icon

Usetutoringspotscode to get 8% OFF on your first order!

Essay report

This written assignment requirement is a minimum of 5 double-spaced pages of text, submitted in APA format, using 12 point font. In addition, your paper should include a cover page, abstract and reference page. A minimum of 2 scholarly sources must be used. Provide the following information and post your assignment as a .doc file attachment to the link provided for Assignment 2.2.

The following is a fictional description of a company that you are the security manager or CSO for. Utilizing course materials and additional outside materials as needed you must develop an explanation of an appropriate hiring process for ONE (1) of the positions presented in the simulation description below. The document itself should minimally consist of the following sections: key considerations, job description, hiring process. While you are not expected to specifically cite sources within the document, through your use of key terms and concepts it should be explicitly obvious to the instructor that you utilized sources in the development of the document.

The key considerations section can be either observations or questions that you believe are essential to the development of the overall hiring and training process. This should be the section where you most critically engage the hiring process itself from both a practical and theoretical perspective. The job description should be presented as if it is the primary marketing tool the company will use to advertise the position. It should come with a brief discussion or consideration of how and where the position should be marketed. Finally, the hiring process should be developed as a complete chronology explaining how a potential employee is moved from applicant to full employment. Understanding that this is a fictional exercise you are encouraged to develop the details of any of the sections as you feel may be necessary to create a full illustration of the hiring process. That said, two key components to the assignment grade will be the thoroughness of development and its relative applicability to a real-world hiring exercise.

Simulation Description

As the chief security officer (CSO) of An Expanding Company, Inc. (AECI) you are approached by a senior executive and told that it is time to expand the company’s security operations. Specifically, the company will be opening a new facility and you will need to hire two different types of security personnel: physical security and information security analyst. (PLEASE remember that the assignment only requires you to focus only on ONE of the positions listed; your choice.)
AECI is approximately 10 years old and its primary market is secondary electronic data storage. Specifically, it maintains data storage for both small businesses and individuals who operate predominantly online. It began as a small operation heavily dependent upon capital resources, primarily independently owned servers. Over the past 10 years it has expanded in terms of both operations and facilities to include over 50 employees and a large independent facility on the outskirts of the major urban area in the southeast United States. As part of an attempt to gain access to local and state contracts they recently significantly upgraded the quality and quantity of both physical and electronic security components at the facility. The result has been a large increase in their overall business operations which has led them to develop a second facility in the Western United States.

Employment opportunities at the company are attractive. The company provides competitive entry-level salaries and above average benefit packages. The current business environment suggests continuing opportunities for expansion and all indications are that the company is healthy and ready to take advantage of those opportunities. As a result, you should expect to be able to be attract a large pool of qualified applicants for either position being advertised.

The new facility is an unsecure business lot. There are three physical structures on the lot: a central office building (two stories; four traditional office ‘suites’, all occupied by AECI), a relatively small security and utility building, and a security booth at the entry to the lot. The lot itself is approximately 200 yards square and includes a large parking lot area. The entire lot is surrounded by a suburban business environment which includes some residential housing. The facilities themselves are in use 24 hours a day with the predominant amount of activity taking place between 7 AM and 6 PM. Current security includes the use of active patrols, electronic surveillance, and other physical security measures.

While AECI originally focused on data storage exclusively, its business model has expanded to include a variety of data management services. The model has been based upon slow and steady, but constant, upgrade and improvement of services and capabilities. Thus, it should be assumed that it is utilizing the most up-to-date technology and processes within the market. Its primary customers are local small and medium businesses in need of electronic data storage and management. Their approach to the market has focused on health and employment records and they are now considered to be one of the top three firms within the greater Metro area they operate within. Their specific services offered include website management and security, customer data collection and information security, and employee records management. They have recently gained the certifications necessary to participate in government contracting. As a result they have begun marketing towards local businesses in need of the services above in relation to their work with local and state government agencies.

It is expected that you will choose one of the positions to focus on based upon your own occupations or work experiences. Thus, while there is plenty of detail above to give you an idea of what sort of company you are developing a hiring practice for, it is expected you will add critical details associated with your understanding of employment in the physical security or information security fields.

 

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes