| 1 | Tell me about a security report or proposal which you wrote that you were happy with. How about one you were unhappy with? |  | 
																
									| 2 | Describe a time when you successfully trained organization members in security procedures. What methods led to your success? |  | 
																
									| 3 | Share an experience in which your review of financial reports helped you increase efficiency or quality of your security operations. |  | 
																	
										|  | 
															
									| 4 | Share an experience in which you successfully planned security for a special event. What is something you could have improved in your plan? |  | 
																
									| 5 | How do you determine when supplies and equipment are needful for purchase? |  | 
																
									| 6 | Tell me about the last budget you developed. |  | 
																
									| 7 | Share an experience in which you successfully coordinated your company's security operations with a public agency. |  | 
																
									| 8 | What methods do you use to keep abreast of changes and new technology related to security operations? |  | 
																
									| 9 | Share an experience in which your assistance in emergency management or contingency planning helped your company. |  | 
																
									| 10 | Describe executive protection activities you have arranged and/or performed. What methods did you use? |  | 
																	
										|  | 
															
									| 11 | Share an experience in which you successfully responded to an emergency. What methods made you successful? What could you have done better? |  | 
																
									| 12 | Describe the types of security you have done. Share an experience in which your recommendation for security procedures reflected good results. |  | 
																
									| 13 | Tell me about the last report or presentation you gave on an investigation or violation of security procedures. |  | 
																
									| 14 | Share an experience in which you successfully resolved a difficult security breach. |  | 
																
									| 15 | Share an effective method you have used to ensure that security programs comply with all policies and requirements. |  |