Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Pennsylvania State University College of IST - Part-time Adjunct Lecturer (Residential) in University Park, Pennsylvania

APPLICATION INSTRUCTIONS:

  • CURRENT PENN STATE EMPLOYEE (faculty, staff, technical service, or student), please login to Workday to complete the internal application process (https://pennstateoffice365.sharepoint.com/:b:/s/KnowledgeBaseArticlesSharing/EfiwgKReZ4VAjprFZPKWUm0Bq_sU3KzTmERfpryq0esPKQ) . Please do not apply here, apply internally through Workday.

  • CURRENT PENN STATE STUDENT (not employed previously at the university) and seeking employment with Penn State, please login to Workday to complete the student application process. (https://pennstateoffice365.sharepoint.com/:b:/s/KnowledgeBaseArticlesSharing/Eeys15Xva4hFokHVtbP1eGIB5i1WFLc-J3k9KHgrFYZ7mg) Please do not apply here, apply internally through Workday.

  • If you are NOT a current employee or student, please click “Apply” and complete the application process for external applicants (https://hr.psu.edu/sites/hr/files/Application_Process_for_External_Applications_Non-Penn_State_Employees_.pdf) .

JOB DESCRIPTION AND POSITION REQUIREMENTS:

The College of Information Sciences and Technology (IST) at The Pennsylvania State University invites applications for part-time academic lecturer positions for the 2022-23 academic year (Summer 2022, Fall 2022, and Spring 2023). These positions will be part-time, non-tenured track appointments without benefits or guarantee of renewal. The college is currently in a growth period with record-high enrollments in both residential and online undergraduate and graduate programs. Successful candidates should be prepared to teach relevant introductory and advanced courses in one or more of the following areas:

Cybersecurity Analytics and Operations:

  • Information security

  • Applied cryptography

  • Systems security, software security, cloud security, network security to include firewalls, intrusion detection, and cryptographic network protocols

  • Malware analytics and software reverse engineering

  • Penetration testing

  • Network traffic analysis

  • Cyber Forensics including network, mobile device, memory, desktop, etc. forensics

  • Cybercrime and Cyber law

  • Security management

Data Sciences

  • Introduction to Data Sciences

  • Data Management for Data Sciences

  • Privacy and Security

  • Data Integration

  • Data Visualization

  • Programming Models for Big Data

  • Applied Data Sciences

  • Data Sciences Capstone

Enterprise Technology Integration:

  • Development for enterprise web technologies

  • Organizational and project management

  • Database management and administration

  • Systems and enterprise integration

  • Advanced database design and management

  • Cloud-based technology solutions and integration

  • Discipline-specific application and integration in the use of technology (e.g. healthcare, finance, business, agriculture, etc.)

Human-Centered Design & Development:

  • Introductory, intermediate, and advanced programming in Java

  • Programming for the web

  • Programming for mobile applications

  • Software design and development

  • Interaction design and development

  • High and low fidelity prototyping, and user interface development tools

  • Studying users, interface design, and interaction

Security Risk Analysis:

  • Introduction to Security and Risk Analysis

  • Threat of Terrorism & Crime

  • Overview of Information Security

  • Decision Theory and Analytic

  • Visual Analytics

  • Risk Analysis in a Security Context

  • Statistics for Security and Risk Analysis

  • The Intelligence Environment

  • Deception and Counter-Deception

  • Security Risk Analysis Capstone

Foundational first- and second-year courses addressing:

  • Introduction to Information, People, and Technology

  • Introduction to Application Development

  • Organization of Data

  • Networking and Telecommunications

  • Language, Logic, and Discrete Mathematics

    Applicants should possess a master's degree or equivalent experience and education and be committed to teaching learners at all levels and from all backgrounds; preference given for prior teaching experience and professional experience in a relevant area. Additional information about residential and online instructional modes and resources to enhance teaching preparation at: https://keepteaching.psu.edu/ .

    The College of Information Sciences and Technology is strongly committed to a diverse community and to providing a welcoming and inclusive environment for faculty, staff and students of all races, genders, and backgrounds. The college is committed to making good faith efforts to recruit, hire, retain, and promote qualified individuals from underrepresented minority groups including women, persons of color, diverse gender identities, individuals with disabilities, and veterans .

    Apply by completing an online application and submitting a cover letter which details your area of teaching interest, and current resume or Curriculum Vita (CV). Applications will be received and reviewed on an ongoing basis and positions filled as needed.

    NOTICE TO APPLICANTS: You are applying to a job pool that may not be reflective of current openings. If there is an opening throughout the 2022 - 2023 year, and you are selected for an interview, the college will contact you.

Penn State is committed to and accountable for advancing diversity, equity, and inclusion in all of its forms. We embrace individual uniqueness, foster a culture of inclusion that supports both broad and specific diversity initiatives, leverage the educational and institutional benefits of diversity, and engage all individuals to help them thrive. We value inclusion as a core strength and an essential element of our public service mission.

CAMPUS SECURITY CRIME STATISTICS:

Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act and the Pennsylvania Act of 1988, Penn State publishes a combined Annual Security and Annual Fire Safety Report (ASR). The ASR includes crime statistics and institutional policies concerning campus security, such as those concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters. The ASR is available for review here (https://police.psu.edu/annual-security-reports) .

Employment with the University will require successful completion of background check(s) in accordance with University policies.

EEO IS THE LAW

Penn State is an equal opportunity, affirmative action employer, and is committed to providing employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. If you are unable to use our online application process due to an impairment or disability, please contact 814-865-1473.

Federal Contractors Labor Law Poster (https://affirmativeaction.psu.edu/files/2022/01/Federal-Contractors-Labor-Law-Poster.pdf)

PA State Labor Law Poster

Affirmative Action (https://policy.psu.edu/policies/hr11)

Penn State Policies

Copyright Information (https://www.psu.edu/copyright-information)

Hotlines

University Park, PA

DirectEmployers