Active Exploitation Instructor
Pensacola, FL
Full Time Mid-level / Intermediate Clearance required USD 52K - 123K *
About ARSIEM Corporation
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Active Exploitation Instructor to deliver Cyberspace Operations (CO) training. The position will support one of our Government clients in Pensacola, FL.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Active Exploitation Instructor to deliver Cyberspace Operations (CO) training. The position will support one of our Government clients in Pensacola, FL.
Responsibilities
- Perform duties as CO Instructor for Active Exploitation by delivering highly technical training in a military environment consisting of lectures, labs, exercises, and other delivery methods.
- Assist with developing CO training curriculum (lecture content, student/instructor guides, exams, exercises, simulations, etc.).
- Provide instruction that teaches assigned students as described in the course Program of Instruction.
- Conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction for up to twenty students per class.
- Incorporate/impart technical knowledge into training delivery.
- Assess student knowledge, skills, and abilities to gauge student proficiency.
- Deliver instruction via interactive synchronous and asynchronous learning activities.
- Review and analyze training materials and recommend changes.
- DoDD 8140.01/DoD 8570.01-M Level II certifications are desired but not required.
Minimum Qualifications
- Bachelor’s Degree plus two (2) years of experience in Cyberspace Operations (CO).
- Experience in CO is defined as experience in Defensive Cyberspace Operations (DCO) or Offensive Cyberspace Operations (OCO).
- In lieu of a degree, four (4) years of experience in Cyberspace Operations (CO).
- Experience in adult learning with an emphasis on providing instruction to large classes. US Military instructor certification or designation is highly desirable (e.g., teaching certificate, certified professional instructor, master training specialist, adjunct faculty certification, etc.).
- NTFS/EXT file systems (Understand file system structure and layout, understand how to navigate and search the file system for files of interest during an investigation)
- Must be able to conduct analysis (dynamic or static) on a file and identify the type of malware present, including understanding how the malware operates.
- Must be familiar with the following tools and the basic techniques used to conduct an investigation. Should be familiar with general concepts (keyword search, file system navigation, locating hidden files, file extraction, etc.): EnCase, Sleuth Kit, Helix
- Must be familiar with the following common tools used to conduct malware analysis in a static or dynamic environment. Should be familiar with common usage of the tools and be able to explain what each tool does and why it is used: Process explorer, Process monitor, Regshot, OllyDbg, IDA Pro, Wireshark
- 3-5 years as a Forensics or Malware Analyst
- GIAC Reverse Engineering Malware (GREM), Certified Reverse Engineering Analyst (CREA), EnCase, or GIAC Certified Forensic Analyst (GCFA) is desired.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Architecture Jobs
Leadership Jobs
Tags: Clearance DCO DoD DoDD 8140 DoDD 8570 EnCase Forensics GCFA GIAC GREM IDA Pro Malware OCO OllyDbg Polygraph Reverse engineering SIEM Sleuth Kit Teaching TS/SCI
Perks/benefits: Salary bonus
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsInformation Security Specialist jobsSenior Cybersecurity Engineer jobsInformation Security Manager jobsSenior Network Security Engineer jobsSecurity Consultant jobsCyber Security Specialist jobsIT Security Engineer jobsSenior Information Security Analyst jobsSenior Penetration Tester jobsSecurity Specialist jobsSenior Cyber Security Engineer jobsSystems Engineer jobsChief Information Security Officer jobsSystems Administrator jobsPrincipal Security Engineer jobsIT Security Analyst jobsInformation System Security Officer (ISSO) jobsSenior Product Security Engineer jobsStaff Security Engineer jobsCloud Security Architect jobsSecurity Operations Analyst jobsInformation Systems Security Engineer jobs
Kubernetes jobsDevSecOps jobsCI/CD jobsPowerShell jobsSaaS jobsEDR jobsIDS jobsSplunk jobsIPS jobsTop Secret jobsRMF jobsSQL jobsSDLC jobsIntrusion detection jobsBash jobsITIL jobsCompTIA jobsThreat detection jobsActive Directory jobsFinance jobsCRISC jobsDoDD 8570 jobsBanking jobsDocker jobsOWASP jobs
TCP/IP jobsUNIX jobsClearance Required jobsVPN jobsGIAC jobsHIPAA jobsSANS jobsCISO jobsIT infrastructure jobsTerraform jobsJavaScript jobsSOC 2 jobsOSCP jobsIndustrial jobsSOX jobsCCSP jobsPolygraph jobsData Analytics jobsDNS jobsSOAR jobsGCIH jobsNIST 800-53 jobsJira jobsAnsible jobsMITRE ATT&CK jobs