Job Details
Level: Experienced
Job Location: San Antonio - San Antonio, TX
Position Type: Full Time
Education Level: High School
Salary Range: Undisclosed
Travel Percentage: less than 10%
Job Shift: Day
Job Category: Information Technology
Training Specialist
Primary Location: Lackland AFB – San Antonio, TX
Must be a U.S Citizen
Security Clearance: ActiveTop-Secret w/SCI Eligibility
This position is contingent on contract Award
Job Summary
Obsidian is seeking an experienced and motivated Training Specialist to join our Lackland AFB team. The Training Specialist will develop schedules and conduct training or education of personnel within the cyber domain.
Specific Responsibilities
- Conduct interactive training exercises to create an effective learning environment.
- Develop new or identify existing awareness and training materials that are appropriate for intended audiences.
- Evaluate the effectiveness and comprehensiveness of existing training programs.
- Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions).
- Support the design and execution of exercise scenarios.
- Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.
- Develop computer-based training modules, classes, course assignments, course evaluations and grading and proficiency standards.
- Assist in the development of individual/collective development, training, and/or remediation plans.
- Develop learning objectives and goals, on-the-job training materials or programs.
- Develop written tests for measuring and assessing learner proficiency.
- Conduct learning needs assessments and identify requirements.
- Develop training policies and protocols for cyber training and goals and objectives for cyber curriculum.
- Present technical information to technical and nontechnical audiences.
- Present data in creative formats.
- Write and publish after action reviews.
- Deliver training courses tailored to the audience and physical/virtual environments.
- Apply concepts, procedures, software, equipment, and/or technology applications to students.
- Design training curriculum and course content based on requirements.
- Participate in development of training curriculum and course content.
- Ensure that training meets the goals and objectives for cybersecurity training, education, or awareness.
- Plan and coordinate the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, multimedia presentations) for the most effective learning environment.
- Plan non-classroom educational techniques and formats (e.g., video courses, mentoring, web-based courses).
- Recommend revisions to curriculum and course content based on feedback from previous training sessions.
- Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).
- Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations.
|
Qualifications
- 5 years of experience
- IAT III, in one of the following: Ethical Hacking, *NIX OS, Windows OS, Web, Vulnerabilities, Databases, Networking, Wireless, Security Tools
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk), laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cybersecurity and privacy principles, cyber threats and vulnerabilities, specific operational impacts of cybersecurity lapses.
- Knowledge of authentication, authorization, and access control methods, new and emerging information technology (IT) and cybersecurity technologies and what can be exploited.
- Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain, virtualization technologies and virtual machine development and maintenance.
- Knowledge of the organization's core business/mission processes, emerging security issues, risks, and vulnerabilities.
- Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes), computer-based training and e-learning services and instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation).
- Knowledge of organizational training policies, learning levels (i.e., Bloom’s Taxonomy of learning), Learning Management Systems and their use in managing learning, learning styles (e.g., assimilator, auditory, kinesthetic).
- Knowledge of modes of learning (e.g., rote learning, observation), organizational training systems, media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
- Knowledge of principles and processes for conducting training and education needs assessment, relevant concepts, procedures, software, equipment, and technology applications.
- Knowledge of Test & Evaluation processes for learners, training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
- Knowledge of an organization's information classification program and procedures for information compromise, external organizations, and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development), technical delivery capabilities and their limitations.
- Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
- Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems, analyzing network traffic capacity and performance characteristics.
- Applying confidentiality, integrity, and availability principles.
- Skill in the use of penetration testing tools and techniques, social engineering techniques. (e.g., phishing, baiting, tailgating, etc.), tuning sensors.
- in information privacy technologies to ensure organizational adaptation and compliance.
- Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.
- Ability to understand technology, management, and leadership issues related to organization processes and problem solving
- Ability to understand the basic concepts and issues related to cyber and its organizational impact.
- Ability to conduct training and education needs assessment.
Physical Requirements and Work Environment
- Normal Office environment
Travel
Company Description
Obsidian Solutions Group LLC (OSG) is a fast-growing professional services firm based in Fredericksburg, VA. We create value for our customers by delivering technology-enabled & mission-oriented technical solutions that solve complex problems, protecting people, information, and assets. Our core capabilities are in providing Enterprise IT, Intelligence Analysis, Production & Development and Knowledge-Based Professional Services Solutions that enable the customer’s mission. Obsidian Solutions Group LLC is a certified 8(a), service-disabled, veteran-owned small business.
A career at Obsidian Solutions Group means you are able to put your expertise, credentials, and talents to great use working with customers in the DOD and Intelligence Community, while enjoying the excitement of working in a fast-growing organization committed to making a difference for our customers and in our community. Contribute independently and collaboratively alongside our amazing team of doers and thinkers. Obsidian Solutions Group is small enough to offer a family atmosphere yet large enough to deliver a highly competitive compensation package. We hire and retain the best in the industry, offering exceptional benefits that protect the well-being of our employees, their spouses and domestic partners, and their families.
Our corporate philosophy is centered on hiring and retaining employees with the requisite skills, professional experience, personal commitment, and ethical standards necessary to foster a culture of operational excellence necessary to surpass our customer’s expectations.
Disclaimer
The above information on this description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job.
Obsidian Solutions Group is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, parental status, protected veteran status, and any other non-merit factor, or any other characteristic protected by law.