Cyber Instructional Curriculum Developer

Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Knowledge of cybersecurity and privacy principles.
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain.
  • Knowledge of the organization's core business/mission processes.
  • Knowledge of emerging security issues, risks, and vulnerabilities.
  • Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes).
  • Knowledge of computer based training and e-learning services.
  • Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne's Events of Instruction, Kirkpatrick's model of evaluation).
  • Knowledge of learning levels (i.e., Bloom's Taxonomy of learning).
  • Knowledge of Learning Management Systems and their use in managing learning.
  • Knowledge of modes of learning (e.g., rote learning, observation).
  • Knowledge of organizational training and education policies, processes, and procedures.
  • Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
  • Knowledge of principles and processes for conducting training and education needs assessment.
  • Knowledge of relevant concepts, procedures, software, equipment, and technology applications.
  • Knowledge of Test & Evaluation processes for learners.
  • Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
  • Knowledge of an organization's information classification program and procedures for information compromise.
  • Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
  • Skill in developing and executing technical training programs and curricula.
  • Skill in identifying gaps in technical capabilities.
  • Skill in talking to others to convey information effectively.
  • Skill in applying technical delivery capabilities.
  • Skill in identifying gaps in technical delivery capabilities.
  • Skill in utilizing feedback to improve processes, products, and services.
  • Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience.
  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • Ability to prepare and present briefings.
  • Ability to produce technical documentation.
  • Ability to apply principles of adult learning.
  • Ability to develop clear directions and instructional materials.
  • Ability to develop curriculum for use within a virtual environment.
  • Ability to apply the Instructional System Design (ISD) methodology.
  • Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.
  • Ability to operate common network tools (e.g., ping, traceroute, nslookup).
  • Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.
  • Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
  • Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • Ability to apply critical reading/thinking skills.
  • Ability to evaluate information for reliability, validity, and relevance.
  • Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • Ability to tailor technical and planning information to a customer's level of understanding.
  • Ability to think critically.
  • Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.
  • Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.
  • Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
  • Ability to understand the basic concepts and issues related to cyber and its organizational impact.
  • Ability to conduct training and education needs assessment.
  • Support the design and execution of exercise scenarios.
  • Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
  • Research current technology to understand capabilities of required system or network.
  • Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction.
  • Conduct learning needs assessments and identify requirements.
  • Create interactive learning exercises to create an effective learning environment.
  • Develop or assist in the development of training policies and protocols for cyber training.
  • Develop the goals and objectives for cyber curriculum.
  • Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment in conjunction with educators and trainers.
  • Correlate training and learning to business or mission requirements.
  • Create training courses tailored to the audience and physical environment.
  • Design training curriculum and course content based on requirements.
  • Participate in development of training curriculum and course content.
  • Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions).
  • Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).
  • Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations.