Cool Job: Professor of Intelligence Analysis Program at James Madison University

Assistant / Associate Professor - Intelligence Analysis Program

Institution: James Madison University
Location: Harrisonburg, VA
Category: Faculty - Science - Computer Science
Posted: 03/03/2016
Type: Full Time

General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). This will be a one-year visiting faculty position at the Assistant or Associate Professor level, depending upon the candidate's qualifications.

The IA Program, a rapidly growing program in its ninth year, prepares a new generation of versatile, multidisciplinary analysts to work on future challenges in business, national security and society. The program emphasizes methodology and synthesizes critical and creative thinking methods; technological tools for data collection, visualization and analysis; contextual understanding of an issue's political, economic, social and technological context; and strong communicative and professional skills to support decision-making. Graduates are well positioned for careers in the public or the private sector and have secured positions as analysts at major consulting firms, US intelligence agencies, defense contractors, within the military and in law enforcement.

JMU is a comprehensive university, with an enrollment of approximately 18,000 undergraduate and 2,000 graduate students, located in the beautiful Shenandoah Valley, approximately 2 hours from Washington, D.C., Richmond and Roanoke. JMU is regarded as one of the finest universities in the nation and has been cited in U.S. News and World Report, Changing Times and Money Magazine as an outstanding public university and as one of the nation's top 35 universities for undergraduate research. James Madison University is committed to enhancing campus diversity and creating a more inclusive and diverse institution. Employment is contingent upon the successful completion of a criminal background investigation.

Duties and Responsibilities: Ideal applicants will have experience in teaching or training and will show strong promise for educating undergraduates.

The term of the position runs from mid-August 2016 to mid-May 2017. In the fall semester, the successful candidate will teach three sections of the program's introductory technology course, which covers basic topics in information technology, networking and cyber security. In the spring semester, the successful candidate will teach two sections of a more advanced course in cyber intelligence and cyber analysis and another elective course to be proposed by the candidate.

Qualifications: The position requires either a Ph.D. in a relevant academic discipline, or a master's degree and substantial professional experience in the field. Expertise using intelligence analysis tools such as Analyst's Notebook, Semantica Pro, or Palantir is desired. Strong candidates with experience in other relevant areas of application will also be considered.

Pay Rate: Commensurate with experience

Special Instructions: Review of applications will begin on April 2, 2016 and will continue until the position is filled. Required application materials include: 1) a cover letter that explains how the candidate fits the position requirements; 2) a curriculum vitae; 3) a statement of teaching and/or training experience and philosophy; and 4) contact information for at least three professional references. If available, evidence of potential as a teacher, such as teaching evaluations, should be attached as "Optional Other Document 1."

To apply go to JobLink.jmu.edu and reference posting number 0407213. Salary shall be commensurate with experience. Questions can be directed to the Chair of the search committee, Dr. Noel Hendrickson at hendrinx@jmu.edu.

APPLICATION INFORMATION

« Cyber Criminals Have Evolving Tactics
Underwater Drone Technology Could Doom Trident »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.