Security System Design Consultant

Securitas Security Services
Full-time

📍 Job Overview

Job Title: Security System Design Consultant

Company: Securitas Security Services USA, Inc.

Location: Remote (Parsippany, NJ based, with 20% travel, including international)

Job Type: Full-time

Category: Security Operations / GTM Consulting

Date Posted: May 06, 2026

Experience Level: 1-3 Years (Associate's Degree + 1 Year Experience)

Remote Status: Fully Remote

🚀 Role Summary

  • Design, develop, and deliver comprehensive physical security solutions to protect client assets, personnel, and operations.

  • Collaborate with clients and internal teams to conduct thorough risk assessments and translate business requirements into effective technical security designs.

  • Oversee the implementation, testing, and documentation of security systems, ensuring alignment with industry best practices and global standards.

  • Provide expert consultation and leadership in security system governance, compliance, and strategic planning to enhance client security postures.

  • Leverage strong IT literacy and specialized design tools to create detailed security layout drawings and system specifications.

📝 Enhancement Note: This role is positioned as a "Consultant" within a large security services organization, indicating a focus on client-facing advisory and solution design rather than purely internal operations. The emphasis on "design" and "development" suggests a proactive, strategic approach to security solutions, aligning with GTM and specialized consulting functions within operations. The inclusion of "international travel" and a remote-first approach for a US-based company hints at a global client base and a need for adaptability.

📈 Primary Responsibilities

  • Security System Design & Development: Create detailed designs for integrated physical security systems, encompassing access control, video surveillance, intrusion detection, and alarm systems, ensuring they meet client-specific risk profiles and operational needs.

  • Client Risk Assessment & Needs Analysis: Conduct on-site and remote assessments to identify vulnerabilities, analyze threats, and understand client business objectives to inform security design strategies.

  • Technical Specification & Documentation: Develop comprehensive technical specifications, system architecture diagrams, and installation documentation, including floor plans, wiring schematics, and Bill of Materials (BOMs).

  • Project Planning & Governance: Contribute to end-to-end project planning, including scope definition, timeline estimation, resource allocation, and risk management strategies for security system deployments.

  • System Integration & Testing: Oversee and participate in functional, integration, network connectivity, communication, environmental, power, and alarm testing to ensure system performance and reliability.

  • Stakeholder Communication & Collaboration: Serve as a primary point of contact for clients, project managers, installation teams, and IT departments, ensuring clear communication and effective collaboration throughout the project lifecycle.

  • Procurement Support: Assist in the procurement process by defining system requirements, evaluating vendor proposals, and supporting purchasing decisions for security hardware and software.

  • Security Governance & Compliance: Ensure all designed systems adhere to relevant industry standards (e.g., ISO, ANSI/ASIS), local codes, regulations, and client-specific compliance mandates.

  • Physical Inspection & Site Surveys: Conduct physical site inspections to validate design integrity, assess installation progress, and identify any deviations from planned specifications.

  • Training & Knowledge Transfer: Develop and deliver training materials for client personnel and internal teams on the operation, maintenance, and management of implemented security systems.

📝 Enhancement Note: The responsibilities blend technical design with project management and client interaction, suggesting a role that requires both technical depth in security systems and strong interpersonal and organizational skills. The explicit mention of various testing phases (Functional, Integration, Network Connectivity, Communication, Environmental & Power, Alarm & Notification) indicates a rigorous quality assurance process.

🎓 Skills & Qualifications

Education:

  • Associate's Degree required.

Experience:

  • Minimum of 1 year of responsible experience in the security industry, business management, or a related technical design field.

Required Skills:

  • Physical Security Systems Knowledge: Solid understanding of access control, CCTV, intrusion detection, and alarm systems.

  • IT Literacy: Strong working knowledge of IT principles, networking fundamentals, and common IT infrastructure relevant to security systems.

  • Microsoft Office Proficiency: Advanced skills in Word, Excel, PowerPoint, and Outlook for documentation, communication, and analysis.

  • Organizational Skills: Ability to manage multiple tasks, prioritize effectively, and maintain meticulous records.

  • Communication Skills: Excellent written and verbal communication skills for engaging with clients, technical teams, and management.

  • Problem-Solving: Aptitude for analyzing complex issues and developing practical, effective solutions.

  • Self-Discipline & Adaptability: Ability to work independently in a remote setting and adapt to evolving project requirements and client needs.

Preferred Skills:

  • AutoCAD LT Proficiency: Experience using AutoCAD LT for developing and modifying 2D security system layout drawings.

  • Knowledge of Codes & Regulations: Familiarity with applicable local codes, regulations, and legislative requirements related to security systems.

  • Project Management Fundamentals: Basic understanding of project management methodologies and tools.

  • Security Design Certifications: Relevant certifications (e.g., CPP, PSP, CISSP) are advantageous.

📝 Enhancement Note: The requirement for "at least 18 years of age" is a standard compliance check for employment. The "1 Year of Responsible Experience" is a key indicator of an entry-to-mid-level consultant role, where foundational knowledge is more critical than extensive years of experience. The preference for AutoCAD LT and regulatory knowledge suggests a desire for candidates who can hit the ground running with practical design and compliance aspects.

📊 Process & Systems Portfolio Requirements

Portfolio Essentials:

  • Design Case Studies: Showcase examples of security system designs developed for various client environments, highlighting the problem, proposed solution, and key design considerations.

  • Technical Drawings: Include samples of 2D floor plans, system layouts, and schematics created using CAD software (preferably AutoCAD LT) for security systems.

  • Risk Assessment Summaries: Present anonymized examples of risk assessment methodologies applied and the types of vulnerabilities identified.

  • Project Deliverables: Demonstrate experience with creating technical specifications, scope documents, and installation guides for security projects.

  • Testing & Validation Reports: Provide examples of test plans, execution reports, and issue resolution documentation for security system implementations.

Process Documentation:

  • Workflow Design: Illustrate understanding of designing and documenting workflows for security system design, procurement, installation, and testing phases.

  • Implementation Standards: Showcase familiarity with establishing and adhering to implementation standards for hardware and software deployment.

  • Performance Analysis: Present methods for analyzing system performance data and identifying areas for optimization or improvement post-implementation.

📝 Enhancement Note: For a Security System Design Consultant role, a portfolio is crucial for demonstrating practical design capabilities and project execution. The emphasis should be on visual representations of designs (drawings, schematics) and clear documentation of processes and outcomes. This role requires a candidate who can translate theoretical knowledge into tangible, well-documented security solutions.

💵 Compensation & Benefits

Salary Range: $130,000 Annually.

Benefits:

  • Comprehensive Medical Coverage: Includes employer-provided medical insurance.

  • Dental & Vision Insurance: Full benefit package covering dental and vision care.

  • Life Insurance: Company-paid life insurance, with options for voluntary life and disability insurance.

  • Retirement Savings: 401K plan available, with a retirement plan included.

  • Paid Time Off: 5 Vacation Days accrued annually, plus paid holidays and general paid time away from work (PTO policy may vary based on local requirements).

  • Employee Assistance Program (EAP): Confidential support services for personal and work-related issues.

  • Discount Program: Securitas Saves discount program for various services and products.

  • Potential for Daily Wage Access: Some populations may access earned wages prior to payday (restrictions and fees may apply).

Working Hours:

  • Standard full-time employment, typically 40 hours per week.

  • Flexibility may be required to accommodate client needs, project deadlines, and international time zones, especially given the remote nature of the role.

📝 Enhancement Note: The stated salary of $130,000 annually in Parsippany, NJ, is competitive for a remote role with 20% travel and international scope, especially for a consultant position requiring specialized skills. The benefits package is robust, covering essential health, financial, and work-life balance aspects. The mention of "Client Benefits" is unusual and might refer to perks or services provided to clients that the consultant contributes to, or it could be a placeholder.

🎯 Team & Company Context

🏢 Company Culture

Industry: Security & Safety Services, Technology Integration, Consulting.

Company Size: Over 340,000 employees globally, making Securitas a large, established player in the security industry with significant reach and resources.

Founded: Securitas AB was founded in 1934 in Helsingborg, Sweden. Securitas Security Services USA, Inc. is the US subsidiary.

Team Structure:

  • Operations Focus: The role likely sits within a specialized division focused on security solutions design, technology integration, or client consulting, bridging sales/GTM and technical delivery.

  • Reporting: Likely reports to a Director or Manager of Security Solutions, Security Design, or Client Services, with potential matrixed reporting for project-specific assignments.

  • Collaboration: High degree of cross-functional collaboration with sales teams, project managers, field technicians, IT support, and client stakeholders.

Methodology:

  • Data-Driven Design: Emphasizes using risk assessment data, client needs analysis, and industry best practices to inform security system designs.

  • Process Optimization: Focus on streamlining the design, implementation, and testing phases of security projects to ensure efficiency and client satisfaction.

  • Technological Integration: Commitment to leveraging advanced security technologies and IT principles in solution development.

Company Website: https://www.securitasinc.com

📝 Enhancement Note: Securitas' global presence and long history suggest a stable, well-resourced organization. The emphasis on core values (Integrity, Vigilance, Helpfulness) implies a culture that prioritizes ethical conduct, attentiveness, and proactive support. For a consultant role, this translates to building trust and delivering reliable, effective solutions.

📈 Career & Growth Analysis

Operations Career Level: This role is positioned as a "Consultant," typically indicating an individual contributor role with specialized expertise. It appears to be an entry-to-mid-level position within the security design and consulting domain, suitable for someone with foundational experience and a strong desire to grow in the field.

Reporting Structure: The consultant will likely report to a senior manager or director within the security solutions or consulting arm of Securitas. Project work may involve collaboration with various teams, including sales, project management, and technical implementation, offering exposure to different facets of the business.

Operations Impact: This role directly impacts client satisfaction and security effectiveness by designing robust, tailored security solutions. Successful designs and implementations contribute to client retention, revenue generation for Securitas, and the company's reputation for delivering high-quality security services. The consultant's work is critical in bridging the gap between client needs and technical capabilities, ensuring projects meet objectives and deliver tangible security improvements.

Growth Opportunities:

  • Specialization: Advance into senior consultant roles, focusing on specific security technologies (e.g., advanced video analytics, cybersecurity integration) or client verticals.

  • Leadership: Progress into team lead or management positions within the security design or solutions department, overseeing junior consultants and managing larger initiatives.

  • Technical Expertise: Develop deeper expertise in areas like network security, IT infrastructure for security systems, or specific compliance frameworks.

  • Project Management: Transition into dedicated project management roles for complex security deployments.

  • Sales/GTM Enablement: Move into roles that support the sales cycle through technical pre-sales consultation and solution architecture.

📝 Enhancement Note: The "1 Year of Responsible Experience" requirement positions this as an excellent growth opportunity for individuals looking to build a career in security system design and consulting within a large, established organization. The diverse responsibilities offer a broad learning experience, paving the way for specialization or broader management roles.

🌐 Work Environment

Office Type: Fully Remote. This offers significant flexibility for employees to work from their preferred location within the United States.

Office Location(s): While the role is remote, the company headquarters or a primary administrative hub is in Parsippany, NJ. Travel is expected at 20%, which could include client sites across the US and potentially international locations.

Workspace Context:

  • Autonomy: Employees are expected to maintain a productive home office environment.

  • Technology: Access to necessary software (Microsoft Office, AutoCAD LT) and potentially company-provided hardware or stipends.

  • Collaboration: Frequent use of virtual collaboration tools (e.g., video conferencing, instant messaging, project management platforms) to connect with colleagues and clients.

  • Travel Integration: The 20% travel requirement means the remote work setup must be adaptable to support periods of on-site client engagement.

Work Schedule:

  • Primarily standard business hours (e.g., 9 AM - 5 PM EST) in alignment with the company's primary operating time zone.

  • Flexibility may be needed to attend meetings with international clients or address urgent project issues, potentially outside of typical hours.

📝 Enhancement Note: The "Remote OK" status with a specific US region preference and travel requirements is common for consulting roles. Candidates should be comfortable with a distributed team environment and prepared for regular travel, which is a significant component of the role.

📄 Application & Portfolio Review Process

Interview Process:

  • Initial Screening: A recruiter or HR representative will likely conduct a brief call to assess basic qualifications, interest, and cultural fit.

  • Hiring Manager Interview: A more in-depth discussion with the hiring manager focusing on experience, technical skills, and understanding of security system design principles. Expect questions about past projects and problem-solving approaches.

  • Technical Assessment/Case Study: Candidates may be asked to complete a technical assessment or present a case study from their portfolio demonstrating their design capabilities, risk assessment methodology, and ability to articulate technical solutions.

  • Team/Cross-Functional Interview: Meet with potential colleagues or stakeholders from related departments (e.g., sales, project management) to evaluate collaboration style and fit within the broader team.

  • Final Interview: Potentially with a senior leader for final approval, focusing on strategic thinking and long-term fit.

Portfolio Review Tips:

  • Curate Selectively: Choose 2-3 of your strongest, most relevant projects that showcase a range of skills (design, documentation, problem-solving).

  • Structure for Clarity: For each project, clearly outline the client's challenge, your role and responsibilities, the proposed security solution, key design elements, and the outcome or impact.

  • Highlight Technical Skills: Specifically point out instances where you used AutoCAD LT, applied IT principles, or adhered to compliance standards.

  • Quantify Results: If possible, use metrics to demonstrate the effectiveness of your designs (e.g., reduction in incident response time, improvement in system coverage).

  • Be Prepared to Discuss: Be ready to elaborate on any aspect of your portfolio, including design choices, challenges encountered, and alternative solutions considered.

Challenge Preparation:

  • Scenario-Based Questions: Prepare to answer hypothetical questions about designing security systems for specific client scenarios (e.g., a retail chain, a corporate office, a manufacturing facility).

  • Technical Deep Dive: Brush up on common security technologies (IP cameras, NVRs/DVRs, access control readers, alarm panels) and their integration.

  • IT Fundamentals: Review networking concepts (IP addressing, VLANs, bandwidth requirements for video) and IT security best practices.

  • Compliance Standards: Familiarize yourself with relevant security standards and regulations that might apply.

  • Communication Practice: Practice articulating complex technical information clearly and concisely, tailoring your explanation to different audiences.

📝 Enhancement Note: Given the "Consultant" title and the nature of the role, expect interviewers to probe deeply into your problem-solving abilities, design methodology, and client-facing communication skills. A well-prepared portfolio is essential for this role, serving as the primary evidence of your capabilities.

🛠 Tools & Technology Stack

Primary Tools:

  • AutoCAD LT: Essential for creating and modifying 2D security system layout drawings. Proficiency is highly preferred.

  • Microsoft Office Suite:

    • Word: For technical specifications, reports, and documentation.
    • Excel: For data analysis, BOM creation, and tracking project details.
    • PowerPoint: For client presentations and internal reports.
    • Outlook: For communication and calendar management.
  • Project Management Software: Likely exposure to tools such as Microsoft Project, Asana, Trello, or similar for planning and tracking projects.

  • Communication Platforms: Slack, Microsoft Teams, Zoom, or similar for remote team collaboration and client meetings.

Analytics & Reporting:

  • Spreadsheets: For basic data analysis of system performance or project metrics.

  • Reporting Tools: Internal Securitas tools or standard reporting formats for project status, test results, and client summaries.

CRM & Automation:

  • CRM System: Potential interaction with a CRM (e.g., Salesforce, Microsoft Dynamics) for client information and project tracking, though not explicitly stated as a primary tool for the consultant.

  • Automation Tools: May encounter or recommend automation for reporting or system configuration, but not a core requirement for this role.

📝 Enhancement Note: The explicit mention of AutoCAD LT is a key technical requirement. Proficiency in Microsoft Office is standard, but advanced use for technical documentation and data management will be crucial. Familiarity with remote collaboration tools is also a given for a remote role.

👥 Team Culture & Values

Operations Values:

  • Integrity: Upholding honesty, ethical conduct, and trustworthiness in all client interactions and design decisions. This means designing solutions that are truly in the client's best interest, not just the easiest or most profitable.

  • Vigilance: A keen attention to detail in design, risk assessment, and system testing. This translates to proactively identifying potential issues and ensuring thoroughness in all deliverables.

  • Helpfulness: A proactive and supportive approach to clients and internal teams, aiming to provide clear guidance, resolve issues efficiently, and contribute to overall project success.

  • Customer Focus: Dedication to understanding and meeting client needs, ensuring that security solutions are effective, reliable, and aligned with business objectives.

  • Continuous Improvement: A mindset of seeking ways to enhance security designs, optimize processes, and stay updated with the latest security technologies and best practices.

Collaboration Style:

  • Remote & Hybrid: Primarily remote collaboration, relying heavily on digital communication tools and scheduled virtual meetings.

  • Cross-Functional: Active involvement with sales, project management, and technical teams, requiring clear articulation of ideas and collaborative problem-solving.

  • Client-Centric: A strong emphasis on building rapport and trust with clients, acting as a reliable advisor and partner.

  • Document-Driven: Reliance on well-documented designs, specifications, and reports to ensure clarity and alignment across distributed teams and stakeholders.

📝 Enhancement Note: The company's core values (Integrity, Vigilance, Helpfulness) are directly applicable to the behavior and work ethic expected of a Security System Design Consultant. Candidates should be prepared to demonstrate how they embody these values in their professional approach.

⚡ Challenges & Growth Opportunities

Challenges:

  • Balancing Client Needs vs. Budget: Designing optimal security solutions while adhering to client budget constraints requires creative problem-solving and prioritization skills.

  • Evolving Technology Landscape: Keeping pace with rapid advancements in security technology, IT infrastructure, and cybersecurity threats requires continuous learning.

  • Remote Collaboration Dynamics: Maintaining effective communication, team cohesion, and project momentum in a fully remote environment can be challenging.

  • International Travel Logistics: Managing travel schedules, adapting to different cultural contexts, and ensuring productivity while on the road.

  • Interpreting Diverse Client Requirements: Understanding and translating the unique security needs and operational constraints of a wide range of clients.

Learning & Development Opportunities:

  • Technical Certifications: Opportunity to pursue advanced certifications in specific security technologies or project management (e.g., ASIS certifications, PMP).

  • Industry Conferences & Training: Access to industry events and specialized training programs to stay current with trends and technologies.

  • Mentorship: Potential for mentorship from senior security consultants or leaders within Securitas.

  • Cross-Functional Exposure: Gaining experience in sales engineering, project management, and client relations through project involvement.

  • Global Exposure: Working with international clients provides exposure to diverse security challenges and regulatory environments.

📝 Enhancement Note: Identifying potential challenges allows candidates to demonstrate foresight and preparedness. Highlighting learning opportunities shows a commitment to professional growth, which is attractive to employers.

💡 Interview Preparation

Strategy Questions:

  • "Describe a complex physical security system you designed. What were the key challenges, and how did you overcome them?" (Focus on process, problem-solving, and design rationale).

  • "How do you approach translating a client's business requirements into a technical security design?" (Assess understanding of needs analysis and solution architecture).

  • "Walk me through your process for conducting a risk assessment for a new client site." (Demonstrate methodology and thoroughness).

Company & Culture Questions:

  • "How do you embody Securitas' core values of Integrity, Vigilance, and Helpfulness in your work?" (Assess cultural alignment).

  • "What are your expectations for collaboration in a remote team environment?" (Gauge remote work readiness and communication style).

Portfolio Presentation Strategy:

  • Storytelling: Frame each project as a narrative: the problem, your approach, the solution, and the outcome.

  • Visual Aids: Use clear, concise slides with diagrams, photos, and key data points. Ensure any sensitive client information is anonymized.

  • Technical Depth: Be prepared to explain the technical rationale behind your design choices and the functionality of various components.

  • Client Focus: Emphasize how your design addressed the client's specific needs and delivered value.

  • Conciseness: Respect time limits. Practice your presentation to be impactful and to the point.

Challenge Preparation:

  • Design a system for [Scenario]: Be ready to sketch out a basic security system design for a given scenario (e.g., a small office building, a retail store).

  • Troubleshooting: Expect questions related to common security system failures or integration issues.

  • Tool Proficiency: Be prepared to discuss your experience with AutoCAD LT and other relevant software.

📝 Enhancement Note: Tailor your answers to highlight how your skills and experience directly address the responsibilities and requirements of a Security System Design Consultant role, emphasizing your ability to work remotely and travel as needed.

📌 Application Steps

To apply for this Security System Design Consultant position:

  • Submit your application through the provided Oracle Cloud link.

  • Tailor Your Resume: Highlight experience in physical security systems, IT literacy, risk assessment, and any relevant design software (especially AutoCAD LT). Quantify achievements where possible.

  • Prepare Your Portfolio: Curate 2-3 strong case studies showcasing your design work, technical documentation, and problem-solving skills. Ensure it's professional and easy to navigate.

  • Practice Interview Responses: Prepare answers for strategy, technical, and behavioral questions, focusing on your design process, client interaction, and alignment with Securitas' values. Practice presenting your portfolio.

  • Research Securitas: Understand their services, core values, and recent company news to demonstrate genuine interest and cultural fit.

⚠️ Important Notice: This enhanced job description includes AI-generated insights and operations industry-standard assumptions. All details should be verified directly with the hiring organization before making application decisions.

Application Requirements

Candidates must have an associate's degree and at least one year of experience in the security industry or business management. Proficiency in IT principles and AutoCAD LT is preferred, along with strong organizational and communication skills.