Adjunct Faculty – Cybersecurity (Scripting, Penetration Testing & Web Security)
Job Description
Overview
GST is seeking an Adjunct Faculty member for Cybersecurity (Scripting, Penetration Testing & Web Security) to teach graduate-level cybersecurity courses in scripting, penetration testing, and web application security. The ideal candidate combines academic expertise with hands-on industry experience and can deliver applied, workforce-aligned instruction that prepares students for real-world cybersecurity roles.
Responsibilities
- Teach assigned graduate cybersecurity courses in an asynchronous online format with required in-person engagement
- Design and facilitate hands-on labs aligned to industry tools and real-world scenarios
- Guide students through applied cybersecurity workflows including automation, offensive security techniques, and vulnerability analysis
- Provide timely, actionable feedback on assignments, labs, and assessments
- Support development of professional documentation, reporting, and communication skills
- Maintain and update course materials within the learning management system (LMS)
- Align instruction with current industry practices, certifications, and workforce expectations
Instructional Scope
Scripting for Cybersecurity
- Teach core scripting concepts across multiple languages (e.g., Python, Bash, PowerShell) with an emphasis on comparing approaches to solve the same problem
- Develop student competency in automating administrative and security tasks, including file handling, log parsing, and system operations
- Cover scripting for networking tasks (socket communication, API interaction) and database operations
- Introduce secure coding practices and debugging techniques
- Emphasize real-world use cases such as incident response automation, data processing, and systems management
Penetration Testing
- Deliver instruction aligned to industry-recognized penetration testing methodologies and Hack The Box certification frameworks (e.g., CPTS-level content)
- Cover the full penetration testing lifecycle: reconnaissance, enumeration, vulnerability analysis, exploitation, privilege escalation, lateral movement, and post-exploitation
- Include hands-on labs targeting network, web application, Active Directory, and hybrid/cloud environments
- Teach tool usage (e.g., Nmap, Metasploit, BloodHound, credential attacks) alongside methodology and decision-making
- Emphasize operational tradecraft, reporting, risk assessment, and communication of findings to stakeholders
Web Security
- Deliver instruction aligned to Hack The Box web security certification frameworks (e.g., CWEE or equivalent pathways)
- Teach how modern web applications function, including HTTP/S protocols, session management, authentication, and backend integrations
- Cover identification and validation of vulnerabilities such as injection flaws, broken authentication, access control issues, and input validation weaknesses
- Utilize tools such as Burp Suite, OWASP ZAP, and proxy-based analysis for hands-on testing
- Emphasize attacker mindset, exploit development basics, and secure design principles
- Incorporate lab-based scenarios simulating real-world web application attack surfaces
Qualifications
Education/Experience
- Master’s degree in Cybersecurity, Information Security, Computer Science, Information Technology, or a closely related field from an accredited institution required.
- Doctoral degree in a related field preferred.
- Minimum of 3–5 years of professional experience in cybersecurity, penetration testing, application security, or scripting/automation
Travel
- Must be willing to commute to 3 Times Sq. for live synchronous classes at least 7 times a semester
- Courses are delivered primarily in an asynchronous online format, requiring consistent online presence and facilitation
Working Conditions
- Use of a computer
- Need to sit or stand for 3-hour class