1. How have you used student data to inform planning or assessment?

It has become quite common for teachers to use pre- and post-testing to better determine what our students actually know before we plan and teach lessons. With pre- and post-testing, I can also monitor the growth of each individual student. It has worked really well with the eighth graders in the math classes I teach. Let me show you one example from my portfolio.

2. Give an example of differentiation in a classroom where you have worked?

Working with the sixth-grade teacher next door, we divided students for a math activity, based on the students' needs for review. I was able to work with students who really needed more one-on-one attention to attain higher scores. Even within my group, I modified how I presented information to students who needed more hands-on examples.

3. describe the abilities you have in order to work with us as security management specialist?

I have the ability to communicate information and ideas in speaking so others will understand, tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem, apply general rules to specific problems to produce answers that make sense, listen to and understand information and ideas presented through spoken words and sentences, speak clearly so others can understand you.

4. How have you worked to be an advocate for students who are at-risk in your school?

I currently teach at a high school that is striving to increase its graduation rate. I am assigned a homeroom and I am to monitor students' grades, referring some students to peer intervention and others to counselors if I see danger signs of dropping out. While time consuming, I find that students who know that I am there for them come to me for help. This program makes homeroom teachers the advocates and it works well.

5. Professional learning communities (PLCs) have become more and more common. Describe any experience you have had with a PLC?

While my colleagues and I didn't use the term PLC, we did form a book study group last year for all of the 6th grade teachers on our team. Since we are seeing so many more students coming to our school from lower socio-economic areas, we read a book about teaching students from poverty. We gained some practical ideas, but more importantly, by meeting regularly, we were able to share our frustrations and our successes. I would like to implement something similar when hired here.

6. With so much content to cover with standards, describe your approach to long-term planning?

In the school where I currently teach, we have grade-level meetings to go over our curriculum maps. Curriculum mapping has helped me to see the year at a glance, as well as to look for gaps and overlaps in the curriculum from my grade to another. I can now lead curriculum mapping for a grade level.

7. Tell me what are the knowledge elements you obtained from your education, training and work experience would support your security management specialist career?

The Knowledge of relevant equipment, policies, procedures, and strategies to promote effective local, state, or national security operations for the protection of people, data, property, and institutions, the structure and content of the English language including the meaning and spelling of words, rules of composition, and grammar, circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming, principles and processes for providing customer and personal services. This includes customer needs assessment, meeting quality standards for services, and evaluation of customer satisfaction, the practical application of engineering science and technology. This includes applying principles, techniques, procedures, and equipment to the design and production of various goods and services.

8. What are the main job duties and responsibilities of security management specialist employee?

security management specialist responsibilities are to design or implement or establish requirements for security systems, video surveillance, motion detection, or closed-circuit television systems to ensure proper installation and operation; develop or review specifications for design or construction of security systems; provide system design and integration recommendations; recommend improvements in security systems or procedures; conduct security audits to identify potential vulnerabilities related to physical security, staff safety, or asset protection; inspect security design features, installations, or programs to ensure compliance with applicable standards or regulations; review design drawings or technical documents for completeness, correctness, or appropriateness; train personnel in security procedures or use of security equipment; develop conceptual designs of security systems; engineer, install, maintain, or repair security systems, programmable logic controls, or other security-related electronic systems; outline system security criteria for pre-bid meetings with clients and companies to ensure comprehensiveness and appropriateness for implementation; perform risk analyses so that appropriate countermeasures can be developed; prepare, maintain, or update security procedures, security system drawings, or related documentation; assess the nature and level of threats so that the scope of the problem can be determined; design security policies, programs, or practices to ensure adequate security relating to issues such as protection of assets, alarm response, and access card use; inspect fire, intruder detection, or other security systems; monitor the work of contractors in the design, construction, and startup phases of security systems; budget and schedule security design work; respond to emergency situations on an on-call basis; test security measures for final acceptance and implement or provide procedures for ongoing monitoring and evaluation of the measures; determine the value loss impact and criticality of assets; prepare documentation for case reports or court proceedings; monitor tapes or digital recordings to identify the source of losses; interview witnesses or suspects to identify persons responsible for security breaches, establish losses, pursue prosecutions, or obtain restitution.

9. How have the Common Core State Standards guided your lesson preparation? Or, how have your state or local standards guided your lesson preparation?

The standards are certainly a starting point, a focus point. In my college classes, we started our plans with the standard, and then developed a student objective that would demonstrate mastery. Next, we determined how to focus students, do a quick review to tie the material to something already learned and how to engage the students with the new material. We always assessed each lesson in some way, formally or informally. Having posted standards helped students monitor their own learning, too.

10. How would you describe (needed security management specialist or your) work style?

My work style matching exactlty what cashier job requires by: being honest and ethical, being reliable, responsible, and dependable, and fulfilling obligations, analyzing information and using logic to address work-related issues and problems, a willingness to take on responsibilities and challenges, being open to change (positive or negative) and to considerable variety in the workplace.

Download Interview PDF