- Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
Occupations with related tasks Save Table: XLSX CSV
- Examine records and governmental agency files to find identifying data about suspects.
- Analyze completed police reports to determine what additional information and investigative work is needed.
- Examine records to locate links in chains of evidence or information.
- Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records.
- Secure deceased body and obtain evidence from it, preventing bystanders from tampering with it prior to medical examiner's arrival.
- Obtain summary of incident from officer in charge at crime scene, taking care to avoid disturbing evidence.
- Search for and collect evidence, such as fingerprints, using investigative equipment.
- Check victims for signs of life, such as breathing and pulse.
- Obtain facts or statements from complainants, witnesses, and accused persons and record interviews, using recording device.
- Record progress of investigation, maintain informational files on suspects, and submit reports to commanding officer or magistrate to authorize warrants.
- Prepare reports that detail investigation findings.
- Prepare charges or responses to charges, or information for court cases, according to formalized procedures.
- Preserve, process, and analyze items of evidence obtained from crime scenes and suspects, placing them in proper containers and destroying evidence no longer needed.
- Note, mark, and photograph location of objects found, such as footprints, tire tracks, bullets and bloodstains, and take measurements of the scene.
- Secure persons at scene, keeping witnesses from conversing or leaving the scene before investigators arrive.
- Provide information to lab personnel concerning the source of an item of evidence and tests to be performed.
- Prepare and serve search and arrest warrants.
- Question individuals or observe persons and establishments to confirm information given to patrol officers.
- Determine scope, timing, and direction of investigations.
- Participate or assist in raids and arrests.
- Organize scene search, assigning specific tasks and areas of search to individual officers and obtaining adequate lighting as necessary.
- Summon medical help for injured individuals and alert medical personnel to take statements from them.
- Notify command of situation and request assistance.
- Block or rope off scene and check perimeter to ensure that entire scene is secured.
- Identify case issues and evidence needed, based on analysis of charges, complaints, or allegations of law violations.
- Notify, or request notification of, medical examiner or district attorney representative.
- Collaborate with other offices and agencies to exchange information and coordinate activities.
- Maintain surveillance of establishments to obtain identifying information on suspects.
- Testify before grand juries concerning criminal activity investigations.
- Perform undercover assignments and maintain surveillance, including monitoring authorized wiretaps.
- Examine records and governmental agency files to find identifying data about suspects.
- Analyze completed police reports to determine what additional information and investigative work is needed.
- Examine records to locate links in chains of evidence or information.
- Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records.
- Secure deceased body and obtain evidence from it, preventing bystanders from tampering with it prior to medical examiner's arrival.
- Obtain summary of incident from officer in charge at crime scene, taking care to avoid disturbing evidence.
- Search for and collect evidence, such as fingerprints, using investigative equipment.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Adhere to legal policies and procedures related to handling digital media.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Preserve and maintain digital forensic evidence for analysis.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Inspect and adjust security equipment to ensure it is operational or to detect evidence of tampering.
- Monitor closed-circuit television cameras.
- Screen individuals and belongings to prevent passage of prohibited materials using walkthrough detectors, wands, or bag searches.
- Investigate disturbances on the premises, such as security alarms, altercations, and suspicious activity.
- Advise employees in handling problems or resolving complaints from customers, tenants, detainees, or other persons.
- Assign security personnel to posts or patrols.
- Call police or fire departments in cases of emergency, such as fire, bomb threats, and presence of unauthorized persons.
- Develop and document security procedures, policies, or standards.
- Explain company policies and procedures to staff using oral or written communication.
- Log items distributed to persons, such as keys and key cards.
- Monitor and authorize entry of employees, visitors, or other persons.
- Monitor the behavior of security employees to ensure adherence to quality standards, deadlines, or procedures.
- Order materials or supplies, such as keys, uniforms, and badges.
- Patrol the premises to prevent or detect intrusion, protect property, or preserve order.
- Recruit, interview, and hire security personnel.
- Schedule training or drills for emergencies, such as fires, bombs, and other threats.
- Secure entrances and exits by locking doors and gates.
- Train security personnel on protective procedures, first aid, fire safety, and other duties.
- Write and present department budgets to upper management or other stakeholders.
- Write reports documenting observations made while on patrol.
- Apprehend or evict trespassers, rule violators, or other security threats from the premises.
- Inspect and adjust security equipment to ensure it is operational or to detect evidence of tampering.
- Monitor closed-circuit television cameras.
- Screen individuals and belongings to prevent passage of prohibited materials using walkthrough detectors, wands, or bag searches.
- Investigate disturbances on the premises, such as security alarms, altercations, and suspicious activity.
- Search computer databases, credit reports, public records, tax or legal filings, or other resources to locate persons or to compile information for investigations.
- Obtain and analyze information on suspects, crimes, or disturbances to solve cases, to identify criminal activity, or to gather information for court cases.
- Expose fraudulent insurance claims or stolen funds.
- Investigate companies' financial standings, or locate funds stolen by embezzlers, using accounting skills.
- Write reports or case summaries to document investigations.
- Conduct private investigations on a paid basis.
- Conduct personal background investigations, such as pre-employment checks, to obtain information about an individual's character, financial status, or personal history.
- Testify at hearings or court trials to present evidence.
- Question persons to obtain evidence for cases of divorce, child custody, or missing persons or information about individuals' character or financial status.
- Observe and document activities of individuals to detect unlawful acts or to obtain evidence for cases, using binoculars and still or video cameras.
- Confer with establishment officials, security departments, police, or postal officials to identify problems, provide information, or receive instructions.
- Perform undercover operations, such as evaluating the performance or honesty of employees by posing as customers or employees.
- Alert appropriate personnel to suspects' locations.
- Count cash and review transactions, sales checks, or register tapes to verify amounts or to identify shortages.
- Monitor industrial or commercial properties to enforce conformance to establishment rules and to protect people or property.
- Apprehend suspects and release them to law enforcement authorities or security personnel.
- Warn troublemakers causing problems on establishment premises and eject them from premises when necessary.
- Search computer databases, credit reports, public records, tax or legal filings, or other resources to locate persons or to compile information for investigations.
- Obtain and analyze information on suspects, crimes, or disturbances to solve cases, to identify criminal activity, or to gather information for court cases.
- Expose fraudulent insurance claims or stolen funds.
- Investigate companies' financial standings, or locate funds stolen by embezzlers, using accounting skills.
- Operate detecting devices to screen individuals and prevent passage of prohibited articles into restricted areas.
- Inspect and adjust security systems, equipment, or machinery to ensure operational use and to detect evidence of tampering.
- Answer alarms and investigate disturbances.
- Lock doors and gates of entrances and exits to secure buildings.
- Patrol industrial or commercial premises to prevent and detect signs of intrusion and ensure security of doors, windows, and gates.
- Respond to medical emergencies by administering basic first aid or by obtaining assistance from paramedics.
- Circulate among visitors, patrons, or employees to preserve order and protect property.
- Monitor and authorize entrance and departure of employees, visitors, and other persons to guard against theft and maintain security of premises.
- Write reports of daily activities and irregularities, such as equipment or property damage, theft, presence of unauthorized persons, or unusual occurrences.
- Warn persons of rule infractions or violations, and apprehend or evict violators from premises, using force when necessary.
- Answer telephone calls to take messages, answer questions, and provide information during non-business hours or when switchboard is closed.
- Call police or fire departments in cases of emergency, such as fire or presence of unauthorized persons.
- Escort or drive motor vehicle to transport individuals to specified locations or to provide personal protection.
- Monitor and adjust controls that regulate building systems, such as air conditioning, furnace, or boiler.
- Operate detecting devices to screen individuals and prevent passage of prohibited articles into restricted areas.
- Inspect and adjust security systems, equipment, or machinery to ensure operational use and to detect evidence of tampering.
- Answer alarms and investigate disturbances.
- Observe casino or casino hotel operations for irregular activities, such as cheating or theft by employees or patrons, using audio and video equipment and one-way mirrors.
- Review video surveillance footage.
- Monitor establishment activities to ensure adherence to all state gaming regulations and company policies and procedures.
- Report all violations and suspicious behaviors to supervisors, verbally or in writing.
- Develop and maintain log of surveillance observations.
- Inspect and monitor audio or video surveillance equipment to ensure it is working appropriately.
- Act as oversight or security agents for management or customers.
- Supervise or train surveillance observers.
- Observe casino or casino hotel operations for irregular activities, such as cheating or theft by employees or patrons, using audio and video equipment and one-way mirrors.
- Review video surveillance footage.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Gather cyber intelligence to identify vulnerabilities.
- Identify security system weaknesses, using penetration tests.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.