By Light Professional IT Services

  • Technical Instructor

    Job Locations US-FL-Pensacola
    Job ID
    2019-2821
    # of Openings
    2
    Job Function
    Information Technology
    Minimum Clearance
    TS/SCI w/ Polygraph
  • Overview

    The Instructor shall provide classroom instruction that teaches assigned students in the manner described in the course Program of Instruction (see Curriculum Requirements below). The Instructor shall conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction.

     

    Under indirect supervision, responsible for providing technical expertise and instruction according to customer specifications and standards (operate, maintain, and repair in classroom or laboratory settings) supporting DoD Enterprise infrastructure and info structure IT goals and projects. Analyzes System and Network related information and interprets it into useable instruction/training for intended audience. Develops courseware/content in specific technical subject matter area. Provides advice to customers in system design and optimal configuration. Provides technical telephone support to customers with hardware and software problems.

    Responsibilities

    • Incorporate technical knowledge into training delivery
    • Assess student knowledge, skills and abilities to gauge student proficiency in topic area
    • Deliver instruction via interactive synchronous and asynchronous learning activities
    • Review and analyze training materials and recommend changes
    • Design and develop relevant training curriculum

    Required Experience/Qualifications

    • Four (4) years of experience in Defensive Cyberspace Operations (DCO) and/or Offensive Cyberspace Operations (OCO)
    • Two (2) years of experience within the last four (4) years teaching cyberspace operations in a formal classroom setting in at least one (1) of the following CO related topics:
      • Defensive Cyberspace Operations, Programming, Operating System, Windows, Unix/Linux, Networks, Wireless, Forensics, Offensive Cyberspace Operations (OCO), Instructor certification or designation (e.g. teaching certificate, certified professional instructor, master training specialist, or adjunct faculty certification)
    • Two (2) years of experience in curriculum development and design
    • DoD 8570.1 IAT II - CompTIA Security+ or equivalent

    Preferred Experience/Qualifications

    • Bachelor’s Degree and 2 years related experience, or 4 years applicable experience which should include 2 years specialized experience.
    • Curriculum requirements:
      • Active Exploitation - The Active Exploitation class covers the following topics: Network Discovery/Enumeration, Port Scanning Technologies, Unix/Windows System Vulnerabilities, and Switches/Routers Exploitation and System Vulnerabilities, Encryption Technologies, Security Applications/Protocols, Malware, Trojan Horses, Root Kits, Back Doors, Ad/Spyware, Packet Sniffing Technologies, Exploitation/Attack Concepts, Authenticated/Unauthenticated Attacks, Social Engineering, Denial of Service (DoS)/Distributed DoS Attacks.
      • Basic Networking with TCP/IP - The Basic Networking covers the following topics: Basic Networking Fundamentals, TCP/IP, OSI Model, Network Addressing, Network Protocols; WAN Protocols; WAN Fundamentals; WAN Networking Communication Methods, Digital/Telecommunications Convergence, and Network Topologies.
      • Computer Network Defense (CND) - The CND class covers the following topics: DoD Reporting Organizations and Reporting Vehicles, Critical Content of Security Reports, Global Information Grid and Supporting Organizations, Assessment of Computer/Network Vulnerabilities, Identification of Malicious Intent through Packet Analysis, Firewall and IDS implementations, Risk Mitigation, Information Assurance (IA) Concepts, Encryption Technologies, Security Applications/Protocols, Malware, Root Kits, Back Doors, Ad/Spyware, Packet Sniffing Technologies, Exploitation/Attack Concepts, Authenticated/Unauthenticated Attacks, Social Engineering, DoS/Distributed DoS Attacks.
      • Discrete Math and Logic - The Discrete Math class covers number conversions (any number base), 1s and 2s complement, set theory, functions and algorithms, truth tables, conditional statements, fallacy statements, seven rules of inference, predicates, universal and existential quantifiers, and proofs.
      • Forensics - The Forensics Methodology class covers the following topics: Forensics Process, Reporting Intelligence Gathered in Theater, Media and File Systems, Collecting Volatile Data, Non-volatile Data Sources, and Media Examination.
      • Hardware/Architecture and Operating System Theory - Computer Architecture: Fundamental principles of computer engineering using the Little Man Computer (LMC) class simulation to introduce the components of a modern computer (memory, CPU, I/O devices, capabilities, and computer models (fetch-execute). Introduction to Theoretical OS (Bootstrapping process, CPU Basic Anatomy, OS History, Objectives, Structure, and Services) Process Management concepts, Memory Management concepts, Storage Management concepts, and Virtual OS fundamentals.
      • Malware Analysis - The Malware Analysis class covers the following topics: Identification and analysis of maliciously coded applications, static and dynamic analysis, recognition of obfuscation, current vulnerabilities and exploits.
      • Network Design and Administration - The Network Design and Administration class covers the following topics: Internetworking Devices, Network Hardware Configuration, IP Routing Processes, Routing Protocols, Route Summarization, Administrative Distances, and Network Reconstruction.
      • Network Reconstruction and Packet Analysis - Network Reconstruction and Packet Analysis class covers the following topics: Networking Analysis Tools and Techniques, Network Reconstruction/Baselining, Baselining Methods, Common Network Traffic, Packet Analysis, Layer 2/3/4 Headers, Application Layer Protocols, and Abnormal Traffic.
      • Programming - The Programming class covers programming structure, low-level programming, programming tools and techniques, Object oriented programming, levels of software programming, program and source code identification, Scripting, Database Administration, and SQL.
      • Router Security Configuration - The Router Security Configuration class covers the following topics: Cisco Model, Physical Protection, Cisco IOS®, General Threats to the Router, Router Hardening, Access Control Lists, Network Address Translation, and Tunneling.
      • Target Research - The Target Research class covers the following topics: National Intelligence Effort, Intelligence Community, Intelligence Process, Joint Military Forces Unified Command Structure, Information Operations, National Security Agency, SIGINT Requirements Process/Development, Open Source Research, System Architecture, Encoding Methods, File Recognition, Recovering Files, and Reporting Information.
      • Unix - The Unix/Linux System covers the following OS Internals topics: system calls, library functions, threads, process creation and initialization, process properties, interrupt requests, process states, and process interruptions.
      • Unix Fundamentals - The Unix fundamentals class provides an introduction and baseline understanding of Unix operating system. The fundamentals covered basic commands, operating system (OS) structures, and use of the OS.
      • Windows - The Windows OS includes the following topics: AD (structure, LDAP, group policy, and functional levels/trusts), OS Structure, file systems (FAT 16/32, NTFS), storage management, WIN2K directory structure, file and directory permissions, alternate data streams, backup/restoration process, file system commands. Windows OS design/architecture, Hardware Abstraction Layer, Kernel Responsibilities, Windows Executive, Environment Subsystems, Security Accounts Manage, Object Manager, Process Creation, Virtual Memory Manager, I/O Manager, User-mode Environment Subsystem, Application Programming Interface, Dynamic Link Libraries, System Management Mechanisms, and the System Boot Process, Authentication, Account Management, and Vulnerabilities.
      • Windows Fundamentals - The Windows fundamentals class provides an introduction and baseline understanding of the Windows OS. The fundamentals covered basic commands, OS structures, and use of the OS.
      • Wireless Technology - The Wireless Technology class covers the following topics: Frequency Characteristics, IEEE 802.11 Standards, Wireless LAN Topologies, 802.11 Layer 2 Characteristics, 802.11 Security, Passive WEP Attacks, Passive WPA/WPA2 Attacks, Active Attacks, Client Driver Exploits, Wireless Personal Area Networks, WiMax

    Special Requirements/Security Clearance

    • Eligible candidates will have an active TS/SCI with Poly

    Physical Demands

    • Must be able to stand for extended periods of time
    • Must be able to view computer or monitor screen for extended periods of time
    • Must be able to speak for extended periods of time
    • Must be able to lift 40 lbs.

    #CJ

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed