Consultants and Individual Contractors

Call for Mentors for the MADU Digital Security Program

career application image

Have you worked in digital security and supported others through mentoring, training, or technical guidance?

The Jordan Open Source Association (JOSA) is inviting experienced professionals to become mentors in the MADU Digital Security program—a new framework that helps emerging digital protectors develop specialized technical skills.

As a mentor, you will be paired with two learners and guide them throughout their learning journey. Your role will involve offering technical support, sharing practical experience, and helping learners apply and validate new skills in real-world contexts.

If you're passionate about mentorship and advancing digital rights, apply now—or nominate someone who would be a great fit. The Mentorship is set to begin in October 2025.

MADU is currently seeking Mentors for the following areas of specialized technical expertise.

  • Introduction to Threat Intelligence
  • Introduction to Threat Hunting
  • Implementing a Security Program (with a focus on social engineering)
  • Introduction to Malware Development

 

Each of the specialized technical areas will cover a learning path that will be used as a guide for mentors and provides guidance on how a learner can upskill in an area. Different learning paths were designed to be both self-guided and supported directly by a peer or a mentor. Learning paths include a subject matter overview, recommendations for resources and tools and context for using them, practice exercises, and options for learners to verify their new skills.

 

Mentor responsibilities include:

  • Mentorship Meetings: Conduct one weekly or bi-weekly call (approx. 1.5 hours) with each mentee.
  • Asynchronous Support: Be available throughout the week to answer questions and provide guidance (approx. 2 hours per mentee per week).
  • Skill Verification and Support: Provide direct support to learners as they navigate the learning paths and help them verify their skills.
  • Feedback and Reporting: Create a feedback template and progress reports to identify areas for improvement among learners.
  • Use of Learning Paths: Use the learning paths as the primary reference during mentorship, while also drawing on your own experience and recommending additional resources as needed.
  • Program Feedback: Give feedback to the JOSA team on the learning paths, online platform, and overall mentorship process.
  • Resource Recommendations: Recommend additional resources that need to be developed or translated to improve the learning paths.
  • Estimated Time Commitment: Support two learners throughout the program. The total time commitment is approximately 5 to 20 hours per mentee per learning path, depending on each learner's pace. Mentorship is expected to span 2 to 4 months per mentee. Mentors may work with both mentees concurrently or sequentially within this period.

 

JOSA will support a select number of Mentors to receive modest compensation (contracted as personal service contractors (consultants)). Funding will be limited by a variety of factors including available funds, physical location of the Mentor, area of expertise, etc. The JOSA team will inform you if you are eligible for funding. Others who do not receive funding (either because they are not eligible or because they do not want it) are still encouraged to be a Mentor and follow the same self-nomination instructions provided below. If you are interested in being a Mentor and also have existing resources available to cover the time and effort involved in being a Mentor (e.g. a full time job coverage which could include the scope of being a Mentor), we ask that you disclose this in the self-nomination form.

 

Eligibility and Self-Nomination Instructions:

To participate in this mentorship as a Mentor, you must meet the following criteria:

 

Required
 

  • A solid track record in a skill set included in the provided learning paths
    1. Introduction to Threat Intelligence
    2. Introduction to Threat Hunting
    3. Implementing a Security Program (with a focus on social engineering)
    4. Introduction to Malware Development
  • Being a trustworthy member of the community and readiness to uphold the integrity of verification requirements (as rated by a reference(s))
  • Previous experience mentoring, coaching, or supporting others in technical or community work.

 

Preferred
 

  • Preference will be given to those who are based in or work closely with communities based in the following regions: Middle East & North Africa.
  • Demonstration of existing trust relationships with at-risk/marginalized communities. This may include being an ally to these communities (goal is to identify Mentors who are already engaging with, embedded within, or serving at-risk/marginalized communities)
  • Ability and willingness to contribute additional learning resources and verification criteria.

 

Language Proficiency
 

Mentors are expected to be proficient in Arabic, as some learners may prefer to receive mentorship in Arabic. English-language reading comprehension is also important, since many of the learning path materials and external resources are available only in English. While some content will be provided in Arabic, a significant portion of technical references and tools will remain in English. If you have questions or concerns about language requirements, feel free to reach out (see contact information at the end of this document).

To nominate yourself as a Mentor, please complete the self-nomination form:

Applications will be reviewed on a rolling basis, but preference will be given to applicants who complete the form by July 31st, 2025.

If you move forward in the process, you may be requested to participate in an interview and to provide contact information (email address) for two references who can speak to your experience as a digital protector.

 

Contact us with any questions!

Contact the MADU team at MADU at JOSA dot ngo

تاريخ النشر

الثلاثاء، ١ تموز ٢٠٢٥

الموقع

Online (Remote)

نوع الوظيفة

Consultants and Individual Contractors