Cool Job: Professor of Intelligence Analysis Program at James Madison University

Assistant / Associate Professor - Intelligence Analysis Program

Institution: James Madison University
Location: Harrisonburg, VA
Category: Faculty - Science - Computer Science
Posted: 03/03/2016
Type: Full Time

General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). This will be a one-year visiting faculty position at the Assistant or Associate Professor level, depending upon the candidate's qualifications.

The IA Program, a rapidly growing program in its ninth year, prepares a new generation of versatile, multidisciplinary analysts to work on future challenges in business, national security and society. The program emphasizes methodology and synthesizes critical and creative thinking methods; technological tools for data collection, visualization and analysis; contextual understanding of an issue's political, economic, social and technological context; and strong communicative and professional skills to support decision-making. Graduates are well positioned for careers in the public or the private sector and have secured positions as analysts at major consulting firms, US intelligence agencies, defense contractors, within the military and in law enforcement.

JMU is a comprehensive university, with an enrollment of approximately 18,000 undergraduate and 2,000 graduate students, located in the beautiful Shenandoah Valley, approximately 2 hours from Washington, D.C., Richmond and Roanoke. JMU is regarded as one of the finest universities in the nation and has been cited in U.S. News and World Report, Changing Times and Money Magazine as an outstanding public university and as one of the nation's top 35 universities for undergraduate research. James Madison University is committed to enhancing campus diversity and creating a more inclusive and diverse institution. Employment is contingent upon the successful completion of a criminal background investigation.

Duties and Responsibilities: Ideal applicants will have experience in teaching or training and will show strong promise for educating undergraduates.

The term of the position runs from mid-August 2016 to mid-May 2017. In the fall semester, the successful candidate will teach three sections of the program's introductory technology course, which covers basic topics in information technology, networking and cyber security. In the spring semester, the successful candidate will teach two sections of a more advanced course in cyber intelligence and cyber analysis and another elective course to be proposed by the candidate.

Qualifications: The position requires either a Ph.D. in a relevant academic discipline, or a master's degree and substantial professional experience in the field. Expertise using intelligence analysis tools such as Analyst's Notebook, Semantica Pro, or Palantir is desired. Strong candidates with experience in other relevant areas of application will also be considered.

Pay Rate: Commensurate with experience

Special Instructions: Review of applications will begin on April 2, 2016 and will continue until the position is filled. Required application materials include: 1) a cover letter that explains how the candidate fits the position requirements; 2) a curriculum vitae; 3) a statement of teaching and/or training experience and philosophy; and 4) contact information for at least three professional references. If available, evidence of potential as a teacher, such as teaching evaluations, should be attached as "Optional Other Document 1."

To apply go to JobLink.jmu.edu and reference posting number 0407213. Salary shall be commensurate with experience. Questions can be directed to the Chair of the search committee, Dr. Noel Hendrickson at hendrinx@jmu.edu.

APPLICATION INFORMATION

« Cyber Criminals Have Evolving Tactics
Underwater Drone Technology Could Doom Trident »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.