Active Exploitation Instructor
Pensacola, FL
Full Time Mid-level / Intermediate Clearance required USD 52K - 123K *
About ARSIEM Corporation
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Active Exploitation Instructor to deliver Cyberspace Operations (CO) training. The position will support one of our Government clients in Pensacola, FL.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Active Exploitation Instructor to deliver Cyberspace Operations (CO) training. The position will support one of our Government clients in Pensacola, FL.
Responsibilities
- Perform duties as CO Instructor for Active Exploitation by delivering highly technical training in a military environment consisting of lectures, labs, exercises, and other delivery methods.
- Assist with developing CO training curriculum (lecture content, student/instructor guides, exams, exercises, simulations, etc.).
- Provide instruction that teaches assigned students as described in the course Program of Instruction.
- Conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction for up to twenty students per class.
- Incorporate/impart technical knowledge into training delivery.
- Assess student knowledge, skills, and abilities to gauge student proficiency.
- Deliver instruction via interactive synchronous and asynchronous learning activities.
- Review and analyze training materials and recommend changes.
- DoDD 8140.01/DoD 8570.01-M Level II certifications are desired but not required.
Minimum Qualifications
- Bachelor’s Degree plus two (2) years of experience in Cyberspace Operations (CO).
- Experience in CO is defined as experience in Defensive Cyberspace Operations (DCO) or Offensive Cyberspace Operations (OCO).
- In lieu of a degree, four (4) years of experience in Cyberspace Operations (CO).
- Experience in adult learning with an emphasis on providing instruction to large classes. US Military instructor certification or designation is highly desirable (e.g., teaching certificate, certified professional instructor, master training specialist, adjunct faculty certification, etc.).
- NTFS/EXT file systems (Understand file system structure and layout, understand how to navigate and search the file system for files of interest during an investigation)
- Must be able to conduct analysis (dynamic or static) on a file and identify the type of malware present, including understanding how the malware operates.
- Must be familiar with the following tools and the basic techniques used to conduct an investigation. Should be familiar with general concepts (keyword search, file system navigation, locating hidden files, file extraction, etc.): EnCase, Sleuth Kit, Helix
- Must be familiar with the following common tools used to conduct malware analysis in a static or dynamic environment. Should be familiar with common usage of the tools and be able to explain what each tool does and why it is used: Process explorer, Process monitor, Regshot, OllyDbg, IDA Pro, Wireshark
- 3-5 years as a Forensics or Malware Analyst
- GIAC Reverse Engineering Malware (GREM), Certified Reverse Engineering Analyst (CREA), EnCase, or GIAC Certified Forensic Analyst (GCFA) is desired.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Architecture Jobs
Leadership Jobs
Tags: Clearance DCO DoD DoDD 8140 DoDD 8570 EnCase Forensics GCFA GIAC GREM IDA Pro Malware OCO OllyDbg Polygraph Reverse engineering SIEM Sleuth Kit Teaching TS/SCI
Perks/benefits: Salary bonus
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Security Analyst jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsSenior Network Security Engineer jobsSenior Cybersecurity Engineer jobsInformation Security Specialist jobsSecurity Consultant jobsSenior Penetration Tester jobsSenior Information Security Analyst jobsSecurity Specialist jobsIT Security Engineer jobsSenior Cyber Security Engineer jobsCyber Security Specialist jobsChief Information Security Officer jobsIT Security Analyst jobsPrincipal Security Engineer jobsCloud Security Architect jobsStaff Security Engineer jobsInformation System Security Officer (ISSO) jobsSystems Engineer jobsCyber Security Architect jobsSenior Product Security Engineer jobsSecurity Operations Analyst jobsSystems Administrator jobs
CI/CD jobsMalware jobsSaaS jobsForensics jobsEncryption jobsEDR jobsSplunk jobsTop Secret jobsIDS jobsSDLC jobsIPS jobsSQL jobsRMF jobsCompTIA jobsBash jobsIntrusion detection jobsDocker jobsThreat detection jobsFinance jobsDoDD 8570 jobsITIL jobsOWASP jobsActive Directory jobsVPN jobsTCP/IP jobs
CRISC jobsGIAC jobsUNIX jobsTerraform jobsSANS jobsHIPAA jobsIT infrastructure jobsBanking jobsClearance Required jobsJavaScript jobsSOX jobsDNS jobsAnsible jobsPolygraph jobsCCSP jobsMITRE ATT&CK jobsOSCP jobsData Analytics jobsSOC 2 jobsJira jobsGCIH jobsCISO jobsSOAR jobsCyber defense jobsOracle jobs