Cool Job: Professor of Intelligence Analysis Program at James Madison University

Assistant / Associate Professor - Intelligence Analysis Program

Institution: James Madison University
Location: Harrisonburg, VA
Category: Faculty - Science - Computer Science
Posted: 03/03/2016
Type: Full Time

General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). This will be a one-year visiting faculty position at the Assistant or Associate Professor level, depending upon the candidate's qualifications.

The IA Program, a rapidly growing program in its ninth year, prepares a new generation of versatile, multidisciplinary analysts to work on future challenges in business, national security and society. The program emphasizes methodology and synthesizes critical and creative thinking methods; technological tools for data collection, visualization and analysis; contextual understanding of an issue's political, economic, social and technological context; and strong communicative and professional skills to support decision-making. Graduates are well positioned for careers in the public or the private sector and have secured positions as analysts at major consulting firms, US intelligence agencies, defense contractors, within the military and in law enforcement.

JMU is a comprehensive university, with an enrollment of approximately 18,000 undergraduate and 2,000 graduate students, located in the beautiful Shenandoah Valley, approximately 2 hours from Washington, D.C., Richmond and Roanoke. JMU is regarded as one of the finest universities in the nation and has been cited in U.S. News and World Report, Changing Times and Money Magazine as an outstanding public university and as one of the nation's top 35 universities for undergraduate research. James Madison University is committed to enhancing campus diversity and creating a more inclusive and diverse institution. Employment is contingent upon the successful completion of a criminal background investigation.

Duties and Responsibilities: Ideal applicants will have experience in teaching or training and will show strong promise for educating undergraduates.

The term of the position runs from mid-August 2016 to mid-May 2017. In the fall semester, the successful candidate will teach three sections of the program's introductory technology course, which covers basic topics in information technology, networking and cyber security. In the spring semester, the successful candidate will teach two sections of a more advanced course in cyber intelligence and cyber analysis and another elective course to be proposed by the candidate.

Qualifications: The position requires either a Ph.D. in a relevant academic discipline, or a master's degree and substantial professional experience in the field. Expertise using intelligence analysis tools such as Analyst's Notebook, Semantica Pro, or Palantir is desired. Strong candidates with experience in other relevant areas of application will also be considered.

Pay Rate: Commensurate with experience

Special Instructions: Review of applications will begin on April 2, 2016 and will continue until the position is filled. Required application materials include: 1) a cover letter that explains how the candidate fits the position requirements; 2) a curriculum vitae; 3) a statement of teaching and/or training experience and philosophy; and 4) contact information for at least three professional references. If available, evidence of potential as a teacher, such as teaching evaluations, should be attached as "Optional Other Document 1."

To apply go to JobLink.jmu.edu and reference posting number 0407213. Salary shall be commensurate with experience. Questions can be directed to the Chair of the search committee, Dr. Noel Hendrickson at hendrinx@jmu.edu.

APPLICATION INFORMATION

« Cyber Criminals Have Evolving Tactics
Underwater Drone Technology Could Doom Trident »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.