of appliances and a number of solutions and they’re still getting problems.
“We don’t think more layers are necessarily better – that’s just a route that we have gone down as an industry because stuff hasn’t worked – but it was the best that we had at the time . I don’t feel guilty, because it was just the best that we had at the time.
“If you’ve got response solutions you’ll probably need resources to look through the data for those needles in the haystack, which might be good for consultancy but it’s not particularly good for the customer, so what we want to do is drive down the operation cost of owning security infrastructure.”
David Lannin, director of technology at security reseller Sapphire, attended the event and told CRN that in his experience, clients are looking for ways to protect their IT without having to employee a large team of security specialists.
“Organisations’ budgets are stretched and so they simply don’t have the resources for employing large teams of individuals who look after complex security systems which turn out an awful lot of security information,” he said.
“Any vendor that tries to put a degree of intelligence behind what it’s accessing, rather than just offering all the information, is going to really help because of resourcing – people just don’t have time to read through log information anymore . Very few customers I meet with these days talk about having analysts looking through the same degree of security logs as they might have done 10, 15 years ago.”
Lannin said that of the vendors Ignition has brought to the UK so far, internet and email vendor Menlo Security is the one that has caught his eye the most.
Menlo’s isolation platform3 opens websites in a secure cloud-based container, displaying only a replica of the website on the end-point device, which keeps potentially harmful material away from the machine itself. Speaking at the event, Menlo’s EMEA CTO Jason Steer said that the vendor addresses a problem that has existed since the internet’s inception.
“Your web browser is still using 1995 architecture and that architecture is the reason why ransomware continues to be a problem,” he said.
“Every click a user makes on a web browser, on average the browser makes 31 background requests to advertising, tracking and social media.
“Your web browser allows it . In any other protocol that you come across on the internet, would you accept unsigned, unauthenticated, active code and execute it on the end-point without anything other than an anti-virus scan ? No, it is fundamentally wrong .
It’s completely out of kilter with the threats that we face today.”
Lannin explained that Sapphire started speaking to Menlo last year, with a view to adding the vendor to its portfolio in 2017.
“We’re about to start working with Menlo for the end-point side of things,” he said. “That’s going to be a new addition to our portfolio in 2017 and we really like what they’re doing.
“The idea of putting that virtual air gap between what’s out there on the internet and what the user actually sees is a really interesting way of offering security.
“It’s a new technology and we’re excited to read about what’s in their road map and keen to see that come to fruition over the next few months . They’ve had a fairly active time since I engaged with them at InfoSec last year, and the technology has evolved an awful lot since then in a very positive manner, hence the intention to get them included in our portfolio.”
Perhaps the most disruptive vendor in Ignition’s portfolio is network and security vendor Cato Networks, founded by Shlomo Kramer, the man behind Check Point.
Cato offers a cloud-based enterprise network4 which it says eradicates the need for a number of network and security solutions that have typically been sold as individual appliances and layered up, including network firewall hardware. Introducing Cato, Remnant warned partners that the technology will “potentially disrupt a lot of channel business”, which Lannin said could alienate partners.
“There was a room full of resellers that have been selling security technology to their customers for in some cases 20 years and now Cato Networks are coming in and talking about ripping out that technology; ripping out that investment in security infrastructure, in favour of moving to the Cato cloud where security is embedded.
“I don’t follow that – it’s great if you’re a greenfield site and you don’t have that security already, but for a reseller community where they’re talking about actively stripping out those elements that you’ve worked so hard to get into your customers, I don’t think that’s a great pitch.”