Security Managers
Direct an organization's security functions, including physical security and safety of employees, facilities, and assets.
How AI Impacts Each Task
30 tasks analyzed
Create or implement security standards, policies, and procedures.
Identify, investigate, or resolve security breaches.
Respond to medical emergencies, bomb threats, fire alarms, or intrusion alarms, following emergency response procedures.
Monitor and ensure a sound, ethical environment.
Plan, direct, or coordinate security activities to safeguard company assets, employees, guests, or others on company property.
Develop, implement, manage, or evaluate policies and methods to protect personnel against harassment, threats, or violence.
Develop, conduct, support, or assist in governmental reviews, internal corporate evaluations, or assessments of the overall effectiveness of facility and personnel security processes.
Communicate security status, updates, and actual or potential problems, using established protocols.
Assess risks to mitigate potential consequences of incidents and develop a plan to respond to incidents.
Train subordinate security professionals or other organization members in security rules and procedures.
Direct or participate in emergency management and contingency planning.
Conduct threat or vulnerability analyses to determine probable frequency, criticality, consequence, or severity of natural or man-made disasters or criminal activity on the organization's profitability or delivery of products or services.
Supervise or provide leadership to subordinate security professionals, performing activities such as hiring, investigating applicants' backgrounds, training, assigning work, evaluating performance, or disciplining.
Develop budgets for security operations.
Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives.
Analyze and evaluate security operations to identify risks or opportunities for improvement through auditing, review, or assessment.
Develop or manage integrated security controls to ensure confidentiality, accountability, recoverability, or auditability of sensitive or proprietary information or information technology resources.
Monitor security policies, programs or procedures to ensure compliance with internal security policies, licensing requirements, or applicable government security requirements, policies, and directives.
Conduct physical examinations of property to ensure compliance with security policies and regulations.
Collect and analyze security data to determine security needs, security program goals, or program accomplishments.
Coordinate security operations or activities with public law enforcement, fire and other agencies.
Review financial reports to ensure efficiency and quality of security operations.
Purchase security-related supplies, equipment, or technology.
Develop or manage investigation programs, including collection and preservation of video and notes of surveillance processes or investigative interviews.
Develop, arrange for, perform, or assess executive protection activities to reduce security risks.
Plan security for special and high-risk events.
Support efforts to reduce substance abuse or other illegal activities in the workplace.
Develop, recommend, or manage security procedures for operations or processes, such as security call centers, system acquisition, development, and maintenance, access control, program models, or reporting tools.
Prepare reports or make presentations on internal investigations, losses, or violations of regulations, policies and procedures.
Attend meetings, professional seminars, or conferences to keep abreast of changes in executive legislative directives or new technologies impacting security operations.
| Task | AI Capability | Risk | Time % | |
|---|---|---|---|---|
| Create or implement security standards, policies, and procedures. | 55Estimated | 49.0% | 5% | |
| Identify, investigate, or resolve security breaches. | 51.45Observed | 47.6% | 6% | |
| Respond to medical emergencies, bomb threats, fire alarms, or intrusion alarms, following emergency response procedures. | 5Estimated | 11.0% | 3% | |
| Monitor and ensure a sound, ethical environment. | 41.33Observed | 31.5% | 3% | |
| Plan, direct, or coordinate security activities to safeguard company assets, employees, guests, or others on company property. | 20Estimated | 23.0% | 6% | |
| Develop, implement, manage, or evaluate policies and methods to protect personnel against harassment, threats, or violence. | 40Estimated | 43.0% | 4% | |
| Develop, conduct, support, or assist in governmental reviews, internal corporate evaluations, or assessments of the overall effectiveness of facility and personnel security processes. | 60Estimated | 51.0% | 3% | |
| Communicate security status, updates, and actual or potential problems, using established protocols. | 44.45Observed | 67.0% | 4% | |
| Assess risks to mitigate potential consequences of incidents and develop a plan to respond to incidents. | 54.37Observed | 48.8% | 4% | |
| Train subordinate security professionals or other organization members in security rules and procedures. | 35Estimated | 29.0% | 4% | |
| Direct or participate in emergency management and contingency planning. | 55Estimated | 49.0% | 3% | |
| Conduct threat or vulnerability analyses to determine probable frequency, criticality, consequence, or severity of natural or man-made disasters or criminal activity on the organization's profitability or delivery of products or services. | 54.62Observed | 48.9% | 4% | |
| Supervise or provide leadership to subordinate security professionals, performing activities such as hiring, investigating applicants' backgrounds, training, assigning work, evaluating performance, or disciplining. | 15Estimated | 21.0% | 6% | |
| Develop budgets for security operations. | 65Estimated | 53.0% | 2% | |
| Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives. | 44.83Observed | 44.9% | 4% | |
| Analyze and evaluate security operations to identify risks or opportunities for improvement through auditing, review, or assessment. | 37.5Observed | 42.0% | 3% | |
| Develop or manage integrated security controls to ensure confidentiality, accountability, recoverability, or auditability of sensitive or proprietary information or information technology resources. | 50.65Observed | 47.3% | 3% | |
| Monitor security policies, programs or procedures to ensure compliance with internal security policies, licensing requirements, or applicable government security requirements, policies, and directives. | 41.67Observed | 65.9% | 4% | |
| Conduct physical examinations of property to ensure compliance with security policies and regulations. | 45Estimated | 51.0% | 3% | |
| Collect and analyze security data to determine security needs, security program goals, or program accomplishments. | 42.85Observed | 44.1% | 3% | |
| Coordinate security operations or activities with public law enforcement, fire and other agencies. | 20Estimated | 23.0% | 3% | |
| Review financial reports to ensure efficiency and quality of security operations. | 92Estimated | 86.0% | 2% | |
| Purchase security-related supplies, equipment, or technology. | 87Estimated | 84.0% | 2% | |
| Develop or manage investigation programs, including collection and preservation of video and notes of surveillance processes or investigative interviews. | 60Estimated | 51.0% | 3% | |
| Develop, arrange for, perform, or assess executive protection activities to reduce security risks. | 40Estimated | 43.0% | 2% | |
| Plan security for special and high-risk events. | 55Estimated | 49.0% | 3% | |
| Support efforts to reduce substance abuse or other illegal activities in the workplace. | 15Estimated | 21.0% | 2% | |
| Develop, recommend, or manage security procedures for operations or processes, such as security call centers, system acquisition, development, and maintenance, access control, program models, or reporting tools. | 53.45Observed | 48.4% | 3% | |
| Prepare reports or make presentations on internal investigations, losses, or violations of regulations, policies and procedures. | 47.72Observed | 34.1% | 3% | |
| Attend meetings, professional seminars, or conferences to keep abreast of changes in executive legislative directives or new technologies impacting security operations. | 67Estimated | 76.0% | 2% |
Skill Impact Analysis
AI-Vulnerable Skills (6)
High reliance on Reading Comprehension is a risk area. Consider developing complementary AI-resistant skills to maintain value.
High reliance on Information Ordering is a risk area. Consider developing complementary AI-resistant skills to maintain value.
Memorization is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Programming is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
AI-Resistant Skills (11)
Leadership is AI-resistant — strengthening this skill provides durable career protection.
Adaptability/Flexibility is AI-resistant — strengthening this skill provides durable career protection.
Social Perceptiveness is AI-resistant — strengthening this skill provides durable career protection.
Complex Problem Solving is AI-resistant — strengthening this skill provides durable career protection.
Coordination is AI-resistant — strengthening this skill provides durable career protection.
Instructing is AI-resistant — strengthening this skill provides durable career protection.
Service Orientation is AI-resistant — strengthening this skill provides durable career protection.
Persuasion is AI-resistant — strengthening this skill provides durable career protection.
Recommended Courses
Courses matched to Security Managers skill gaps, ranked by relevance to your displacement risk profile.
Get personalized recommendations. Answer a few questions about your experience and skills to get course suggestions tailored specifically to you.
Upskill to Reduce Risk
Courses addressing your most AI-vulnerable skills
SQL Fundamentals Skill Track
by DataCamp
Estimated Impact
AI-Augmentation Tools
Learn to work alongside AI and boost your productivity
Creative Writing Specialization
by Wesleyan University
Estimated Impact
Strengthen Your Edge
Double down on skills AI can't replicate
Leading People and Teams Specialization
by University of Michigan
Estimated Impact
We may earn a commission when you enroll through our links, at no extra cost to you. This helps fund the Takeover Tracker.
Risk reduction and salary impact are estimates based on skill gap analysis, course relevance, and labor market data. Actual results vary by individual circumstance.
Score History
Risk score over 3 scoring runs
overall change
Education & Training
Percentage of workers at each education and training level
Education Level
Prior Experience Needed
Work experience required to enter this job
Training Provided After Hiring
How long it typically takes to learn on the job
Last scored March 14, 2026 · Based on BLS employment data and O*NET task analysis