U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Life After Law Enforcement: Second Careers That Fit Like a Glove

NCJ Number
210173
Journal
Law Enforcement Technology Volume: 32 Issue: 5 Dated: May 2005 Pages: 80,82-84,86,87
Author(s)
Carole Moore
Date Published
May 2005
Length
6 pages
Annotation
This article provides guidance for law enforcement officers facing retirement who plan to seek employment in the areas of physical security, loss prevention, and cybersecurity.
Abstract
Work in physical security employment involves the provision of personal protection for individuals at risk for kidnapping, stalking, and other threats. Such persons may include the rich and/or famous as well as diplomats and business persons who travel abroad. Pay will vary according to the assignment, with more money for dangerous or specialized duty. The higher paying jobs in this field may require additional training, such as proficiency in a foreign language, first aid, and martial arts. Types of training for physical security work are reviewed in this article. Work in the loss-prevention field offers diverse opportunities for skilled criminal investigators. Every large company has a division responsible for limiting opportunities for theft, both external and internal. Pay is higher for those with training in accounting that qualifies them to investigate financial crimes or crimes with a serious financial impact. A business degree and actual retail experience are additional assets. Security jobs in the field of information technology ("cybersecurity") are plentiful in this computer age. Blue Ridge Community College in Flat Rock, NC, has an online cybersecurity study program aimed at police officers preparing for postretirement careers. Such jobs require knowledge in information technology, how computers and the Internet work, online threats to computer functioning and database security, and methods used by cyber criminals.