Active Exploitation Instructor Position Available In Escambia, Florida
Tallo's Job Summary: ARSIE Corporation is hiring an Active Exploitation Instructor in Pensacola, FL to deliver Cyberspace Operations training. Responsibilities include providing technical training, developing curriculum, and assessing student proficiency. Requirements include a Bachelor's Degree and 2 years of experience in Cyberspace Operations, or 4 years of experience in lieu of a degree. Expertise in NTFS/EXT file systems and malware analysis tools is also desired.
Job Description
Salary Not Available
Position range in Pensacola-Ferry Pass-Brent, FL Metropolitan Statistical Area $58k – $90k Per Year Active Exploitation Instructor
Arsiem Corporation
Occupation:
Teachers and Instructors, All Other
Location:
Pensacola, FL – 32534
Positions available: 1
Job #: 8329634
Source:
ClearanceJobs.com
Posted:
4/30/2025
Web Site:
www.clearancejobs.com
Job Type:
Full Time (30 Hours or More) Job Requirements and Properties Help for Job Requirements and Properties. Opens a new window. Job Requirements and Properties Help for Job Requirements and Properties. Opens a new window. Job Description Help for Partial Job Description. Opens a new window. Job Description Help for Partial Job Description. Opens a new window.
About ARSIEM Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support. As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM is looking for an Active Exploitation Instructor to deliver Cyberspace Operations (CO) training. The position will support one of our Government clients in Pensacola, FL. Responsibilities
- Perform duties as CO Instructor for Active Exploitation by delivering highly technical training in a military environment consisting of lectures, labs, exercises, and other delivery methods.
- Assist with developing CO training curriculum (lecture content, student/instructor guides, exams, exercises, simulations, etc.).
- Provide instruction that teaches assigned students as described in the course Program of Instruction.
- Conduct practical exercises in a laboratory environment, conduct student study hall periods, and provide tutoring/remedial instruction for up to twenty students per class.
- Incorporate/impart technical knowledge into training delivery.
- Assess student knowledge, skills, and abilities to gauge student proficiency.
- Deliver instruction via interactive synchronous and asynchronous learning activities.
- Review and analyze training materials and recommend changes.
- DoDD 8140.01/DoD 8570.01-M Level II certifications are desired but not required. Additional Information Help for Additional Information. Opens a new window. Additional Information Help for Additional Information. Opens a new window.
Minimum Qualifications - Bachelor’s Degree plus two (2) years of experience in Cyberspace Operations (CO).
- Experience in CO is defined as experience in Defensive Cyberspace Operations (DCO) or Offensive Cyberspace Operations (OCO).
- In lieu of a degree, four (4) years of experience in Cyberspace Operations (CO).
- Experience in adult learning with an emphasis on providing instruction to large classes. US Military instructor certification or designation is highly desirable (e.g., teaching certificate, certified professional instructor, master training specialist, adjunct faculty certification, etc.).
NTFS/EXT
file systems (Understand file system structure and layout, understand how to navigate and search the file system for files of interest during an investigation)
- Must be able to conduct analysis (dynamic or static) on a file and identify the type of malware present, including understanding how the malware operates.
- Must be familiar with the following tools and the basic techniques used to conduct an investigation. Should be familiar with general concepts (keyword search, file system navigation, locating hidden files, file extraction, etc.): EnCase, Sleuth Kit, Helix
- Must be familiar with the following common tools used to conduct malware analysis in a static or dynamic environment.
Should be familiar with common usage of the tools and be able to explain what each tool does and why it is used: Process explorer, Process monitor, Regshot, OllyDbg, IDA Pro, Wireshar
Visit the Employer site for more details Help for Employer Information. Opens a new window.