• Foundations of Security Undergraduate Part-Time Faculty

    Job Locations US-TX-San Antonio
    Company
    University of Phoenix
    Job Family
    Academic Affairs
    Virtual Eligible
    No
    Requisition ID
    2018-9515
    Position Type
    Part-Time
  • Overview

    The candidate that is hired for this part-time position will be required to teach at our local campus in San Antonio, TX.  This is not a virtual or online course.  Only candidates that are able to teach at this specific campus location should apply.

     

    Did you know you could teach for our university without leaving your current job? At University of Phoenix, our flexible class schedules mean you can teach for us part-time without interrupting your full-time career. That’s because we want faculty members who are active in their fields and bring real-world experience to the classroom.

    University of Phoenix College of Information Systems and Technology offers associate, bachelor’s and master’s degree programs that provide students with the skills needed to tackle the demand of the fast-paced technology industry. The College of IS&T also offers a variety of industry aligned certificates to help students prepare for over 40 key industry certifications, from companies like Microsoft®, Cisco®, Oracle® and CompTIA®. The college’s interactive curriculum gives students virtual access to tools used by IT professionals and to training materials that further prepare them for industry certification.

    Responsibilities

    1. As a faculty member you’ll be challenged with adding your professional expertise to instruct a curriculum which is centrally developed with specific learning objectives.
    2. Provide timely and detailed feedback on a weekly basis and offer student support via classroom, phone, and email.
    3. Utilize classroom learning system technology (provided by university), the Internet, and Microsoft Office software.
    4. Perform other duties as assigned or apparent.

    Please click link below to see course description.

    http://www.phoenix.edu/courses/cyb110.html

    Qualifications

    REQUIRED KNOWLEDGE, SKILLS, AND ABILITIES:

     

    MUST meet one of the numbered pathways below, as well as any applicable clarifications stated, (including education, area of study and previous work experience, including minimum number of years and types of experience):

    1. Master's degree or higher that includes the discipline of Cybersecurity, Computer Network Defense or Information Assurance.
    2. Master's degree or higher in any area plus 18 grad credits with a focus in Cybersecurity, Computer Network Defense, Digital Forensics or Information Assurance; and 1 or more certifications listed in the Credentials Section.
    3. Master's degree or higher in any area; must have 2 or more certifications listed in the Credentials Section; and at least 4 years’ professional experience.

    ACCEPTABLE CREDENTIALS:

    • CompTIA Corporation: (CSA+; Security+; Network+; CASP); Certified Wireless Network Professional Organization: (CWNA; CWNE; CWNT; CWSP); Cisco Systems Inc.: (CCNA-Security; SCYBER); CyberSecurity Institute: (CSFA); Information Systems Audit and Control Association, Inc.: (CSXP); International Information Systems Security Certification Consortium (ISC2): (CCFP); International Society of Forensic Computer Examiners (ISFCE): (CCE); SANS Technology Institute: (GCFA; GPEN; GPYC; GREM; GSE; GWAPT; GXPN); The International Council of Electronic Commerce Consultants

    ADDITIONAL CLARIFICATIONS:

    • Degree must be from a regionally accredited institution.
    • In ALL CASES, must have at least 2 years’ professional experience with direct responsibility for computer forensics, cyber security, network defense, infrastructure monitoring and/or cyber security related IT processes, or as IT/cybersecurity/security staff as a PRIMARY job function within the past 3 years for currency.
    • Experience with identifying and mitigating security risks within a large, mid-size or small enterprise environment.
    • Experience with establishing security protocols and policy for infrastructure (including cloud technologies) security for the detection and mitigation of threats to company/organization.
    • If candidates experience primarily comes from consultancy or a home based business, additional information may be requested for verification; otherwise, consulting and/or home based businesses may only be used towards the currency requirement when using work experience to qualify.

    As an Affirmative Action/Equal Opportunity employer, we particularly encourage applications from members of historically underrepresented racial/ethnic groups, women, individuals with disabilities, veterans, LGBTQ community members, and others who demonstrate the ability to help us achieve our vision of a diverse and inclusive community.

     

    #LI-DB1

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on Your Newsfeed