By Light HQ

JCAC Instructor - Junior

Job Locations US-FL-Pensacola
Job ID
# of Openings
Job Function
Information Technology
Minimum Clearance
TS/SCI w/ Polygraph


Metova, a By Light company, is hiring a Course Instructor to join our team. The Instructor shall provide technical classroom instruction that teaches assigned students in the manner described in the course Program of Instruction (see Curriculum Requirements, below). The Instructor shall conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction.


- Under indirect supervision, provides technical expertise and instruction according to customer specifications and standards (operate, maintain, and repair in classroom or laboratory settings) supporting DoD Enterprise infrastructure and info structure IT goals and projects.

- Analyzes related information and interprets it into usable instruction/training for intended audience.

- Develops courseware/content in specific technical subject matter area.

- Provides advice to customers in training system design and optimal configuration.

- Provides technical telephone support to customers with hardware and software problems.


The Instructor shall possess the following capabilities:

  • Incorporate Technical knowledge into training and delivery
  • Assess student knowledge, skills, and abilities to gauge student proficiency in topic area
  • Deliver instruction via interactive synchronous and asynchronous learning activities
  • Review and analyze training materials and recommend changes

Required Experience/Qualifications

- Associates’ Degree and 1 years related experience, or 3 years applicable experience which should include 1 years specialized experience

- IAT Level II certified

- Instructor certification or designation (e.g. teaching certificate, certified professional instructor, master training specialist, or adjunct faculty certification)

- Experience in curriculum development and design

- Two (2) or more years of experience and one (1) year of experience teaching in a formal classroom setting at least one of the following topics:

  • Active Exploitation
    • The Active Exploitation class covers the following topics: Network Discovery/Enumeration, Port Scanning Technologies, Unix/Windows System Vulnerabilities, and Switches/Routers Exploitation and System Vulnerabilities, Encryption Technologies, Security Applications/Protocols, Malware, Trojan Horses, Root Kits, Back Doors, Ad/Spyware, Packet Sniffing Technologies, Exploitation/Attack Concepts, Authenticated/Unauthenticated Attacks, Social Engineering, Denial of Service (DoS)/Distributed DoS Attacks.
  • Basic Networking with TCP/IP
    • The Basic Networking covers the following topics: Basic Networking Fundamentals, TCP/IP, OSI Model, Network Addressing, Network Protocols; WAN Protocols; WAN Fundamentals; WAN Networking, Communication Methods, Digital/Telecommunications Convergence, and Network Topologies.
  • Computer Network Defense (CND)
    • The CND class covers the following topics: DoD Reporting Organizations and Reporting Vehicles, Critical Content of Security Reports, Global Information Grid and Supporting Organizations, Assessment of Computer/Network Vulnerabilities, Identification of Malicious Intent through Packet Analysis, Firewall and IDS implementations, Risk Mitigation, Information Assurance (IA) Concepts, Encryption Technologies, Security Applications/Protocols, Malware, Root Kits, Back Doors, Ad/Spyware, Packet Sniffing Technologies, Exploitation/Attack Concepts, Authenticated/Unauthenticated Attacks, Social Engineering, DoS/Distributed DoS Attacks.
  • Discrete Math and Logic
    • The Discrete Math class covers number conversions (any number base), 1s and 2s complement, set theory, functions and algorithms, truth tables, conditional statements, fallacy statements, seven rules of inference, predicates, universal and existential quantifiers, and proofs.
  • Forensics
    • The Forensics Methodology class covers the following topics: Forensics Process, Reporting Intelligence Gathered in Theater, Media and File Systems, Collecting Volatile Data, Non-volatile Data Sources, and Media Examination.
  • Hardware/Architecture and Operating System Theory
    • Computer Architecture: Fundamental principles of computer engineering using the Little Man Computer (LMC) class simulation to introduce the components of a modern computer (memory, CPU, I/O devices, capabilities, and computer models (fetch-execute). Introduction to Theoretical OS (Bootstrapping process, CPU Basic Anatomy, OS History, Objectives, Structure, and Services) Process Management concepts, Memory Management concepts, Storage Management concepts, and Virtual OS fundamentals.
  • Malware Analysis
    • The Malware Analysis class covers the following topics: Identification and analysis of maliciously coded applications, static and dynamic analysis, recognition of obfuscation, current vulnerabilities and exploits.
  • Network Design and Administration
    • The Network Design and Administration class covers the following topics: Internetworking Devices, Network Hardware Configuration, IP Routing Processes, Routing Protocols, Route Summarization, Administrative Distances, and Network Reconstruction.
  • Network Reconstruction and Packet Analysis
    • Network Reconstruction and Packet Analysis class covers the following topics: Networking Analysis Tools and Techniques, Network Reconstruction/Baselining, Baselining Methods, Common Network Traffic, Packet Analysis, Layer 2/3/4 Headers, Application Layer Protocols, and Abnormal Traffic.
  • Programming
    • The Programming class covers programming structure, low-level programming, programming tools and techniques, Object oriented programming, levels of software programming, program and source code identification, Scripting, Database Administration, and SQL.
  • Router Security Configuration
    • The Router Security Configuration class covers the following topics: Cisco Model, Physical Protection, Cisco IOS®, General Threats to the Router, Router Hardening, Access Control Lists, Network Address Translation, and Tunneling.
  • Target Research
    • The Target Research class covers the following topics: National Intelligence Effort, Intelligence Community, Intelligence Process, Joint Military Forces Unified Command Structure, Information Operations, National Security Agency, SIGINT Requirements Process/Development, Open Source Research, System Architecture, Encoding Methods, File Recognition, Recovering Files, and Reporting Information.
  • Unix
    • The Unix/Linux System covers the following OS Internals topics: system calls, library functions, threads, process creation and initialization, process properties, interrupt requests, process states, and process interruptions.
  • Unix Fundamentals
    • The Unix fundamentals class provides an introduction and baseline understanding of Unix operating system. The fundamentals covered basic commands, operating system (OS) structures, and use of the OS.
  • Windows
    • The Windows OS includes the following topics: AD (structure, LDAP, group policy, and functional levels/trusts), OS Structure, file systems (FAT 16/32, NTFS), storage management, WIN2K directory structure, file and directory permissions, alternate data streams, backup/restoration process, file system commands. Windows OS design/architecture, Hardware Abstraction Layer, Kernel Responsibilities, Windows Executive, Environment Subsystems, Security Accounts Manage, Object Manager, Process Creation, Virtual Memory Manager, I/O Manager, User-mode Environment Subsystem, Application Programming Interface, Dynamic Link Libraries, System Management Mechanisms, and the System Boot Process, Authentication, Account Management, and Vulnerabilities.
  • Windows Fundamentals
    • The Windows fundamentals class provides an introduction and baseline understanding of the Windows OS. The fundamentals covered basic commands, OS structures, and use of the OS.
  • Wireless Technology
    • The Wireless Technology class covers the following topics: Frequency Characteristics, IEEE 802.11 Standards, Wireless LAN Topologies, 802.11 Layer 2 Characteristics, 802.11 Security, Passive WEP Attacks, Passive WPA/WPA2 Attacks, Active Attacks, Client Driver Exploits, Wireless Personal Area Networks, WiMax.

Special Requirements/Security Clearance

TS/SCI w/CI Poly

Physical Demands

Ability to lift 25 pounds


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed