Role Purpose & Context
Role Summary
The Director of Physical Security is responsible for defining, building, and running our entire physical security programme across a large, complex real estate portfolio. This means you'll be the strategic brain behind how we keep our buildings, tenants, and staff safe, from the ground up. You'll work at the intersection of business strategy and operational risk, translating high-level company objectives into actionable, enterprise-wide security policies and technology roadmaps that protect our multi-million-pound assets.
When this role is done well, our properties are secure, incidents are rare and handled flawlessly, and our business operations run smoothly without interruption from security threats. When it's not, we're looking at significant financial losses, reputational damage, and potentially serious harm to people. The challenge is balancing cutting-edge security with practical business needs and a tight budget, all while managing a large, distributed team. The reward? You'll be safeguarding the very foundation of our business, making a tangible difference to thousands of lives and millions of pounds in assets.
Reporting Structure
- Reports to: Chief Operating Officer (COO) or Chief Executive Officer (CEO)
- Direct reports: Multiple Regional Security Managers, leading a total team of 25-100+ security professionals
- Matrix relationships:
VP, Global Security (Real Estate), Head of Security Operations (Real Estate), Chief Physical Security Officer (Large Portfolio),
Key Stakeholders
Internal:
- C-Suite (CEO, COO, CFO)
- Board of Directors
- Legal & Compliance Teams
- HR Leadership
- Facilities & Property Management Leadership
- IT Security Leadership
External:
- Law Enforcement & Emergency Services
- Regulatory Bodies (e.g., HSE, GDPR)
- Major Security Technology Vendors
- Security Consulting Firms
- Insurance Providers
- Key Tenants & Clients
Organisational Impact
Scope: This role directly shapes the enterprise's physical security posture, significantly influencing operational resilience, risk management, and overall business continuity. Your decisions protect critical assets, reduce liability, and safeguard the company's reputation and financial performance across the entire real estate portfolio. You're essentially the guardian of our physical world.
Performance Metrics
Quantitative Metrics
- Metric: Security Programme Budget Adherence
- Desc: Managing the overall physical security budget for the entire portfolio against approved forecasts.
- Target: Within ±2% variance of approved annual budget (typically £2M-£10M+)
- Freq: Quarterly & Annually
- Example: If the annual budget is £5M, you'll aim to spend between £4.9M and £5.1M, demonstrating tight financial control.
- Metric: Enterprise Physical Risk Score Reduction
- Desc: Improving the overall risk rating across the property portfolio through strategic mitigation programmes.
- Target: 10% year-over-year reduction in average enterprise physical risk score (as defined by our TVRA methodology)
- Freq: Annually
- Example: Moving the portfolio's average risk score from a 'High' 7.0 to a 'Medium' 6.3 within 12 months by implementing new tech and processes.
- Metric: Major Incident Frequency & Impact
- Desc: Reducing the number of significant security incidents (e.g., major theft, prolonged operational disruption, serious assault) and their associated costs.
- Target: Zero major security incidents resulting in £100,000+ loss or 24+ hours of operational downtime per annum
- Freq: Monthly & Annually
- Example: Successfully preventing any incidents that lead to significant financial penalties, extended property closures, or board-level investigations.
- Metric: Regulatory & Compliance Audit Pass Rate
- Desc: Ensuring all properties and security operations meet or exceed local and national regulatory requirements and internal compliance standards.
- Target: 100% pass rate on all external regulatory audits and internal compliance reviews, with zero critical findings
- Freq: Annually (or as required by regulations)
- Example: Successfully navigating a rigorous GDPR audit for CCTV data retention without any non-compliance penalties.
- Metric: Security Technology Programme Delivery
- Desc: Delivering large-scale security technology upgrades or new system implementations on time and within budget.
- Target: 90% of strategic security technology programmes delivered on schedule and within 5% of allocated budget
- Freq: Quarterly
- Example: Completing the enterprise-wide VMS upgrade across 50 properties by Q4, staying within the £2.5M budget.
Qualitative Metrics
- Metric: Board & Executive Confidence
- Desc: Being seen as the trusted advisor for all physical security matters, with strategic insights informing top-level decisions.
- Evidence: Regular invitations to Board meetings for security updates; C-Suite proactively seeking your input on new property acquisitions or major business changes; positive feedback from executive stakeholders on strategic presentations.
- Metric: Organisational Security Culture
- Desc: Successfully embedding a strong, proactive security culture across the entire organisation, from top to bottom.
- Evidence: High employee engagement with security training and awareness programmes; active participation from Facilities and Property Management in security initiatives; positive feedback in internal surveys regarding perceptions of safety and security.
- Metric: Strategic Vendor & Partner Relationships
- Desc: Building and maintaining strong, mutually beneficial relationships with key security vendors, law enforcement, and industry bodies.
- Evidence: Favourable contract terms with major security providers; regular collaborative meetings with local law enforcement; active participation and leadership roles in industry security forums; positive feedback from external partners.
- Metric: Team Leadership & Development
- Desc: Developing a high-performing, engaged, and strategically capable physical security team.
- Evidence: Low attrition rates within the security leadership team; clear succession plans for key roles; positive feedback from direct reports (Regional Security Managers) in 360-degree reviews; demonstrable career progression paths for team members.
Primary Traits
- Trait: Strategic Visionary
- Manifestation: You're constantly looking 3-5 years ahead, spotting emerging threats before they hit the headlines. You don't just react to incidents; you're designing multi-year programmes to prevent them. You can articulate a clear, compelling vision for where our security needs to be, and then map out the steps to get us there. This means thinking about how technology, geopolitics, and even social trends will impact our properties.
- Benefit: In a role this senior, day-to-day operations are handled by your teams. Your job is to protect the entire enterprise from future risks. Without a clear, long-term vision, we'd be constantly playing catch-up, which is both expensive and dangerous. We need someone who can see the big picture and build for tomorrow.
- Trait: Decisive Leader Under Pressure
- Manifestation: When a major incident hits—think a widespread building evacuation or a significant threat—you're the calmest person in the room. You can take incomplete information, make a tough call quickly, and then clearly direct your teams and brief the C-Suite. You own the outcome, good or bad, and you inspire confidence in everyone around you, from first responders to the CEO.
- Benefit: At this level, you're the ultimate incident commander. Hesitation or panic during a crisis can have catastrophic consequences for our people and our business. We need a leader who can cut through the noise, make the right decision, and rally everyone to execute the plan, even when the stakes are incredibly high.
- Trait: Politically Astute & Influential
- Manifestation: You understand that security isn't just about technology; it's about people and politics. You can walk into a room with the CEO, CFO, and Head of Legal, articulate the business case for a £1M security investment, and get buy-in. You know how to build consensus, navigate complex internal dynamics, and ensure security is seen as a business enabler, not just a cost centre. You're comfortable challenging senior leaders when necessary, but always with respect and data.
- Benefit: Security initiatives often require significant investment and can impact how people work. To drive change at an enterprise level, you need to be able to influence senior leaders, get them on board, and secure the resources needed. Without this, even the best security strategy will fail to get off the ground.
Supporting Traits
- Trait: Resilient
- Desc: You'll face setbacks, budget constraints, and the occasional crisis. You need to be able to bounce back, learn from challenges, and keep pushing forward with a positive, determined attitude.
- Trait: Ethical & Principled
- Desc: You'll be dealing with highly sensitive information, investigations, and potentially life-or-death decisions. An unwavering commitment to ethical behaviour, fairness, and legal compliance is non-negotiable.
- Trait: Inquisitive
- Desc: You're always asking 'why?' and 'what if?'. You're curious about new technologies, emerging threats, and better ways of doing things, constantly seeking to improve our security posture.
Primary Motivators
- Motivator: Protecting the Enterprise
- Daily: You get a genuine sense of purpose from knowing your work directly contributes to the safety of thousands of employees and the security of valuable assets. This shows up in your meticulous planning, your dedication to incident response, and your constant drive to identify and mitigate risks.
- Motivator: Strategic Impact & Leadership
- Daily: You thrive on shaping the direction of a critical function and seeing your vision come to life across a large organisation. You enjoy leading and developing a high-performing team of security professionals, empowering them to deliver on your strategic objectives.
- Motivator: Solving Complex, High-Stakes Problems
- Daily: You're energised by tackling ambiguous, enterprise-level security challenges that have no easy answers. This could be designing security for a new, high-risk property or integrating disparate security systems across a global footprint.
Potential Demotivators
Honestly, this isn't a role for someone who needs constant praise for operational wins or who shies away from tough conversations. You'll be making decisions that impact significant budgets and potentially upset some senior people. If you need every security recommendation to be immediately adopted without question, or if you struggle with the long game of strategic influence, you'll find it frustrating. Expect to spend more time in boardrooms than on patrol, and to deal with complex political dynamics as much as technical security challenges.
Common Frustrations
- Fighting the 'cost centre' label: Constantly having to justify your budget for preventative measures to stakeholders who only appreciate security's value after a major negative incident.
- The convenience vs. security battle: Employees and tenants constantly undermining security protocols for perceived convenience, forcing you to find creative ways to enforce policy without alienating key stakeholders.
- The 'after-the-fact' expert: Being second-guessed by executives on your response to an incident days later, with the benefit of hindsight you didn't have in the moment.
- Navigating complex global regulations: Keeping up with the ever-changing landscape of security and privacy laws across multiple jurisdictions is a constant headache.
- Integrating legacy systems: Inheriting a patchwork of old security technologies across an acquired portfolio and trying to bring them into a unified, modern architecture.
What Role Doesn't Offer
- A purely operational, hands-on security role – you'll be leading, not doing the day-to-day patrols or investigations yourself.
- A 'set it and forget it' environment – the threat landscape is constantly evolving, requiring continuous adaptation and innovation.
- A role without significant financial and reputational accountability – the stakes are very high here.
ADHD Positives
- The fast-paced, high-stakes nature of crisis management and incident response can be highly engaging and stimulating.
- The need for innovative, 'outside the box' thinking to anticipate complex threats and design new security programmes can be a strong fit.
- Hyperfocus can be an asset when diving deep into complex risk assessments or strategic planning sessions.
ADHD Challenges and Accommodations
- Maintaining focus on long-term strategic initiatives amidst daily operational demands can be challenging; using visual project management tools and regular check-ins with an executive coach can help.
- Delegating tasks effectively and managing a large, distributed team requires strong organisational skills; structured delegation frameworks and executive assistant support can be beneficial.
- The need for meticulous documentation and compliance can be tedious; AI tools for report generation and dedicated support staff for administrative tasks can reduce this burden.
Dyslexia Positives
- Strong visual-spatial reasoning is often a strength, which is excellent for understanding building layouts, security system designs, and threat mapping.
- Big-picture strategic thinking and pattern recognition for identifying security vulnerabilities can be highly developed.
- Excellent verbal communication skills are often present, which is crucial for presenting to the board and leading crisis briefings.
Dyslexia Challenges and Accommodations
- Extensive written reports, policy documents, and board papers are a core part of the role; using dictation software, AI writing assistants, and having access to proofreaders/editors is essential.
- Reading and interpreting complex regulatory documents can be time-consuming; utilising text-to-speech software and having a legal counsel to summarise key points can be helpful.
- Organising large volumes of documentation; digital document management systems with strong search capabilities and clear categorisation are important.
Autism Positives
- A deep, analytical approach to identifying security vulnerabilities and designing robust systems can be a significant strength.
- Strong adherence to rules, protocols, and ethical guidelines is paramount in security leadership.
- The ability to maintain calm and logical thinking during high-pressure incidents, focusing on facts and procedures, is invaluable.
Autism Challenges and Accommodations
- The role involves extensive stakeholder engagement, negotiation, and navigating complex organisational politics; coaching on executive communication and social dynamics can be beneficial.
- Frequent, spontaneous social interactions and networking events are common; clear agendas for meetings and pre-briefings for social events can help manage these.
- Sensory considerations in a dynamic environment like a Security Operations Centre (SOC) or during incident response; access to quiet spaces, noise-cancelling headphones, and control over personal workspace environment can be important.
Sensory Considerations
This role will involve time in various environments: quiet office settings for strategic planning, dynamic Security Operations Centres (SOCs) with multiple screens and constant alerts, and potentially high-stress, noisy incident scenes. You'll also be travelling to different properties, each with its own sensory profile. Expect a mix of visual stimuli, auditory inputs (alarms, radio traffic), and social interaction levels. We're open to discussing specific accommodations to ensure you can perform at your best.
Flexibility Notes
While this is a senior leadership role with significant demands, we are committed to providing reasonable accommodations where possible. We believe in focusing on outcomes and impact, and we're willing to explore flexible working arrangements (e.g., hybrid work, adjusted hours where feasible for strategic tasks) to support a diverse and inclusive team. We'll also provide a suite of AI tools to help manage workload and cognitive load.
Key Responsibilities
Experience Levels Responsibilities
- Level: Level 6: Director of Physical Security
- Responsibilities: Define the enterprise-wide physical security strategy, vision, and multi-year roadmap that aligns with our business objectives and anticipates future threats. This isn't just about patching holes; it's about building a fortress for tomorrow.
- Own the entire physical security budget, typically £2M-£10M+, making strategic investment decisions on technology, personnel, and infrastructure across the portfolio. You'll be accountable for every pound spent.
- Lead, mentor, and develop a large, distributed team of Regional Security Managers and their teams (25-100+ individuals), fostering a culture of excellence, accountability, and continuous improvement. You're building the next generation of security leaders.
- Present regular, strategic updates to the Board of Directors and C-Suite on our physical security posture, emerging risks, major incidents, and strategic initiatives. They'll expect clear, concise, and actionable insights.
- Oversee the selection, implementation, and integration of enterprise-level security technologies (ACS, VMS, incident management platforms), ensuring they meet our strategic needs and deliver real value. This means leading the RFP process and managing key vendor relationships.
- Establish and maintain robust relationships with law enforcement, emergency services, and regulatory bodies across all operating jurisdictions. You'll represent the company in critical external engagements and ensure full compliance.
- Lead the enterprise-level crisis management and incident response planning, including regular tabletop exercises and full-scale drills. When a major incident occurs, you're the ultimate decision-maker, coordinating across multiple internal and external agencies.
- Supervision: You'll operate with full autonomy, reporting directly to the COO or CEO with monthly strategic alignment meetings and quarterly board presentations. Your focus is on enterprise-level outcomes, not daily tasks.
- Decision: You'll have full strategic authority within your domain, including P&L responsibility for £2M-£10M+ budgets, organisational design for the physical security function, and approval for major security technology programmes. You'll also be involved in M&A due diligence from a physical security perspective and represent the company in board-level discussions.
- Success: Success here means a demonstrably secure and resilient real estate portfolio, a high-performing and engaged security team, and physical security being a recognised strategic enabler for the business, not just a necessary cost. Ultimately, it's about protecting our people and our assets, and proving that through measurable outcomes.
Decision-Making Authority
- Type: Strategic Security Investments (e.g., new enterprise VMS)
- Entry: Escalate to supervisor for input.
- Mid: Propose options to manager with cost/benefit analysis.
- Senior: Recommend preferred solution to Director, with detailed business case.
- Type: Enterprise Incident Response Protocols
- Entry: Follow established protocols, escalate deviations.
- Mid: Suggest minor improvements to existing protocols.
- Senior: Design and implement updates to specific incident response procedures within a building.
- Type: Organisational Design for Security Function
- Entry: No involvement.
- Mid: No involvement.
- Senior: Provide input on team structure for a specific building/workstream.
ID:
Tool: Enterprise Risk Modelling & Prediction
Benefit: Use AI to analyse vast datasets—historical incidents, geopolitical intelligence, local crime rates, property vulnerabilities—to proactively identify emerging threats and predict potential risks across our entire portfolio. This moves us from reactive to truly predictive security, allowing you to allocate resources strategically before problems arise.
ID:
Tool: Strategic Resource Optimisation
Benefit: Leverage AI-driven analytics to optimise the deployment of security personnel, technology, and budget across properties based on dynamic risk profiles, incident trends, and operational needs. This ensures we're putting our resources where they'll have the most impact, justifying every pound spent with data.
ID: ✍️
Tool: Executive Briefing & Report Automation
Benefit: Feed AI complex incident reports, audit findings, and threat intelligence. It'll then draft concise, board-ready summaries, presentations, and policy updates, highlighting key takeaways and actionable recommendations. Imagine getting a first draft of your quarterly security report in minutes, not hours.
ID: ️
Tool: Regulatory Compliance Monitoring & Impact Analysis
Benefit: Employ AI to continuously monitor changes in global and local security regulations (e.g., GDPR for CCTV, fire safety codes). The AI can then assess the potential impact on our portfolio, flagging areas of non-compliance and suggesting policy updates, saving countless hours of legal research.
10-15 hours weekly
Weekly time savings potential
Access to 3-5 core AI tools, with an investment of £50-£200/month per user for premium features.
Typical tool investment
Competency Requirements
Foundation Skills (Transferable)
At this level, we expect not just mastery of foundational skills but the ability to define and champion them across a large organisation. You'll be setting the standard.
- Category: Strategic Communication & Influence
- Skills: Board-level presentation skills (clear, concise, impactful)
- Executive briefing and reporting (distilling complex info)
- Negotiation and consensus-building with diverse stakeholders
- Crisis communication (internal and external messaging)
- Category: Organisational Leadership & Development
- Skills: Multi-level team leadership (leading managers, not just individuals)
- Talent development and succession planning for a large function
- Organisational design and change management
- Fostering a high-performance and ethical security culture
- Category: Problem Solving & Strategic Thinking
- Skills: Enterprise-level risk analysis and mitigation strategy
- Complex problem-solving with ambiguous information
- Long-term strategic planning and roadmap development
- Critical thinking and decision-making under extreme pressure
- Category: Financial Acumen & Business Management
- Skills: Multi-million-pound budget management and forecasting
- Business case development for security investments
- Contract negotiation and vendor management (strategic level)
- Understanding of P&L and its impact on security decisions
Functional Skills (Role-Specific Technical)
You'll be the ultimate expert in physical security, not just knowing the 'how' but the 'why' and the 'what's next' at an enterprise level. This means shaping the standards, not just following them.
Technical Competencies
- Skill: Enterprise Threat, Vulnerability, and Risk Assessment (TVRA)
- Desc: The ability to design and implement a comprehensive, enterprise-wide TVRA methodology. This means identifying global and local threats, assessing vulnerabilities across a diverse portfolio of properties, and quantitatively evaluating risk to prioritise multi-million-pound mitigation strategies. You'll be defining the framework, not just executing it.
- Level: Expert
- Skill: Global CPTED (Crime Prevention Through Environmental Design) Application
- Desc: Expertise in applying CPTED principles at a strategic level to influence property design, development, and renovation projects across the entire portfolio. This involves working with architects and property developers to integrate natural surveillance, access control, and territorial reinforcement from the earliest stages of planning, ensuring security is 'built-in', not 'bolted-on'.
- Level: Expert
- Skill: Strategic Guard Force Management & Contract Negotiation
- Desc: The capability to develop enterprise-wide standards for proprietary or contract guard forces, including performance metrics, training requirements, and technology integration. This also involves leading complex contract negotiations with major security service providers, ensuring optimal service delivery and cost-effectiveness across the portfolio.
- Level: Expert
- Skill: Enterprise Incident Command System (ICS) & Crisis Management
- Desc: Expertise in designing, implementing, and leading an enterprise-level ICS framework for all-hazard incident management. This means coordinating complex responses involving internal teams (Facilities, HR, Legal), external agencies (police, fire, ambulance), and potentially board-level communications during major crises.
- Level: Expert
- Skill: Physical Security Audits, Compliance & Governance
- Desc: The ability to establish a robust governance framework for physical security across the organisation. This includes defining audit programmes, ensuring compliance with all relevant regulations (e.g., GDPR for CCTV, fire safety), and developing policies that stand up to legal scrutiny. You'll be accountable for the entire compliance posture.
- Level: Expert
- Skill: Geopolitical Risk Analysis & Intelligence
- Desc: The capability to monitor and interpret global and local geopolitical events, economic trends, and social unrest, assessing their potential impact on our properties, personnel, and operations. This involves integrating threat intelligence into strategic planning and proactive risk mitigation.
- Level: Advanced
Digital Tools
- Tool: Genetec Security Center (Unified Security Platform)
- Level: Strategic
- Usage: Leading the design of enterprise-wide security architecture, managing vendor relationships, overseeing integration with other business systems (e.g., HRIS for access provisioning), and ensuring the platform meets long-term strategic objectives across the portfolio.
- Tool: Milestone XProtect Corporate (Video Management System)
- Level: Strategic
- Usage: Developing enterprise VMS standards, evaluating and integrating advanced AI video analytics platforms, and managing the significant storage, network bandwidth, and data privacy implications for a large-scale camera deployment.
- Tool: ServiceNow GRC (Governance, Risk, and Compliance)
- Level: Strategic
- Usage: Designing and implementing security governance frameworks, integrating physical security risk data into the enterprise GRC platform, and developing executive dashboards for risk reporting and compliance oversight.
- Tool: Everbridge Critical Event Management (CEM)
- Level: Strategic
- Usage: Architecting the enterprise mass notification strategy, integrating with threat intelligence feeds and BMS for automated alerts, and ensuring the system supports rapid, multi-channel communication during major crises across all properties.
- Tool: Johnson Controls Metasys (Building Management System)
- Level: Strategic
- Usage: Collaborating with Facilities leadership to architect deep integrations between BMS and physical security platforms (PSIM), understanding how building systems impact security, and using BMS data for strategic security insights.
- Tool: Microsoft Office 365 Suite (Excel, PowerPoint, Word, Teams)
- Level: Expert
- Usage: Developing complex financial models for budget planning, crafting compelling board presentations, writing detailed policy documents, and leading virtual strategic meetings with global teams.
Industry Knowledge
- Area: Real Estate & Property Lifecycle
- Desc: Deep understanding of the entire real estate lifecycle, from acquisition and development to property management and divestment, and how security considerations integrate at each stage. This includes understanding tenant needs, lease agreements, and property valuations.
- Area: Regulatory & Legal Landscape (Global)
- Desc: Comprehensive knowledge of international and national security-related regulations, privacy laws (e.g., GDPR, CCPA), health and safety legislation, and legal frameworks for investigations and evidence handling across multiple jurisdictions where we operate.
- Area: Emerging Security Technologies & Trends
- Desc: Expert-level awareness of the latest advancements in physical security technology (e.g., AI video analytics, biometrics, drone detection), cyber-physical convergence, and evolving threat vectors, to inform strategic investment decisions.
Regulatory Compliance Regulations
- Reg: GDPR (General Data Protection Regulation)
- Usage: Ensuring all CCTV footage, access control logs, and visitor data collection across our European portfolio are fully compliant with GDPR, including data minimisation, retention policies, and subject access requests. You'll be accountable for enterprise-wide compliance.
- Reg: Health & Safety at Work Act 1974 (UK)
- Usage: Integrating physical security measures with health and safety protocols to protect employees and visitors. This includes emergency egress, fire safety systems, and ensuring security practices do not create new H&S risks. You'll work closely with H&S leadership.
- Reg: Local Building Codes & Fire Safety Regulations
- Usage: Ensuring all physical security installations (e.g., access control doors, emergency exits, CCTV placement) comply with local building codes and fire safety regulations across our diverse property portfolio. This often means working with legal counsel and local authorities.
- Reg: Data Protection Act 2018 (UK)
- Usage: Applying the principles of data protection to all physical security systems and processes, particularly concerning the collection and processing of personal data via CCTV, access control, and visitor management systems across our UK operations.
Essential Prerequisites
- A proven track record of 16-20 years in physical security, with at least 5-7 years in a senior leadership role managing multi-site or enterprise-level security operations.
- Demonstrable experience managing multi-million-pound security budgets and leading large, distributed teams (including managers).
- Extensive experience in developing and implementing enterprise-wide physical security strategies, policies, and technology roadmaps.
- A deep understanding of real estate operations, property management, and the unique security challenges of commercial and residential portfolios.
- Demonstrable experience presenting to and influencing C-Suite executives and Board members on critical security matters.
- Experience leading crisis management and incident response at an enterprise level, coordinating with multiple internal and external agencies.
Career Pathway Context
We're looking for someone who has already 'done the job' at a senior level and is now ready to take on the ultimate responsibility for physical security across a major real estate enterprise. This isn't a learning role; it's about applying deep expertise to shape our future.
Qualifications & Credentials
Emerging Foundation Skills
- Skill: Cyber-Physical Security Convergence Strategy
- Why: The lines between cyber security and physical security are blurring. Breaches often exploit weaknesses in both domains. As our buildings become 'smarter' and more connected, the need to integrate these two security functions at a strategic level is becoming paramount.
- Concepts: [{'concept_name': 'Unified Risk Frameworks', 'description': 'Developing a single, holistic risk framework that assesses both cyber and physical vulnerabilities and threats together, rather than in silos.'}, {'concept_name': 'Integrated Security Operations Centres (SOCs)', 'description': 'Designing and implementing SOCs that monitor and respond to both IT and OT/physical security incidents from a single pane of glass.'}, {'concept_name': 'IoT Security for Buildings', 'description': 'Understanding and mitigating the cyber risks associated with smart building technologies (HVAC, lighting, access control systems) that are increasingly connected to the internet.'}, {'concept_name': 'Data-Driven Threat Intelligence', 'description': 'Sharing and correlating threat intelligence between cyber and physical security teams to identify broader attack patterns and vulnerabilities.'}]
- Prepare: This quarter: Schedule regular working sessions with our CISO (Chief Information Security Officer) to understand their top priorities and challenges.
- Next 6 months: Attend a leading industry conference focused on cyber-physical security convergence (e.g., GSX, ISC West with relevant tracks).
- Next 12 months: Develop a joint cyber-physical incident response plan with the IT security team, including a tabletop exercise.
- Ongoing: Read publications from NIST, SANS, and other bodies on critical infrastructure security and OT security best practices.
- QuickWin: Start by sharing your physical incident reports with the cyber security team and vice versa. Look for any correlations or gaps in intelligence sharing today.
- Skill: ESG (Environmental, Social, Governance) Integration in Security
- Why: Investors, tenants, and employees are increasingly demanding that companies demonstrate strong ESG commitments. Physical security plays a crucial role in the 'Social' aspect (safety, well-being) and 'Governance' (ethical practices, data privacy). Integrating ESG principles into security strategy isn't just good practice; it's a business imperative.
- Concepts: [{'concept_name': 'Social Impact of Security', 'description': 'Understanding how security measures impact the well-being and perception of safety for employees, tenants, and visitors, and designing inclusive security programmes.'}, {'concept_name': 'Ethical AI in Security', 'description': 'Ensuring the ethical deployment of AI-powered security technologies (e.g., facial recognition, predictive analytics) with considerations for privacy, bias, and transparency.'}, {'concept_name': 'Sustainable Security Practices', 'description': 'Exploring environmentally friendly security technologies, reducing waste from security operations, and aligning security with broader corporate sustainability goals.'}, {'concept_name': 'Human Rights & Security Operations', 'description': 'Ensuring security operations and personnel conduct adhere to international human rights standards, particularly in diverse global environments.'}]
- Prepare: This quarter: Review our company's latest ESG report and identify areas where physical security can contribute more directly.
- Next 6 months: Engage with our ESG or Sustainability team to understand their objectives and explore collaborative initiatives.
- Next 12 months: Develop a 'Security & ESG' strategy document outlining how physical security contributes to our corporate ESG goals.
- Ongoing: Research best practices for ethical security technology deployment and human rights in security operations.
- QuickWin: Begin by auditing our current security technology stack for privacy implications and ensuring all security personnel receive training on inclusive security practices.
Advancing Technical Skills
- Skill: Advanced AI/ML Application for Predictive Security
- Why: The shift from reactive security to proactive, predictive intelligence is driven by AI and Machine Learning. As Director, you'll need to understand how to strategically deploy these technologies to anticipate threats, optimise resource allocation, and enhance operational efficiency across the entire portfolio.
- Concepts: [{'concept_name': 'AI-Powered Risk Scoring & Anomaly Detection', 'description': 'Understanding how AI models can process vast amounts of data (access logs, VMS, external feeds) to identify unusual patterns and predict potential security incidents before they occur.'}, {'concept_name': 'Ethical AI Deployment & Bias Mitigation', 'description': 'Ensuring AI security tools are deployed ethically, addressing concerns around privacy, surveillance, and algorithmic bias, particularly in diverse populations.'}, {'concept_name': 'Data Governance for AI Security', 'description': 'Establishing robust data governance frameworks for the collection, storage, and use of data by AI security systems, ensuring compliance and data integrity.'}, {'concept_name': 'Integration of AI with PSIM/SOC Platforms', 'description': 'Strategically planning how AI analytics integrate seamlessly into our Physical Security Information Management (PSIM) and Security Operations Centre (SOC) platforms to provide actionable intelligence.'}]
- Prepare: This quarter: Engage with leading security technology vendors to understand their AI/ML roadmaps and capabilities.
- Next 6 months: Commission a pilot project for an AI-powered anomaly detection system in a high-risk property.
- Next 12 months: Develop a strategic roadmap for AI adoption across the physical security function, including budget and resource requirements.
- Ongoing: Stay current with industry reports and academic research on AI in security, focusing on practical applications and ethical implications.
- QuickWin: Start by identifying one repetitive, data-heavy task (e.g., incident trend analysis) that could be significantly enhanced by an AI tool for initial insights.
- Skill: Cloud-Native Security Architecture & SaaS Management
- Why: Physical security systems are increasingly moving to the cloud (VSaaS, ACaaS). As Director, you'll need to understand the strategic implications of cloud adoption, including scalability, resilience, data sovereignty, and the management of multiple SaaS security providers.
- Concepts: [{'concept_name': 'Cloud Security Best Practices', 'description': 'Understanding the principles of secure cloud architecture, data encryption, access management, and compliance in a cloud environment for physical security data.'}, {'concept_name': 'Vendor Lock-in & Interoperability', 'description': 'Strategically evaluating cloud providers to avoid vendor lock-in and ensure interoperability between different security platforms and business systems.'}, {'concept_name': 'Data Sovereignty & Global Compliance', 'description': 'Navigating the complexities of data storage locations and regulatory compliance for physical security data across different countries and regions.'}, {'concept_name': 'Total Cost of Ownership (TCO) for Cloud Security', 'description': 'Developing robust financial models to compare the TCO of on-premise vs. cloud-native security solutions, considering operational costs, scalability, and maintenance.'}]
- Prepare: This quarter: Review our current cloud strategy for IT and identify opportunities for alignment with physical security.
- Next 6 months: Engage with cloud security architects (internal or external) to understand best practices for secure cloud deployments.
- Next 12 months: Develop a cloud adoption strategy for physical security, outlining which systems will migrate and why.
- Ongoing: Participate in webinars and training on cloud security architecture and SaaS management for enterprise systems.
- QuickWin: Identify one non-critical security application that could be moved to a cloud-based SaaS solution as a pilot project to gain experience.
Future Skills Closing Note
The future of physical security is dynamic and complex. Your ability to embrace new technologies, integrate disparate systems, and lead with a forward-thinking mindset will be crucial to our continued success and your own professional growth. We're looking for a leader who sees these shifts not as challenges, but as opportunities to build an even stronger, more intelligent security function.
Education Requirements
- Level: Minimum
- Req: Bachelor's degree in Security Management, Business Administration, Criminal Justice, or a closely related field.
- Alts: Extensive (20+ years) and demonstrable experience in a senior physical security leadership role, with a proven track record of managing large-scale operations and budgets, may be considered in lieu of a degree.
- Level: Preferred
- Req: Master's degree (e.g., MBA, MSc in Security Management, MSc in Risk Management).
- Alts: A strong portfolio of executive leadership training and professional certifications relevant to enterprise security.
Experience Requirements
You'll need 16-20 years of progressive experience in physical security, with at least 5-7 years in a senior leadership position (e.g., Regional Security Manager, Head of Security Operations) overseeing multi-site or enterprise-level security programmes. This must include direct experience managing multi-million-pound budgets, leading large, distributed teams (including managers), and presenting to C-Suite executives and Board members.
Preferred Certifications
- Cert: Physical Security Professional (PSP)
- Prod: ASIS International
- Usage: Demonstrates advanced knowledge in physical security principles and applications, complementing the broader CPP certification.
- Cert: Chartered Security Professional (CSyP)
- Prod: The Security Institute (UK)
- Usage: Recognises leadership and strategic competence in security at a national and international level, highly valued in the UK.
- Cert: Certified Information Security Manager (CISM)
- Prod: ISACA
- Usage: Useful for understanding the broader information security landscape and facilitating integration between physical and cyber security functions.
- Cert: Certified Fraud Examiner (CFE)
- Prod: Association of Certified Fraud Examiners (ACFE)
- Usage: Beneficial for leading internal investigations and understanding financial crime, which often has physical security implications.
Recommended Activities
- Active participation and leadership roles in industry associations like ASIS International, The Security Institute, or similar global bodies.
- Regular attendance at executive-level security conferences and summits (e.g., GSX, ISC West, Black Hat/RSA for cyber-physical insights).
- Enrolling in executive leadership programmes or specific courses on strategic risk management, organisational change, or advanced negotiation.
- Mentoring junior security professionals and contributing thought leadership through articles or presentations on emerging security trends.
Career Progression Pathways
Entry Paths to This Role
- Path: Regional Security Manager (Large Enterprise)
- Time: 5-8 years as a Regional Security Manager
- Path: Head of Security Operations (Large Corporation, Non-Real Estate)
- Time: 7-10 years in a similar enterprise-level security leadership role
- Path: Senior Security Consultant (Major Consulting Firm)
- Time: 8-12 years in senior security consulting roles, with a focus on real estate clients
Career Progression From This Role
- Pathway: Chief Security Officer (CSO) / VP, Global Security
- Time: 3-5 years as Director of Physical Security
- Pathway: Chief Operating Officer (COO) - Real Estate Division
- Time: 5-7 years as Director of Physical Security
Long Term Vision Potential Roles
- Title: Chief Security Officer (CSO) / VP, Global Security
- Time: 3-5 years
- Title: Chief Operating Officer (COO) - Real Estate Division
- Time: 5-7 years
- Title: Board Member / Security Advisor
- Time: 7-10+ years
Sector Mobility
Your expertise in enterprise-level physical security, risk management, and strategic leadership is highly transferable. You could move into similar C-Suite or VP-level security roles in other large, asset-intensive industries like logistics, manufacturing, critical infrastructure, or even major tech companies with significant physical footprints.
How Zavmo Delivers This Role's Development
DISCOVER Phase: Skills Gap Analysis
Zavmo maps your current competencies against all requirements in this job description through conversational assessment. We evaluate your foundation skills (communication, strategic thinking), functional skills (CRM expertise, negotiation), and readiness for career progression.
Output: Personalised skills gap heat map showing strengths and priorities, estimated time to competency, neurodiversity accommodations.
DISCUSS Phase: Personalised Learning Pathway
Based on your DISCOVER results, Zavmo creates a personalised learning plan prioritised by impact: foundation skills first, then functional skills. We adapt to your learning style, pace, and neurodiversity needs (ADHD, dyslexia, autism).
Output: Week-by-week schedule, each module linked to specific job responsibilities, checkpoints and milestones.
DELIVER Phase: Conversational Learning
Learn through conversation, not boring modules. Zavmo uses 10 conversation types (Socratic dialogue, role-play, coaching, case studies) to build competence. Practice difficult QBR presentations, negotiate tough renewals, and handle churn conversations in a safe AI environment before facing real clients.
Example: "For 'Stakeholder Mapping', Zavmo will guide you through analysing a complex enterprise account, identifying key decision-makers, and building an engagement strategy."
DEMONSTRATE Phase: Competency Assessment
Zavmo automatically builds your evidence portfolio as you learn. Every conversation, practice scenario, and application example is captured and mapped to NOS performance criteria. When ready, your portfolio supports OFQUAL qualification claims and demonstrates competence to employers.
Output: Competency matrix, evidence portfolio (downloadable), qualification readiness, career progression score.