Cool Job: Professor of Intelligence Analysis Program at James Madison University

Assistant / Associate Professor - Intelligence Analysis Program

Institution: James Madison University
Location: Harrisonburg, VA
Category: Faculty - Science - Computer Science
Posted: 03/03/2016
Type: Full Time

General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). This will be a one-year visiting faculty position at the Assistant or Associate Professor level, depending upon the candidate's qualifications.

The IA Program, a rapidly growing program in its ninth year, prepares a new generation of versatile, multidisciplinary analysts to work on future challenges in business, national security and society. The program emphasizes methodology and synthesizes critical and creative thinking methods; technological tools for data collection, visualization and analysis; contextual understanding of an issue's political, economic, social and technological context; and strong communicative and professional skills to support decision-making. Graduates are well positioned for careers in the public or the private sector and have secured positions as analysts at major consulting firms, US intelligence agencies, defense contractors, within the military and in law enforcement.

JMU is a comprehensive university, with an enrollment of approximately 18,000 undergraduate and 2,000 graduate students, located in the beautiful Shenandoah Valley, approximately 2 hours from Washington, D.C., Richmond and Roanoke. JMU is regarded as one of the finest universities in the nation and has been cited in U.S. News and World Report, Changing Times and Money Magazine as an outstanding public university and as one of the nation's top 35 universities for undergraduate research. James Madison University is committed to enhancing campus diversity and creating a more inclusive and diverse institution. Employment is contingent upon the successful completion of a criminal background investigation.

Duties and Responsibilities: Ideal applicants will have experience in teaching or training and will show strong promise for educating undergraduates.

The term of the position runs from mid-August 2016 to mid-May 2017. In the fall semester, the successful candidate will teach three sections of the program's introductory technology course, which covers basic topics in information technology, networking and cyber security. In the spring semester, the successful candidate will teach two sections of a more advanced course in cyber intelligence and cyber analysis and another elective course to be proposed by the candidate.

Qualifications: The position requires either a Ph.D. in a relevant academic discipline, or a master's degree and substantial professional experience in the field. Expertise using intelligence analysis tools such as Analyst's Notebook, Semantica Pro, or Palantir is desired. Strong candidates with experience in other relevant areas of application will also be considered.

Pay Rate: Commensurate with experience

Special Instructions: Review of applications will begin on April 2, 2016 and will continue until the position is filled. Required application materials include: 1) a cover letter that explains how the candidate fits the position requirements; 2) a curriculum vitae; 3) a statement of teaching and/or training experience and philosophy; and 4) contact information for at least three professional references. If available, evidence of potential as a teacher, such as teaching evaluations, should be attached as "Optional Other Document 1."

To apply go to JobLink.jmu.edu and reference posting number 0407213. Salary shall be commensurate with experience. Questions can be directed to the Chair of the search committee, Dr. Noel Hendrickson at hendrinx@jmu.edu.

APPLICATION INFORMATION

« Cyber Criminals Have Evolving Tactics
Underwater Drone Technology Could Doom Trident »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.