Cool Job: Professor of Intelligence Analysis Program at James Madison University

Assistant / Associate Professor - Intelligence Analysis Program

Institution: James Madison University
Location: Harrisonburg, VA
Category: Faculty - Science - Computer Science
Posted: 03/03/2016
Type: Full Time

General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). This will be a one-year visiting faculty position at the Assistant or Associate Professor level, depending upon the candidate's qualifications.

The IA Program, a rapidly growing program in its ninth year, prepares a new generation of versatile, multidisciplinary analysts to work on future challenges in business, national security and society. The program emphasizes methodology and synthesizes critical and creative thinking methods; technological tools for data collection, visualization and analysis; contextual understanding of an issue's political, economic, social and technological context; and strong communicative and professional skills to support decision-making. Graduates are well positioned for careers in the public or the private sector and have secured positions as analysts at major consulting firms, US intelligence agencies, defense contractors, within the military and in law enforcement.

JMU is a comprehensive university, with an enrollment of approximately 18,000 undergraduate and 2,000 graduate students, located in the beautiful Shenandoah Valley, approximately 2 hours from Washington, D.C., Richmond and Roanoke. JMU is regarded as one of the finest universities in the nation and has been cited in U.S. News and World Report, Changing Times and Money Magazine as an outstanding public university and as one of the nation's top 35 universities for undergraduate research. James Madison University is committed to enhancing campus diversity and creating a more inclusive and diverse institution. Employment is contingent upon the successful completion of a criminal background investigation.

Duties and Responsibilities: Ideal applicants will have experience in teaching or training and will show strong promise for educating undergraduates.

The term of the position runs from mid-August 2016 to mid-May 2017. In the fall semester, the successful candidate will teach three sections of the program's introductory technology course, which covers basic topics in information technology, networking and cyber security. In the spring semester, the successful candidate will teach two sections of a more advanced course in cyber intelligence and cyber analysis and another elective course to be proposed by the candidate.

Qualifications: The position requires either a Ph.D. in a relevant academic discipline, or a master's degree and substantial professional experience in the field. Expertise using intelligence analysis tools such as Analyst's Notebook, Semantica Pro, or Palantir is desired. Strong candidates with experience in other relevant areas of application will also be considered.

Pay Rate: Commensurate with experience

Special Instructions: Review of applications will begin on April 2, 2016 and will continue until the position is filled. Required application materials include: 1) a cover letter that explains how the candidate fits the position requirements; 2) a curriculum vitae; 3) a statement of teaching and/or training experience and philosophy; and 4) contact information for at least three professional references. If available, evidence of potential as a teacher, such as teaching evaluations, should be attached as "Optional Other Document 1."

To apply go to JobLink.jmu.edu and reference posting number 0407213. Salary shall be commensurate with experience. Questions can be directed to the Chair of the search committee, Dr. Noel Hendrickson at hendrinx@jmu.edu.

APPLICATION INFORMATION

« Cyber Criminals Have Evolving Tactics
Underwater Drone Technology Could Doom Trident »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Elastio

Elastio

Elastio's cloud-native platform safeguards cloud data from the risks posed by ransomware, application failures and storage security vulnerabilities.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.