Comtech Telecom
Job Location : Pensacola,FL, USA
Posted on : 2025-03-13T18:19:33Z
Job Description :
Title: CNO Instructor (Forensics & Malware Analysis) Department: Cyber Services/Div 12Revision date: 3/11/2025FLSA Status: Exempt Location: Pensacola, FL Level: T2 Company OverviewComtech Telecommunications Corp. is a leading global technology company providing terrestrial and wireless network solutions, next-generation 9-1-1 emergency services, satellite and space communications technologies, and cloud-native capabilities to commercial and government customers around the world. Our unique culture of innovation and employee empowerment unleashes a relentless passion for customer success. With multiple facilities located in technology corridors throughout the United States and around the world, Comtech leverages our global presence, technology leadership, and decades of experience to create the world's most innovative communications solutions. For more information, please visit www.comtech.com. We're seeking curious, growth-minded thinkers to help shape our vision, structures, and systems; playing a key role as we launch into our ambitious future. If you're invigorated by our mission, values, and drive to change the world - we'd love to have you apply.Responsibilities:Comtech Systems, Inc. (CSI) is looking for professional instructors to deliver Cyberspace Operations (CO) training to Department of Defense personnel at the Center for Information Warfare Training (CIWT), Corry Station, Pensacola, FL. •Perform duties as a Forensics and Malware Analysis Instructor by delivering highly technical training in a military training environment consisting of lectures, labs, exercises, and other delivery methods.•Assist with developing CO training curriculum (e.g., lecture content, student/instructor guides, tests, exercises, simulations).Requirements:•All candidates must possess strong oral and written communication skills. Candidates shall provide classroom instruction that teaches assigned students in the manner described in the course Program of Instruction. Candidates shall conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction for up to twenty students per class.•All candidates must possess the ability to incorporate/impart technical knowledge into their training delivery.•Assess student knowledge, skills, and abilities to gauge student proficiency in topic areas.•Deliver instruction via interactive synchronous and asynchronous learning activities.•Review and analyze training materials and recommend changes.•Applicants must possess the ability to obtain and maintain a security clearance at the level required by each assigned task.Qualifications: •Experience in adult learning with an emphasis on providing instruction to large classes. US Military instructor certification or designation is highly desirable (e.g., teaching certificate, certified professional instructor, master training specialist, adjunct faculty certification).•Applicant should have intermediate-level knowledge/experience in the following areas:•NTFS/EXT file systems •Understand file system structure and layout•Understand how to navigate and search the file system for files of interest during an investigation•Identify common malware types based on activity/traits •Ability to conduct analysis (dynamic or static) on a file and identify malware type to include an understanding of how the malware operates•Familiarity with common malware tool usage and ability to explain what each tool does and why it is used•Process Hacker•Process Monitor•x64dbg•Ghidra•IDA Pro•Wireshark•Forensic tools and basic concepts for investigation•Tools (e.g., Autopsy, Sleuth Kit, UFED)•Concepts (e.g., keyword search, file system navigation, locating hidden files, file extraction)Education:•Bachelor's Degree plus two (2) years of experience in Cyberspace Operations (CO). Experience in CO is defined as experience in Defensive Cyberspace Operations (DCO), and/or Offensive Cyberspace Operations (OCO).•In lieu of a degree, four (4) years of experience in Cyberspace Operations (CO). •Additional experience, educational, or certification recommendations beyond those listed above:•3-5 years as a Forensics or Malware Analyst•GIAC Reverse Engineering Malware (GREM), Certified Reverse Engineering Analyst (CREA), EnCase, or GIAC Certified Forensic Analyst (GCFA), desired, but not required•DoDD 8140.01/DoD 8570.01-M Level II certifications are desired, but not requiredQualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability protected veteran status or other characteristics protected by law.
Apply Now!