Ontario Skills Passport
Layout structure
Header structure
Display Noc
OSP Occupational Profile

OSP Occupational Profile

Print Occupational Profile

Display page browsing back option list
Display page browsing back option list <<Back
Display Noc Details
NOC Code: NOC Code: 6541 Occupation: Other Protective Service Occupations
Occupation Description: Occupation Description:
This unit group includes workers who conduct private investigations for clients or employers, implement security measures to protect property against theft and fire and provide other protective services not elsewhere classified. They are employed by security and investigation service companies, hotels, retail establishments, businesses and industry, or they may be self-employed. This unit group includes workers who conduct private investigations for clients or employers, implement security measures to protect property against theft and fire and provide other protective services not elsewhere classified. They are employed by security and investigation service companies, hotels, retail establishments, businesses and industry, or they may be self-employed.

  • Click on any of the Essential Skills to view sample workplace tasks for this occupation.
  • Scroll down the page to get information on career planning, education and training, and employment and volunteer opportunities.

Table will display the Skill Level for the Noc specified
Essential Skills Essential Skills Levels
Reading Reading 1 2 3 4
Writing Writing 1 2 3 4
Document Use Document Use 1 2 3 4
Digital Technology Digital Technology 1 2 3
Oral Communication Oral Communication 1 2 3
Money Math Money Math 1 2 3
Scheduling or Budgeting and Accounting Scheduling or Budgeting and Accounting 1 2 3
Measurement and Calculation Measurement and Calculation 1 2
Data Analysis Data Analysis 1 2 3
Numerical Estimation Numerical Estimation 1 2 3
Job Task Planning and Organizing Job Task Planning and Organizing 1 2 3
Decision Making Decision Making 1 2 3
Problem Solving Problem Solving 1 2 3
Finding Information Finding Information 1 2 3
Critical Thinking Critical Thinking 1 2 3

  • The skill levels represented in the above chart illustrate the full range of sample tasks performed by experienced workers and not individuals preparing for or entering this occupation for the first time.
  • Note that some occupational profiles do not include all Numeracy and Thinking Essential Skills.

If you would like to print a copy of the chart and sample tasks, click on the "Print Occupational Profile" button at the top of the page.

  • Read email messages from clients and from other protective service personnel. (1)
  • Read arrest warrants and rights statements to persons being arrested. (1)
  • Read short instructions on forms, e.g. read short instructions to learn how to complete incident report forms. (1)
  • Read logbook entries and short notes, e.g. read logbook entries and short notes from co-workers to learn about events that occurred during other shifts. (1)
  • Read information sheets, e.g. read information sheets to learn security and surveillance techniques for underpasses and tunnels. (2)
  • Read letters from clients with information which will aid an investigation. (2)
  • Read instructions and best practice procedures, e.g. read emergency response procedures to learn how to correctly respond to medical emergencies, fires, hazardous material spills, bomb threats, hostage situations, storms, gas leaks and acts of terrorism. (2)
  • Read short reports, e.g. read short reports to learn the details of security incidents. (2)
  • Read email and memos, e.g. read email messages and memos from supervisors to learn about changes to operating procedures and schedules. (2)
  • Read security contracts to clarify the extent of the duties. (2)
  • Read court information relating to searches, and other legal documents such as mortgage papers, liens and law suits. (3)
  • Read equipment and operating manuals, e.g. read operating manuals for the set-up and use of electronic surveillance equipment. (3)
  • Read security alerts and bulletins, e.g. read detailed security bulletins issued by police departments to learn about potential terrorist threats and how to report suspicious activities. (3)
  • Read trade magazines to stay up-to-date with new technology in the security industry. (3)
  • Read regulations, e.g. read sections of the Trespass Act to learn which premises are covered by the legislation. (4)
  • Read sections of the Criminal Code to understand the ways in which the law applies to particular investigations. (4)
Back to Top

  • Write reminder notes to yourself about tasks to be completed. (1)
  • Write short notes to co-workers, e.g. write short notes to co-workers to inform them about faulty video display units. (1)
  • Write short text passages in logbooks, e.g. describe noteworthy incidents in logbooks at the end of shifts. (2)
  • Enter comments on a variety of forms, e.g. write comments in fire alarm and police statement forms. (2)
  • Write case notes containing detailed information about a surveillance. (2)
  • Write letters to outside agencies to get information for an investigation. (2)
  • Write memos to co-workers concerning investigations in progress. (2)
  • Write investigation or incident reports to summarize activities undertaken during an investigation and to present conclusions. (3)
  • Write detailed accounts of incidents, e.g. write detailed accounts of events involving people in distress, violence, thefts and security breaches. (3)
  • Write reports to evaluate a client's security needs and to recommend security systems, equipment and procedures. (4)
  • Write proposals in response to tenders calling for protective service work and write contracts to specify the work to be completed for a client. (4)
Back to Top

Document Use
  • Consult phone directories, city directories and employee lists. (1)
  • Enter data into daily logs, e.g. enter data, such as equipment identification numbers, times, odometer readings, addresses and locations, into logbooks. (1)
  • Read labels on security products and Workplace Hazardous Materials Information System (WHMIS) labels. (1)
  • Locate data in lists and logs, e.g. locate the names of authorized visitors, dates and times of incidents in daily logs. (1)
  • Refer to city maps, building blueprints and hotel floor plans to pinpoint locations. (2)
  • Study images generated by security cameras and scanners, e.g. study X-ray images produced by scanners to locate prohibited goods, such as knives, explosives and firearms. (2)
  • Complete a variety of forms, e.g. enter information, such as names, dates and times, in incident report forms. (2)
  • Read tables to get information such as security system specifications or details of land registry searches. (2)
  • Interpret maps and floor plans, e.g. interpret floor plans to locate entrances, exits and security threats. (2)
  • Read work schedules and schedules of security installations. (2)
  • Read forms such as service request forms, land registry forms and sheriff's search forms. (2)
  • Complete forms such as shoplifting reports, reports to crown counsel and credit card fraud report forms. (3)
  • Refer to schematic drawings of alarm systems to understand how they work. (3)
  • Refer to graphs to compare data, such as alarm system coverage, from month to month, or to examine trends in crime statistics. (4)
Back to Top

Digital Technology
  • Use calculators and personal digital assistant (PDA) devices to complete numeracy-related tasks, such as summing the value of bank deposits. (1)
  • Use electronic surveillance equipment to monitor codes, alarm systems, buildings and the activities of people. (1)
  • Use X-ray scanners and metal detectors to locate prohibited goods, such as knives, explosives and firearms, in packages and concealed under clothing. (1)
  • Use specialized security databases to retrieve previously completed incident reports and input new ones. (2)
  • Use the Internet to access security alerts and bulletins issued by police departments and other security organizations. (2)
  • Use specialized Internet applications to complete and submit electronic incident reports. (2)
  • Use the Internet to access training courses and seminars offered by trainers, suppliers, colleges, employers and associations. (2)
  • Use electronic surveillance equipment to produce VHS, CD-ROM and DVD copies of surveillance footage captured by security cameras. (2)
  • Use databases to retrieve client information, such as names, addresses and telephone numbers. (2)
  • Use bookkeeping, billing and accounting software. For example, enter invoice information. (2)
  • Use word processing software to prepare reports. (2)
  • Use communications software to exchange email with clients, building owners and co-workers. (2)
  • Use a spreadsheet. For example, produce spreadsheet tables. (3)
Back to Top

Oral Communication
  • Talk to suppliers and delivery personnel, e.g. talk to delivery personnel to determine the content of parcels. (1)
  • Make and listen to announcements over two-way radios. (1)
  • Talk to members of the public when providing access to a building or grounds. (1)
  • Communicate with suppliers of security systems equipment to check on the availability of specific equipment or to discuss the operation of various components. (1)
  • Interact with co-workers and supervisors to co-ordinate schedules and to discuss projects and problems. (2)
  • Discuss building security with clients and building owners, e.g. discuss security concerns and the features and limitations of electronic surveillance systems with building owners. (2)
  • Interact with clients concerning investigations. (2)
  • Exchange information with co-workers, e.g. speak with co-workers to coordinate activities and learn about incidents. (2)
  • Communicate with police officers or other law enforcement officials to exchange information or request assistance. (2)
  • Defuse and de-escalate confrontations with hostile and uncooperative people, e.g. use appropriate language, gestures and tone of voice to de-escalate potentially violent situations. (3)
  • Question suspects and witnesses during an investigation. (3)
  • Make presentations to groups on subjects such as fraud prevention and security awareness. (3)
  • Provide detailed descriptions of events and people, e.g. provide police officers with detailed accounts of events that occurred during robberies. (3)
Back to Top

Money Math
  • Pay for cash-on-delivery parcels and receive change. (1)
  • Total the costs of all items lost to theft when preparing loss prevention reports. (1)
  • Prepare invoices to clients, itemizing the various costs of investigations or protective service contracts, including items purchased, labour charged at an hourly rate and mileage charge, and calculating the applicable taxes and discounts. (3)
Back to Top

Scheduling or Budgeting and Accounting
  • Record totals of denominations of money delivered to banks or bank machines by armoured cars, keeping separate totals for American or other foreign currency. (1)
  • Verify entries to discover discrepancies in financial records. (1)
  • Schedule the allocation of time to complete jobs and itemize the resources required. (2)
  • Determine competitive prices for security systems by comparing them to the price packages offered by the competition. (3)
Back to Top

Measurement and Calculation
  • Measure accident scene particulars such as skid marks and the width of roads. (1)
  • Measure rooms to determine how much wire is required to install a security system. (2)
Back to Top

Data Analysis
  • Calculate summary statistics, e.g. calculate the number of false alarms received each month. (2)
  • Calculate month end averages of expenses and revenues. (2)
  • Analyze patterns in credit card use to discover fraud. (3)
Back to Top

Numerical Estimation
  • Estimate the height and weight of people. (1)
  • Estimate the extent of damage at accident and crime scenes. (2)
  • Estimate the length of time required to complete an investigation or the cost of materials for a security system. (2)
  • Estimate the appropriate cost of a proposal in response to a tender from a client. The estimation is based on equipment needed, unit costs, installation requirements, and an initial analysis of a clients' needs. Consequences of error are serious, including possibly losing a contract. (3)
Back to Top

Job Task Planning and Organizing
  • Security guards and related security service occupations deal with routine operations and make rounds to respond to emergency situations, e.g. deal with intruders or major equipment failures. Planning is usually short term. Most situations, even emergencies, involve well-established procedures. (2)
  • After receiving some general guidance from managers, workers in protective service occupations in this group plan their own work day, setting priorities and adjusting them as required to take into account urgent phone calls or emergencies. While some tasks may be repetitive, such as checking alarm systems or confronting shoplifters, each day is unique because of the variety of people and circumstances encountered. These workers co-ordinate their tasks with co-workers to maximize efficiency. The effective sequencing of tasks is often critical to successful completion of assignments. (3)
Back to Top

Decision Making
  • Decide whether an incident which occurred in a hotel is serious enough to warrant waking the manager. (1)
  • Choose routes, areas and locations to patrol. (1)
  • Decide whom to interview and what records to examine during the course of an investigation. (2)
  • Decide when there is sufficient evidence to question a suspect, such as a person suspected of shoplifting in a store. (2)
  • Decide the order of tasks and the priorities, e.g. decide the order in which to conduct security sweeps using the best available information. (2)
  • Choose security and emergency response measures, e.g. decide how to safely and effectively contend with suspicious activities, intruders and thefts. (3)
  • Decide the priority of investigations and projects, based on the clients' needs and the extent to which leads would turn cold if there were delays in pursuing a case. (3)
Back to Top

Problem Solving
  • There is a suspicion that a customer is shoplifting. Ask the customer to show proof of payment and must determine with store personnel if any excuses given for not having a receipt are valid. (1)
  • A vagrant or a person is causing a disturbance and it may be necessary to move the person out of a building. This may be difficult if the person resists being moved. Use negotiation skills and a mixture of firmness and humour to get the person to co-operate. (2)
  • A person is missing. Attempt to locate the person by following a number of standard investigative procedures. (2)
  • Encounter hostile and uncooperative people. Attempt to ensure the security of yourself and bystanders. Seek the assistance of co-workers and police officers as required. (2)
  • Encounter equipment malfunctions, such as faulty electronic surveillance systems. Attempt to troubleshoot faults and repair the equipment. If unsuccessful, contact supervisors and repair technicians and stand by for further instructions. (2)
  • Encounter emergencies, e.g. encounter people experiencing medical emergencies. Deliver appropriate first aid measures and contact emergency responders at the earliest opportunity. Continue with first aid measures until emergency responders arrive. (3)
  • A case of fraud is proving to be difficult to solve. Call upon various individuals, agencies and law enforcement bodies to provide input to the investigation. (3)
  • A security system is not working. Design appropriate modifications to the current system based on factors such as the presence of pets or children, cost, the time clients are away from home and their lifestyle. A fair amount of time and money may be invested before the solution can be tested. (3)
  • A burglar alarm is frequently going off for no apparent reason. Check the possibilities of human and equipment error. This can be complicated because of the range of security systems in use. (3)
Back to Top

Finding Information
  • Locate phone numbers of tradespersons and contractors by looking in phone directories and by conducting online research. (1)
  • Locate security and repair procedures by looking in a variety of manuals and by speaking with suppliers and co-workers. (2)
  • Contact manufacturers and suppliers to learn about new security equipment or to ask about problems with the operation of security systems. (2)
  • Refer to floor plans and conduct security sweeps to obtain information about exits and fire doors. (2)
  • Use an extensive network of databases, such as financial records, personnel files and police records, to find information which will be helpful in an investigation of fraud or other criminal activities. (3)
  • Refer to the criminal code and other legislation and regulations to find out how the law applies to specific cases. (3)
Back to Top

Critical Thinking
  • Evaluate the operating condition of equipment, e.g. evaluate the operation of surveillance equipment by considering factors, such as the quality and usefulness of images and recordings. (2)
  • Evaluate safety and security threats. Consider the behaviour of people and the risks to property and bystanders. Observe the location of exits and take note of burned out lights, blocked emergency exits and other potential hazards. (3)
  • Evaluate the severity of emergencies. Evaluate the condition of people in physical and emotional distress to determine the most appropriate course of action. (3)
Back to Top