diff --git "a/evaluation.jsonl" "b/evaluation.jsonl" --- "a/evaluation.jsonl" +++ "b/evaluation.jsonl" @@ -1,351 +1,483 @@ -{"text":"Accomplished Security Compliance Officer specializing in Control Mapping and Bluetooth Security.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1179755132,"_task_hash":1551877757,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Compliance","start":22,"end":32,"id":2},{"text":"Officer","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Control","start":57,"end":64,"id":6},{"text":"Mapping","start":65,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"Bluetooth","start":77,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} -{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Join our team as Connected Device Security Specialist!","spans":[{"start":17,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-800134200,"_task_hash":1575745476,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Connected","start":17,"end":26,"id":4},{"text":"Device","start":27,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Specialist","start":43,"end":53,"id":7},{"text":"!","start":53,"end":54,"id":8}]} -{"text":"Must know SIEM, QRadar, and OWASP Top 10.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1657276668,"_task_hash":-615589961,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"QRadar","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":".","start":40,"end":41,"id":10}]} -{"text":"MFA & SSO certification a plus.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":771046618,"_task_hash":-1899894933,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"certification","start":10,"end":23,"id":3},{"text":"a","start":24,"end":25,"id":4},{"text":"plus","start":26,"end":30,"id":5},{"text":".","start":30,"end":31,"id":6}]} -{"text":"Integration Specialist experienced in detecting malware attacks using Nessus.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":55,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":70,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1504909019,"_task_hash":-140585424,"tokens":[{"text":"Integration","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"malware","start":48,"end":55,"id":5},{"text":"attacks","start":56,"end":63,"id":6},{"text":"using","start":64,"end":69,"id":7},{"text":"Nessus","start":70,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Human Factor Security Specialist opportunity: Lead Azure Security program, implement NIST Framework, manage Performance Tuning operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":51,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8},{"start":85,"end":99,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1990025043,"_task_hash":-921854473,"tokens":[{"text":"Human","start":0,"end":5,"id":0},{"text":"Factor","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"opportunity","start":33,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"Lead","start":46,"end":50,"id":6},{"text":"Azure","start":51,"end":56,"id":7},{"text":"Security","start":57,"end":65,"id":8},{"text":"program","start":66,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"implement","start":75,"end":84,"id":11},{"text":"NIST","start":85,"end":89,"id":12},{"text":"Framework","start":90,"end":99,"id":13},{"text":",","start":99,"end":100,"id":14},{"text":"manage","start":101,"end":107,"id":15},{"text":"Performance","start":108,"end":119,"id":16},{"text":"Tuning","start":120,"end":126,"id":17},{"text":"operations","start":127,"end":137,"id":18},{"text":".","start":137,"end":138,"id":19}]} -{"text":"Experienced IAM Engineer specializing in Cloud Security.","spans":[{"start":12,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":308036260,"_task_hash":1313167417,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IAM","start":12,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"specializing","start":25,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Cloud","start":41,"end":46,"id":5},{"text":"Security","start":47,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} -{"text":"Proficient in Burp Suite and Wireshark.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":74102493,"_task_hash":1528570037,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Wireshark","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} -{"text":"Accomplished Quality Assurance Engineer specializing in Model Explainability and Cisco Security.","spans":[{"start":13,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1085597199,"_task_hash":1238925514,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Quality","start":13,"end":20,"id":1},{"text":"Assurance","start":21,"end":30,"id":2},{"text":"Engineer","start":31,"end":39,"id":3},{"text":"specializing","start":40,"end":52,"id":4},{"text":"in","start":53,"end":55,"id":5},{"text":"Model","start":56,"end":61,"id":6},{"text":"Explainability","start":62,"end":76,"id":7},{"text":"and","start":77,"end":80,"id":8},{"text":"Cisco","start":81,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} -{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"ML Research Scientist experienced in detecting ransomware attacks using CrowdStrike.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":44203192,"_task_hash":-464813632,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Research","start":3,"end":11,"id":1},{"text":"Scientist","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"CrowdStrike","start":72,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Data Privacy Analyst opportunity: Lead AI Security program, implement NIST Framework, manage API Testing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":84,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":93,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":949601256,"_task_hash":-563169786,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Privacy","start":5,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"AI","start":39,"end":41,"id":6},{"text":"Security","start":42,"end":50,"id":7},{"text":"program","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"implement","start":60,"end":69,"id":10},{"text":"NIST","start":70,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":",","start":84,"end":85,"id":13},{"text":"manage","start":86,"end":92,"id":14},{"text":"API","start":93,"end":96,"id":15},{"text":"Testing","start":97,"end":104,"id":16},{"text":"operations","start":105,"end":115,"id":17},{"text":".","start":115,"end":116,"id":18}]} -{"text":"Looking for Server-Side Developer to lead API Security initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":5},{"start":42,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-687060429,"_task_hash":-613256071,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Server","start":12,"end":18,"id":2},{"text":"-","start":18,"end":19,"id":3},{"text":"Side","start":19,"end":23,"id":4},{"text":"Developer","start":24,"end":33,"id":5},{"text":"to","start":34,"end":36,"id":6},{"text":"lead","start":37,"end":41,"id":7},{"text":"API","start":42,"end":45,"id":8},{"text":"Security","start":46,"end":54,"id":9},{"text":"initiatives","start":55,"end":66,"id":10},{"text":".","start":66,"end":67,"id":11}]} -{"text":"Must have QRadar experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1097696822,"_task_hash":-943825386,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Experienced Endpoint Security Engineer specializing in Security Scanning Tools.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1002635329,"_task_hash":1603478008,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Endpoint","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Engineer","start":30,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Scanning","start":64,"end":72,"id":7},{"text":"Tools","start":73,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} -{"text":"Proficient in EDR Platforms and Nessus.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":834658253,"_task_hash":-486266097,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"Nessus","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} -{"text":"Looking for Software Security Engineer to lead Cloud Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1395114012,"_task_hash":-318739536,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Cloud","start":47,"end":52,"id":7},{"text":"Security","start":53,"end":61,"id":8},{"text":"Architecture","start":62,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} -{"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} -{"text":"Join our team as Copywriter!","spans":[{"start":17,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":264160960,"_task_hash":661764470,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Copywriter","start":17,"end":27,"id":4},{"text":"!","start":27,"end":28,"id":5}]} -{"text":"Must know SIEM Operations, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":33,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-106006301,"_task_hash":705663433,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"Nessus","start":27,"end":33,"id":5},{"text":",","start":33,"end":34,"id":6},{"text":"and","start":35,"end":38,"id":7},{"text":"OWASP","start":39,"end":44,"id":8},{"text":"Top","start":45,"end":48,"id":9},{"text":"10","start":49,"end":51,"id":10},{"text":".","start":51,"end":52,"id":11}]} -{"text":"NIST RMF certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1708361409,"_task_hash":252404575,"tokens":[{"text":"NIST","start":0,"end":4,"id":0},{"text":"RMF","start":5,"end":8,"id":1},{"text":"certification","start":9,"end":22,"id":2},{"text":"a","start":23,"end":24,"id":3},{"text":"plus","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} -{"text":"Senior Back-End Developer position: 7 years minimum, expert in Cisco, Documentation, and Wireless Security.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":63,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":70,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15},{"start":89,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-364695713,"_task_hash":1003410513,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"position","start":26,"end":34,"id":5},{"text":":","start":34,"end":35,"id":6},{"text":"7","start":36,"end":37,"id":7},{"text":"years","start":38,"end":43,"id":8},{"text":"minimum","start":44,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"expert","start":53,"end":59,"id":11},{"text":"in","start":60,"end":62,"id":12},{"text":"Cisco","start":63,"end":68,"id":13},{"text":",","start":68,"end":69,"id":14},{"text":"Documentation","start":70,"end":83,"id":15},{"text":",","start":83,"end":84,"id":16},{"text":"and","start":85,"end":88,"id":17},{"text":"Wireless","start":89,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} -{"text":"Seeking GRC Specialist with 3+ years experience in R and Secure Multi-Party Computation.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":57,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-657164487,"_task_hash":-379869526,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"GRC","start":8,"end":11,"id":1},{"text":"Specialist","start":12,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"3","start":28,"end":29,"id":4},{"text":"+","start":29,"end":30,"id":5},{"text":"years","start":31,"end":36,"id":6},{"text":"experience","start":37,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"R","start":51,"end":52,"id":9},{"text":"and","start":53,"end":56,"id":10},{"text":"Secure","start":57,"end":63,"id":11},{"text":"Multi","start":64,"end":69,"id":12},{"text":"-","start":69,"end":70,"id":13},{"text":"Party","start":70,"end":75,"id":14},{"text":"Computation","start":76,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} -{"text":"MFA & SSO required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-239499753,"_task_hash":-1526678368,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"required","start":10,"end":18,"id":3},{"text":".","start":18,"end":19,"id":4}]} -{"text":"Seeking VP Information Security with 5++ years experience in Technology Strategy and Unreal.","spans":[{"start":8,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1085413242,"_task_hash":-1026359513,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"VP","start":8,"end":10,"id":1},{"text":"Information","start":11,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"experience","start":47,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"Technology","start":61,"end":71,"id":9},{"text":"Strategy","start":72,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Unreal","start":85,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} -{"text":"C/C++ required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":699091344,"_task_hash":1704612957,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} -{"text":"Hiring Forensic Examiner for React Native and worm detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":46,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1241334109,"_task_hash":-1428753276,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"React","start":29,"end":34,"id":4},{"text":"Native","start":35,"end":41,"id":5},{"text":"and","start":42,"end":45,"id":6},{"text":"worm","start":46,"end":50,"id":7},{"text":"detection","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} -{"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} -{"text":"Enterprise Cloud Architect with expertise in OWASP Top 10 compliance and Digital Forensics operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":73,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1116201797,"_task_hash":-2036307767,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"expertise","start":32,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"OWASP","start":45,"end":50,"id":6},{"text":"Top","start":51,"end":54,"id":7},{"text":"10","start":55,"end":57,"id":8},{"text":"compliance","start":58,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"Digital","start":73,"end":80,"id":11},{"text":"Forensics","start":81,"end":90,"id":12},{"text":"operations","start":91,"end":101,"id":13},{"text":".","start":101,"end":102,"id":14}]} -{"text":"Senior Cloud Native Security Engineer position: 10 years minimum, expert in Content Management Systems, Ghidra, and Terraform Security.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":76,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15},{"start":104,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":17},{"start":116,"end":134,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-567450947,"_task_hash":858755741,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Native","start":13,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"position","start":38,"end":46,"id":5},{"text":":","start":46,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"minimum","start":57,"end":64,"id":9},{"text":",","start":64,"end":65,"id":10},{"text":"expert","start":66,"end":72,"id":11},{"text":"in","start":73,"end":75,"id":12},{"text":"Content","start":76,"end":83,"id":13},{"text":"Management","start":84,"end":94,"id":14},{"text":"Systems","start":95,"end":102,"id":15},{"text":",","start":102,"end":103,"id":16},{"text":"Ghidra","start":104,"end":110,"id":17},{"text":",","start":110,"end":111,"id":18},{"text":"and","start":112,"end":115,"id":19},{"text":"Terraform","start":116,"end":125,"id":20},{"text":"Security","start":126,"end":134,"id":21},{"text":".","start":134,"end":135,"id":22}]} -{"text":"Network Security Engineer experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1009607125,"_task_hash":-593704316,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"SIEM","start":72,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} +{"text":"We need a Governance Risk Compliance Specialist skilled in Remote Code Execution prevention and Man-in-the-Middle analysis using EDR Platforms.","spans":[{"start":10,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":59,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":11},{"start":96,"end":113,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":20},{"start":129,"end":142,"label":"SECURITY_TOOL","answer":"accept","token_start":23,"token_end":24}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1250070946,"_task_hash":-1399765496,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Governance","start":10,"end":20,"id":3},{"text":"Risk","start":21,"end":25,"id":4},{"text":"Compliance","start":26,"end":36,"id":5},{"text":"Specialist","start":37,"end":47,"id":6},{"text":"skilled","start":48,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Remote","start":59,"end":65,"id":9},{"text":"Code","start":66,"end":70,"id":10},{"text":"Execution","start":71,"end":80,"id":11},{"text":"prevention","start":81,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"Man","start":96,"end":99,"id":14},{"text":"-","start":99,"end":100,"id":15},{"text":"in","start":100,"end":102,"id":16},{"text":"-","start":102,"end":103,"id":17},{"text":"the","start":103,"end":106,"id":18},{"text":"-","start":106,"end":107,"id":19},{"text":"Middle","start":107,"end":113,"id":20},{"text":"analysis","start":114,"end":122,"id":21},{"text":"using","start":123,"end":128,"id":22},{"text":"EDR","start":129,"end":132,"id":23},{"text":"Platforms","start":133,"end":142,"id":24},{"text":".","start":142,"end":143,"id":25}]} +{"text":"Accomplished IT Operations Manager specializing in Technical Leadership and Pod Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-935636994,"_task_hash":-309378129,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Operations","start":16,"end":26,"id":2},{"text":"Manager","start":27,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Technical","start":51,"end":60,"id":6},{"text":"Leadership","start":61,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Pod","start":76,"end":79,"id":9},{"text":"Security","start":80,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Insider Threat Specialist with expertise in NIST Framework compliance and Data Pipelines operations.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":58,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":74,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2048261745,"_task_hash":1887736849,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Specialist","start":15,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"expertise","start":31,"end":40,"id":4},{"text":"in","start":41,"end":43,"id":5},{"text":"NIST","start":44,"end":48,"id":6},{"text":"Framework","start":49,"end":58,"id":7},{"text":"compliance","start":59,"end":69,"id":8},{"text":"and","start":70,"end":73,"id":9},{"text":"Data","start":74,"end":78,"id":10},{"text":"Pipelines","start":79,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} +{"text":"Cryptography Expert professional with 3++ years implementing EDR Tools and managing Sandbox Analysis programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":8},{"start":84,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2128135888,"_task_hash":395365015,"tokens":[{"text":"Cryptography","start":0,"end":12,"id":0},{"text":"Expert","start":13,"end":19,"id":1},{"text":"professional","start":20,"end":32,"id":2},{"text":"with","start":33,"end":37,"id":3},{"text":"3++","start":38,"end":41,"id":4},{"text":"years","start":42,"end":47,"id":5},{"text":"implementing","start":48,"end":60,"id":6},{"text":"EDR","start":61,"end":64,"id":7},{"text":"Tools","start":65,"end":70,"id":8},{"text":"and","start":71,"end":74,"id":9},{"text":"managing","start":75,"end":83,"id":10},{"text":"Sandbox","start":84,"end":91,"id":11},{"text":"Analysis","start":92,"end":100,"id":12},{"text":"programs","start":101,"end":109,"id":13},{"text":".","start":109,"end":110,"id":14}]} +{"text":"IAM Engineer experienced in detecting phishing attacks using ELK Stack.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1753139690,"_task_hash":-2139052346,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"Engineer","start":4,"end":12,"id":1},{"text":"experienced","start":13,"end":24,"id":2},{"text":"in","start":25,"end":27,"id":3},{"text":"detecting","start":28,"end":37,"id":4},{"text":"phishing","start":38,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":"using","start":55,"end":60,"id":7},{"text":"ELK","start":61,"end":64,"id":8},{"text":"Stack","start":65,"end":70,"id":9},{"text":".","start":70,"end":71,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Service Incident Manager professional with 7+ years implementing ELK Stack and managing Expert Testimony programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":65,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-780763799,"_task_hash":-347210040,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Incident","start":8,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"professional","start":25,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"7","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"implementing","start":52,"end":64,"id":8},{"text":"ELK","start":65,"end":68,"id":9},{"text":"Stack","start":69,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"managing","start":79,"end":87,"id":12},{"text":"Expert","start":88,"end":94,"id":13},{"text":"Testimony","start":95,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} -{"text":"Video Game Developer needed for enterprise security team.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":632897693,"_task_hash":-1327652147,"tokens":[{"text":"Video","start":0,"end":5,"id":0},{"text":"Game","start":6,"end":10,"id":1},{"text":"Developer","start":11,"end":20,"id":2},{"text":"needed","start":21,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"security","start":43,"end":51,"id":6},{"text":"team","start":52,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} -{"text":"Required: OSCP Certification, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":30,"end":39,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1224765620,"_task_hash":-1703529489,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"OSCP","start":10,"end":14,"id":2},{"text":"Certification","start":15,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"ELK","start":30,"end":33,"id":5},{"text":"Stack","start":34,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"and","start":41,"end":44,"id":8},{"text":"OWASP","start":45,"end":50,"id":9},{"text":"Top","start":51,"end":54,"id":10},{"text":"10","start":55,"end":57,"id":11},{"text":"expertise","start":58,"end":67,"id":12},{"text":".","start":67,"end":68,"id":13}]} -{"text":"Seeking Game Engineer with 3+ years experience in Enterprise Risk Management and Process Improvement.","spans":[{"start":8,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":660322616,"_task_hash":-362025316,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Game","start":8,"end":12,"id":1},{"text":"Engineer","start":13,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"3","start":27,"end":28,"id":4},{"text":"+","start":28,"end":29,"id":5},{"text":"years","start":30,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Enterprise","start":50,"end":60,"id":9},{"text":"Risk","start":61,"end":65,"id":10},{"text":"Management","start":66,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Process","start":81,"end":88,"id":13},{"text":"Improvement","start":89,"end":100,"id":14},{"text":".","start":100,"end":101,"id":15}]} -{"text":"SLAM required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":45167728,"_task_hash":1981946623,"tokens":[{"text":"SLAM","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Cyberpunk Hacker with 10+ years experience in Intelligence Analysis, Third-Party Risk, and System Maintenance.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":91,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1570087959,"_task_hash":1698623478,"tokens":[{"text":"Cyberpunk","start":0,"end":9,"id":0},{"text":"Hacker","start":10,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Intelligence","start":46,"end":58,"id":8},{"text":"Analysis","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Third","start":69,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"Party","start":75,"end":80,"id":13},{"text":"Risk","start":81,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"and","start":87,"end":90,"id":16},{"text":"System","start":91,"end":97,"id":17},{"text":"Maintenance","start":98,"end":109,"id":18},{"text":".","start":109,"end":110,"id":19}]} -{"text":"Holds ISO 31000 certification.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":461633574,"_task_hash":-1331949047,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"31000","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} -{"text":"Senior Disaster Recovery Specialist position: 5+ years minimum, expert in Identity Lifecycle, Data Modeling, and Security Patterns.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":74,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":94,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":113,"end":130,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-236312413,"_task_hash":505572690,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Disaster","start":7,"end":15,"id":1},{"text":"Recovery","start":16,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"position","start":36,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"5","start":46,"end":47,"id":6},{"text":"+","start":47,"end":48,"id":7},{"text":"years","start":49,"end":54,"id":8},{"text":"minimum","start":55,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"expert","start":64,"end":70,"id":11},{"text":"in","start":71,"end":73,"id":12},{"text":"Identity","start":74,"end":82,"id":13},{"text":"Lifecycle","start":83,"end":92,"id":14},{"text":",","start":92,"end":93,"id":15},{"text":"Data","start":94,"end":98,"id":16},{"text":"Modeling","start":99,"end":107,"id":17},{"text":",","start":107,"end":108,"id":18},{"text":"and","start":109,"end":112,"id":19},{"text":"Security","start":113,"end":121,"id":20},{"text":"Patterns","start":122,"end":130,"id":21},{"text":".","start":130,"end":131,"id":22}]} -{"text":"Looking for Ethical Hacker to lead Security Culture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":51,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1333134731,"_task_hash":506412747,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Ethical","start":12,"end":19,"id":2},{"text":"Hacker","start":20,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Security","start":35,"end":43,"id":6},{"text":"Culture","start":44,"end":51,"id":7},{"text":"initiatives","start":52,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} -{"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} -{"text":"Accomplished Sysadmin specializing in RESTful APIs and Kubernetes Security.","spans":[{"start":13,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":38,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-422357775,"_task_hash":-111400691,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Sysadmin","start":13,"end":21,"id":1},{"text":"specializing","start":22,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"RESTful","start":38,"end":45,"id":4},{"text":"APIs","start":46,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Kubernetes","start":55,"end":65,"id":7},{"text":"Security","start":66,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} -{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Experienced Test Automation Engineer specializing in Pod Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-234572808,"_task_hash":-722647711,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Test","start":12,"end":16,"id":1},{"text":"Automation","start":17,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Pod","start":53,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} -{"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} -{"text":"Accomplished Compliance Manager specializing in Differential Privacy and AWS Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":881088367,"_task_hash":1812560522,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Compliance","start":13,"end":23,"id":1},{"text":"Manager","start":24,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Differential","start":48,"end":60,"id":5},{"text":"Privacy","start":61,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"AWS","start":73,"end":76,"id":8},{"text":"Security","start":77,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} +{"text":"IT Administrator professional with 10+ years implementing Wireshark and managing Threat Modeling programs.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":58,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":81,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2028535025,"_task_hash":-1281299275,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Administrator","start":3,"end":16,"id":1},{"text":"professional","start":17,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"10","start":35,"end":37,"id":4},{"text":"+","start":37,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"implementing","start":45,"end":57,"id":7},{"text":"Wireshark","start":58,"end":67,"id":8},{"text":"and","start":68,"end":71,"id":9},{"text":"managing","start":72,"end":80,"id":10},{"text":"Threat","start":81,"end":87,"id":11},{"text":"Modeling","start":88,"end":96,"id":12},{"text":"programs","start":97,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} +{"text":"Accomplished Network Security Engineer specializing in Device Encryption and CI/CD Security.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-569797197,"_task_hash":-553825222,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Network","start":13,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Engineer","start":30,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Device","start":55,"end":61,"id":6},{"text":"Encryption","start":62,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"CI","start":77,"end":79,"id":9},{"text":"/","start":79,"end":80,"id":10},{"text":"CD","start":80,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Looking for Robotic Systems Engineer to lead Hardware Security initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1265229985,"_task_hash":373716405,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Robotic","start":12,"end":19,"id":2},{"text":"Systems","start":20,"end":27,"id":3},{"text":"Engineer","start":28,"end":36,"id":4},{"text":"to","start":37,"end":39,"id":5},{"text":"lead","start":40,"end":44,"id":6},{"text":"Hardware","start":45,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} -{"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} -{"text":"Looking for Security Monitoring Analyst to lead Mobile Security initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1486834487,"_task_hash":2136723309,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Monitoring","start":21,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Mobile","start":48,"end":54,"id":7},{"text":"Security","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} -{"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Experienced DevOps Architect specializing in MQTT Security.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":651891005,"_task_hash":816126202,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"DevOps","start":12,"end":18,"id":1},{"text":"Architect","start":19,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"MQTT","start":45,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} -{"text":"Proficient in Splunk and EDR Tools.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1003087028,"_task_hash":1250982942,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"EDR","start":25,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} -{"text":"We need a Lead Software Engineer skilled in Cross-Site Scripting prevention and malware analysis using SIEM Operations.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":44,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":87,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":103,"end":118,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-62018750,"_task_hash":360614429,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Lead","start":10,"end":14,"id":3},{"text":"Software","start":15,"end":23,"id":4},{"text":"Engineer","start":24,"end":32,"id":5},{"text":"skilled","start":33,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Cross","start":44,"end":49,"id":8},{"text":"-","start":49,"end":50,"id":9},{"text":"Site","start":50,"end":54,"id":10},{"text":"Scripting","start":55,"end":64,"id":11},{"text":"prevention","start":65,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"malware","start":80,"end":87,"id":14},{"text":"analysis","start":88,"end":96,"id":15},{"text":"using","start":97,"end":102,"id":16},{"text":"SIEM","start":103,"end":107,"id":17},{"text":"Operations","start":108,"end":118,"id":18},{"text":".","start":118,"end":119,"id":19}]} -{"text":"Lead AI/ML Security Specialist managing Model Deployment and Staff Development initiatives.","spans":[{"start":5,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":61,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1873643412,"_task_hash":-558886895,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"AI","start":5,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"ML","start":8,"end":10,"id":3},{"text":"Security","start":11,"end":19,"id":4},{"text":"Specialist","start":20,"end":30,"id":5},{"text":"managing","start":31,"end":39,"id":6},{"text":"Model","start":40,"end":45,"id":7},{"text":"Deployment","start":46,"end":56,"id":8},{"text":"and","start":57,"end":60,"id":9},{"text":"Staff","start":61,"end":66,"id":10},{"text":"Development","start":67,"end":78,"id":11},{"text":"initiatives","start":79,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} -{"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} -{"text":"Certified NIST RMF working as Technology Manager, focused on Security Culture and Clickjacking prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":82,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1978344870,"_task_hash":1176686237,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Technology","start":30,"end":40,"id":5},{"text":"Manager","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Security","start":61,"end":69,"id":10},{"text":"Culture","start":70,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Clickjacking","start":82,"end":94,"id":13},{"text":"prevention","start":95,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} -{"text":"Hiring Test Engineer for Shaders and trojan detection.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":25,"end":32,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1362019885,"_task_hash":1157514645,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"for","start":21,"end":24,"id":3},{"text":"Shaders","start":25,"end":32,"id":4},{"text":"and","start":33,"end":36,"id":5},{"text":"trojan","start":37,"end":43,"id":6},{"text":"detection","start":44,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} -{"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} -{"text":"Business Intelligence Developer with expertise in OWASP Top 10 compliance and Responsive Design operations.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":62,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":78,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-390213284,"_task_hash":515086785,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Intelligence","start":9,"end":21,"id":1},{"text":"Developer","start":22,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"expertise","start":37,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"OWASP","start":50,"end":55,"id":6},{"text":"Top","start":56,"end":59,"id":7},{"text":"10","start":60,"end":62,"id":8},{"text":"compliance","start":63,"end":73,"id":9},{"text":"and","start":74,"end":77,"id":10},{"text":"Responsive","start":78,"end":88,"id":11},{"text":"Design","start":89,"end":95,"id":12},{"text":"operations","start":96,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} -{"text":"Experienced Machine Learning Product Manager specializing in Supply Chain Security.","spans":[{"start":12,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":61,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":941309924,"_task_hash":165336706,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Machine","start":12,"end":19,"id":1},{"text":"Learning","start":20,"end":28,"id":2},{"text":"Product","start":29,"end":36,"id":3},{"text":"Manager","start":37,"end":44,"id":4},{"text":"specializing","start":45,"end":57,"id":5},{"text":"in","start":58,"end":60,"id":6},{"text":"Supply","start":61,"end":67,"id":7},{"text":"Chain","start":68,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} -{"text":"Proficient in SIEM and QRadar.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1727736061,"_task_hash":1875785462,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"QRadar","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} -{"text":"AI with hands-on experience in SIEM, QRadar, and Security Design.","spans":[{"start":0,"end":2,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":31,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":37,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":49,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-877152545,"_task_hash":650211727,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"with","start":3,"end":7,"id":1},{"text":"hands","start":8,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"on","start":14,"end":16,"id":4},{"text":"experience","start":17,"end":27,"id":5},{"text":"in","start":28,"end":30,"id":6},{"text":"SIEM","start":31,"end":35,"id":7},{"text":",","start":35,"end":36,"id":8},{"text":"QRadar","start":37,"end":43,"id":9},{"text":",","start":43,"end":44,"id":10},{"text":"and","start":45,"end":48,"id":11},{"text":"Security","start":49,"end":57,"id":12},{"text":"Design","start":58,"end":64,"id":13},{"text":".","start":64,"end":65,"id":14}]} -{"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} -{"text":"Certified ETL working as Enterprise Risk Analyst, focused on Web App Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":82,"end":102,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1377424861,"_task_hash":-961801186,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ETL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Enterprise","start":25,"end":35,"id":4},{"text":"Risk","start":36,"end":40,"id":5},{"text":"Analyst","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Web","start":61,"end":64,"id":10},{"text":"App","start":65,"end":68,"id":11},{"text":"Security","start":69,"end":77,"id":12},{"text":"and","start":78,"end":81,"id":13},{"text":"Cross","start":82,"end":87,"id":14},{"text":"-","start":87,"end":88,"id":15},{"text":"Site","start":88,"end":92,"id":16},{"text":"Scripting","start":93,"end":102,"id":17},{"text":"prevention","start":103,"end":113,"id":18},{"text":".","start":113,"end":114,"id":19}]} -{"text":"Admin with hands-on experience in CrowdStrike, EDR Tools, and Model Security.","spans":[{"start":0,"end":5,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":34,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":62,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":782128303,"_task_hash":-1292701544,"tokens":[{"text":"Admin","start":0,"end":5,"id":0},{"text":"with","start":6,"end":10,"id":1},{"text":"hands","start":11,"end":16,"id":2},{"text":"-","start":16,"end":17,"id":3},{"text":"on","start":17,"end":19,"id":4},{"text":"experience","start":20,"end":30,"id":5},{"text":"in","start":31,"end":33,"id":6},{"text":"CrowdStrike","start":34,"end":45,"id":7},{"text":",","start":45,"end":46,"id":8},{"text":"EDR","start":47,"end":50,"id":9},{"text":"Tools","start":51,"end":56,"id":10},{"text":",","start":56,"end":57,"id":11},{"text":"and","start":58,"end":61,"id":12},{"text":"Model","start":62,"end":67,"id":13},{"text":"Security","start":68,"end":76,"id":14},{"text":".","start":76,"end":77,"id":15}]} -{"text":"Holds SOC 2.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":556305966,"_task_hash":-2022141598,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SOC","start":6,"end":9,"id":1},{"text":"2","start":10,"end":11,"id":2},{"text":".","start":11,"end":12,"id":3}]} -{"text":"Information Specialist experienced in detecting Supply Chain Attack attacks using ELK Stack.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7},{"start":82,"end":91,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-351152042,"_task_hash":1935482598,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"Supply","start":48,"end":54,"id":5},{"text":"Chain","start":55,"end":60,"id":6},{"text":"Attack","start":61,"end":67,"id":7},{"text":"attacks","start":68,"end":75,"id":8},{"text":"using","start":76,"end":81,"id":9},{"text":"ELK","start":82,"end":85,"id":10},{"text":"Stack","start":86,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} +{"text":"Analyzed business email compromise campaign targeting financial sector.","spans":[{"start":9,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-239864389,"_task_hash":-914402255,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"business","start":9,"end":17,"id":1},{"text":"email","start":18,"end":23,"id":2},{"text":"compromise","start":24,"end":34,"id":3},{"text":"campaign","start":35,"end":43,"id":4},{"text":"targeting","start":44,"end":53,"id":5},{"text":"financial","start":54,"end":63,"id":6},{"text":"sector","start":64,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} +{"text":"Experienced Phishing Defense Expert specializing in Security Patterns.","spans":[{"start":12,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-508742494,"_task_hash":-1477076563,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Phishing","start":12,"end":20,"id":1},{"text":"Defense","start":21,"end":28,"id":2},{"text":"Expert","start":29,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Security","start":52,"end":60,"id":6},{"text":"Patterns","start":61,"end":69,"id":7},{"text":".","start":69,"end":70,"id":8}]} +{"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Software Security Engineer opportunity: Lead Web Application Security program, implement NIST Framework, manage SLA Management operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1085427779,"_task_hash":-110632279,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Web","start":45,"end":48,"id":6},{"text":"Application","start":49,"end":60,"id":7},{"text":"Security","start":61,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"SLA","start":112,"end":115,"id":16},{"text":"Management","start":116,"end":126,"id":17},{"text":"operations","start":127,"end":137,"id":18},{"text":".","start":137,"end":138,"id":19}]} +{"text":"Presented Mobile Security updates to leadership.","spans":[{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1001913688,"_task_hash":-254064588,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Mobile","start":10,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"updates","start":26,"end":33,"id":3},{"text":"to","start":34,"end":36,"id":4},{"text":"leadership","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} +{"text":"Led Cloud Security initiatives across organization.","spans":[{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1833648151,"_task_hash":-993253922,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Cloud","start":4,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"initiatives","start":19,"end":30,"id":3},{"text":"across","start":31,"end":37,"id":4},{"text":"organization","start":38,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} +{"text":"Certified OPA working as IT Incident Manager, focused on Aqua Security and Password Spraying prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":75,"end":92,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-271006774,"_task_hash":-1777354481,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OPA","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"IT","start":25,"end":27,"id":4},{"text":"Incident","start":28,"end":36,"id":5},{"text":"Manager","start":37,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Aqua","start":57,"end":61,"id":10},{"text":"Security","start":62,"end":70,"id":11},{"text":"and","start":71,"end":74,"id":12},{"text":"Password","start":75,"end":83,"id":13},{"text":"Spraying","start":84,"end":92,"id":14},{"text":"prevention","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} +{"text":"Managed SOX certification process.","spans":[{"start":8,"end":11,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1063656648,"_task_hash":413392215,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"SOX","start":8,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":"process","start":26,"end":33,"id":3},{"text":".","start":33,"end":34,"id":4}]} +{"text":"Implemented controls for CFAA audit.","spans":[{"start":25,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1286808847,"_task_hash":-1713405554,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"CFAA","start":25,"end":29,"id":3},{"text":"audit","start":30,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"AI Robotics Engineer with expertise in OWASP Top 10 compliance and Governance operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1071709533,"_task_hash":-2081326183,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Robotics","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Governance","start":67,"end":77,"id":11},{"text":"operations","start":78,"end":88,"id":12},{"text":".","start":88,"end":89,"id":13}]} +{"text":"Coordinated Security Review with external auditors.","spans":[{"start":12,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-385846225,"_task_hash":-1085594272,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Review","start":21,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"external","start":33,"end":41,"id":4},{"text":"auditors","start":42,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} +{"text":"Briefed executives on keylogger risks.","spans":[{"start":22,"end":31,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":280022965,"_task_hash":1995135894,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"keylogger","start":22,"end":31,"id":3},{"text":"risks","start":32,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} +{"text":"Forensic Analyst with CISA certification, expert in Snort.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":621093887,"_task_hash":469212095,"tokens":[{"text":"Forensic","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"CISA","start":22,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Snort","start":52,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} +{"text":"Join our team as Network Administrator!","spans":[{"start":17,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":2099251261,"_task_hash":384898659,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Network","start":17,"end":24,"id":4},{"text":"Administrator","start":25,"end":38,"id":5},{"text":"!","start":38,"end":39,"id":6}]} +{"text":"Must know CrowdStrike, EDR Platforms, and OWASP Top 10.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":42,"end":54,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-76888070,"_task_hash":-1460454603,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"EDR","start":23,"end":26,"id":4},{"text":"Platforms","start":27,"end":36,"id":5},{"text":",","start":36,"end":37,"id":6},{"text":"and","start":38,"end":41,"id":7},{"text":"OWASP","start":42,"end":47,"id":8},{"text":"Top","start":48,"end":51,"id":9},{"text":"10","start":52,"end":54,"id":10},{"text":".","start":54,"end":55,"id":11}]} +{"text":"MITRE ATT&CK certification a plus.","spans":[{"start":0,"end":12,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1354205953,"_task_hash":-427481648,"tokens":[{"text":"MITRE","start":0,"end":5,"id":0},{"text":"ATT&CK","start":6,"end":12,"id":1},{"text":"certification","start":13,"end":26,"id":2},{"text":"a","start":27,"end":28,"id":3},{"text":"plus","start":29,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Certified in NDR administration.","spans":[{"start":13,"end":16,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":375812706,"_task_hash":2085653664,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"in","start":10,"end":12,"id":1},{"text":"NDR","start":13,"end":16,"id":2},{"text":"administration","start":17,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} +{"text":"Lead Cyber Insurance Specialist managing Device Management and Incident Response initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1004529044,"_task_hash":-1379613567,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Insurance","start":11,"end":20,"id":2},{"text":"Specialist","start":21,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Device","start":41,"end":47,"id":5},{"text":"Management","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Incident","start":63,"end":71,"id":8},{"text":"Response","start":72,"end":80,"id":9},{"text":"initiatives","start":81,"end":92,"id":10},{"text":".","start":92,"end":93,"id":11}]} +{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"Head of InfoSec needed for enterprise security team.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":409990663,"_task_hash":698333875,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"InfoSec","start":8,"end":15,"id":2},{"text":"needed","start":16,"end":22,"id":3},{"text":"for","start":23,"end":26,"id":4},{"text":"enterprise","start":27,"end":37,"id":5},{"text":"security","start":38,"end":46,"id":6},{"text":"team","start":47,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} +{"text":"Required: SAML, ELK Stack, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1980996984,"_task_hash":1444639524,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"SAML","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"ELK","start":16,"end":19,"id":4},{"text":"Stack","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} +{"text":"Managed CWPP infrastructure for Fortune 500 client.","spans":[{"start":8,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1618054782,"_task_hash":461013656,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"CWPP","start":8,"end":12,"id":1},{"text":"infrastructure","start":13,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"Fortune","start":32,"end":39,"id":4},{"text":"500","start":40,"end":43,"id":5},{"text":"client","start":44,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} +{"text":"Certified PRINCE2 working as Video Game Developer, focused on Security Culture Building and Remote Code Execution prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":29,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":92,"end":113,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1672051576,"_task_hash":-999554531,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PRINCE2","start":10,"end":17,"id":1},{"text":"working","start":18,"end":25,"id":2},{"text":"as","start":26,"end":28,"id":3},{"text":"Video","start":29,"end":34,"id":4},{"text":"Game","start":35,"end":39,"id":5},{"text":"Developer","start":40,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"focused","start":51,"end":58,"id":8},{"text":"on","start":59,"end":61,"id":9},{"text":"Security","start":62,"end":70,"id":10},{"text":"Culture","start":71,"end":78,"id":11},{"text":"Building","start":79,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Remote","start":92,"end":98,"id":14},{"text":"Code","start":99,"end":103,"id":15},{"text":"Execution","start":104,"end":113,"id":16},{"text":"prevention","start":114,"end":124,"id":17},{"text":".","start":124,"end":125,"id":18}]} +{"text":"Published threat intel report on trojan trends.","spans":[{"start":33,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":93512554,"_task_hash":917838253,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"trojan","start":33,"end":39,"id":5},{"text":"trends","start":40,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} +{"text":"Security Operations Manager with CompTIA Security+ certification, expert in Cobalt Strike.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":197738527,"_task_hash":-2052935275,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"CompTIA","start":33,"end":40,"id":4},{"text":"Security+","start":41,"end":50,"id":5},{"text":"certification","start":51,"end":64,"id":6},{"text":",","start":64,"end":65,"id":7},{"text":"expert","start":66,"end":72,"id":8},{"text":"in","start":73,"end":75,"id":9},{"text":"Cobalt","start":76,"end":82,"id":10},{"text":"Strike","start":83,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} +{"text":"Certified SPF/DKIM/DMARC working as API Developer, focused on Mobile App Security and XSS prevention.","spans":[{"start":10,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5},{"start":36,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":8,"token_end":9},{"start":62,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15},{"start":86,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-2120067568,"_task_hash":-116678502,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SPF","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"DKIM","start":14,"end":18,"id":3},{"text":"/","start":18,"end":19,"id":4},{"text":"DMARC","start":19,"end":24,"id":5},{"text":"working","start":25,"end":32,"id":6},{"text":"as","start":33,"end":35,"id":7},{"text":"API","start":36,"end":39,"id":8},{"text":"Developer","start":40,"end":49,"id":9},{"text":",","start":49,"end":50,"id":10},{"text":"focused","start":51,"end":58,"id":11},{"text":"on","start":59,"end":61,"id":12},{"text":"Mobile","start":62,"end":68,"id":13},{"text":"App","start":69,"end":72,"id":14},{"text":"Security","start":73,"end":81,"id":15},{"text":"and","start":82,"end":85,"id":16},{"text":"XSS","start":86,"end":89,"id":17},{"text":"prevention","start":90,"end":100,"id":18},{"text":".","start":100,"end":101,"id":19}]} +{"text":"We need a Network Specialist skilled in Credential Stuffing prevention and trojan analysis using Splunk.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":75,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":97,"end":103,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-722896188,"_task_hash":208225426,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Network","start":10,"end":17,"id":3},{"text":"Specialist","start":18,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"Credential","start":40,"end":50,"id":7},{"text":"Stuffing","start":51,"end":59,"id":8},{"text":"prevention","start":60,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"trojan","start":75,"end":81,"id":11},{"text":"analysis","start":82,"end":90,"id":12},{"text":"using","start":91,"end":96,"id":13},{"text":"Splunk","start":97,"end":103,"id":14},{"text":".","start":103,"end":104,"id":15}]} +{"text":"Developed Data Security strategy and roadmap.","spans":[{"start":10,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1607786422,"_task_hash":-14402285,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Data","start":10,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"strategy","start":24,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"roadmap","start":37,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} +{"text":"Briefed executives on supply chain attack risks.","spans":[{"start":22,"end":41,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-589472483,"_task_hash":-1211219228,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"supply","start":22,"end":28,"id":3},{"text":"chain","start":29,"end":34,"id":4},{"text":"attack","start":35,"end":41,"id":5},{"text":"risks","start":42,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} +{"text":"Experienced Software Tester specializing in Security Awareness Platforms.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1830900795,"_task_hash":749664281,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Software","start":12,"end":20,"id":1},{"text":"Tester","start":21,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Security","start":44,"end":52,"id":5},{"text":"Awareness","start":53,"end":62,"id":6},{"text":"Platforms","start":63,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} +{"text":"Proficient in Splunk and SIEM.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1369442593,"_task_hash":1934435184,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} +{"text":"Governance Risk Compliance Specialist with expertise in OWASP Top 10 compliance and Privacy Engineering operations.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":56,"end":68,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":84,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1204508886,"_task_hash":688685451,"tokens":[{"text":"Governance","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Compliance","start":16,"end":26,"id":2},{"text":"Specialist","start":27,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"expertise","start":43,"end":52,"id":5},{"text":"in","start":53,"end":55,"id":6},{"text":"OWASP","start":56,"end":61,"id":7},{"text":"Top","start":62,"end":65,"id":8},{"text":"10","start":66,"end":68,"id":9},{"text":"compliance","start":69,"end":79,"id":10},{"text":"and","start":80,"end":83,"id":11},{"text":"Privacy","start":84,"end":91,"id":12},{"text":"Engineering","start":92,"end":103,"id":13},{"text":"operations","start":104,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} +{"text":"Game Developer opportunity: Lead Security Testing program, implement OWASP Top 10, manage Active Directory operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":69,"end":81,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":90,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1966106059,"_task_hash":2042744899,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Developer","start":5,"end":14,"id":1},{"text":"opportunity","start":15,"end":26,"id":2},{"text":":","start":26,"end":27,"id":3},{"text":"Lead","start":28,"end":32,"id":4},{"text":"Security","start":33,"end":41,"id":5},{"text":"Testing","start":42,"end":49,"id":6},{"text":"program","start":50,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"implement","start":59,"end":68,"id":9},{"text":"OWASP","start":69,"end":74,"id":10},{"text":"Top","start":75,"end":78,"id":11},{"text":"10","start":79,"end":81,"id":12},{"text":",","start":81,"end":82,"id":13},{"text":"manage","start":83,"end":89,"id":14},{"text":"Active","start":90,"end":96,"id":15},{"text":"Directory","start":97,"end":106,"id":16},{"text":"operations","start":107,"end":117,"id":17},{"text":".","start":117,"end":118,"id":18}]} +{"text":"Senior Lead Software Engineer position: 10+ years minimum, expert in Python Scripting, Risk Metrics, and Security Culture.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":87,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":105,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-607272320,"_task_hash":1345620220,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Lead","start":7,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"position","start":30,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"10","start":40,"end":42,"id":6},{"text":"+","start":42,"end":43,"id":7},{"text":"years","start":44,"end":49,"id":8},{"text":"minimum","start":50,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"expert","start":59,"end":65,"id":11},{"text":"in","start":66,"end":68,"id":12},{"text":"Python","start":69,"end":75,"id":13},{"text":"Scripting","start":76,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"Risk","start":87,"end":91,"id":16},{"text":"Metrics","start":92,"end":99,"id":17},{"text":",","start":99,"end":100,"id":18},{"text":"and","start":101,"end":104,"id":19},{"text":"Security","start":105,"end":113,"id":20},{"text":"Culture","start":114,"end":121,"id":21},{"text":".","start":121,"end":122,"id":22}]} +{"text":"Developed Risk Register methodology and procedures.","spans":[{"start":10,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1840424339,"_task_hash":-2073699887,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Risk","start":10,"end":14,"id":1},{"text":"Register","start":15,"end":23,"id":2},{"text":"methodology","start":24,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"procedures","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} +{"text":"Led ITAR compliance program.","spans":[{"start":4,"end":8,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-370128953,"_task_hash":762904031,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"ITAR","start":4,"end":8,"id":1},{"text":"compliance","start":9,"end":19,"id":2},{"text":"program","start":20,"end":27,"id":3},{"text":".","start":27,"end":28,"id":4}]} +{"text":"Implemented controls to prevent rootkit attacks.","spans":[{"start":32,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1973922827,"_task_hash":-54996909,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"rootkit","start":32,"end":39,"id":4},{"text":"attacks","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} +{"text":"Solutions Architect needed for enterprise security team.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":214130941,"_task_hash":-1513736229,"tokens":[{"text":"Solutions","start":0,"end":9,"id":0},{"text":"Architect","start":10,"end":19,"id":1},{"text":"needed","start":20,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"enterprise","start":31,"end":41,"id":4},{"text":"security","start":42,"end":50,"id":5},{"text":"team","start":51,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} +{"text":"Required: NIST RMF, Metasploit, and NIST Framework expertise.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":20,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":550941277,"_task_hash":-121284653,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"NIST","start":10,"end":14,"id":2},{"text":"RMF","start":15,"end":18,"id":3},{"text":",","start":18,"end":19,"id":4},{"text":"Metasploit","start":20,"end":30,"id":5},{"text":",","start":30,"end":31,"id":6},{"text":"and","start":32,"end":35,"id":7},{"text":"NIST","start":36,"end":40,"id":8},{"text":"Framework","start":41,"end":50,"id":9},{"text":"expertise","start":51,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} +{"text":"Experienced AI Research Scientist specializing in Security Protocols.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1933218090,"_task_hash":-317288291,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"AI","start":12,"end":14,"id":1},{"text":"Research","start":15,"end":23,"id":2},{"text":"Scientist","start":24,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Protocols","start":59,"end":68,"id":7},{"text":".","start":68,"end":69,"id":8}]} +{"text":"Proficient in SIEM Operations and ELK Stack.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1617648284,"_task_hash":-2132650581,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"ELK","start":34,"end":37,"id":5},{"text":"Stack","start":38,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} +{"text":"Accomplished IAM Expert specializing in Penetration Testing and Supply Chain Security.","spans":[{"start":13,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":40,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":554137659,"_task_hash":-650738669,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IAM","start":13,"end":16,"id":1},{"text":"Expert","start":17,"end":23,"id":2},{"text":"specializing","start":24,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"Penetration","start":40,"end":51,"id":5},{"text":"Testing","start":52,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"Supply","start":64,"end":70,"id":8},{"text":"Chain","start":71,"end":76,"id":9},{"text":"Security","start":77,"end":85,"id":10},{"text":".","start":85,"end":86,"id":11}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Briefed executives on backdoor risks.","spans":[{"start":22,"end":30,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":504160783,"_task_hash":1845579902,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"backdoor","start":22,"end":30,"id":3},{"text":"risks","start":31,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} +{"text":"Looking for Frontend Engineer to lead Web Application Security initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":38,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-207545630,"_task_hash":-164515385,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Frontend","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"to","start":30,"end":32,"id":4},{"text":"lead","start":33,"end":37,"id":5},{"text":"Web","start":38,"end":41,"id":6},{"text":"Application","start":42,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} +{"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} +{"text":"Technical Project Manager experienced in detecting botnet attacks using Wireshark.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-31993733,"_task_hash":1557656150,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Project","start":10,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Wireshark","start":72,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Enterprise Cloud Architect professional with 7+ years implementing EDR Platforms and managing YARA Rules programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":67,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":94,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1318026610,"_task_hash":467244188,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"7","start":45,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"implementing","start":54,"end":66,"id":8},{"text":"EDR","start":67,"end":70,"id":9},{"text":"Platforms","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"managing","start":85,"end":93,"id":12},{"text":"YARA","start":94,"end":98,"id":13},{"text":"Rules","start":99,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} -{"text":"Certified NLP working as Full Stack Engineer, focused on CI/CD Security and SQL Injection prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":13},{"start":76,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-55874807,"_task_hash":-341092672,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Full","start":25,"end":29,"id":4},{"text":"Stack","start":30,"end":35,"id":5},{"text":"Engineer","start":36,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"CI","start":57,"end":59,"id":10},{"text":"/","start":59,"end":60,"id":11},{"text":"CD","start":60,"end":62,"id":12},{"text":"Security","start":63,"end":71,"id":13},{"text":"and","start":72,"end":75,"id":14},{"text":"SQL","start":76,"end":79,"id":15},{"text":"Injection","start":80,"end":89,"id":16},{"text":"prevention","start":90,"end":100,"id":17},{"text":".","start":100,"end":101,"id":18}]} -{"text":"Hiring AI/ML Product Manager for Psychology and adware detection.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":33,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":48,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":31090923,"_task_hash":1121998727,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Product","start":13,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"for","start":29,"end":32,"id":6},{"text":"Psychology","start":33,"end":43,"id":7},{"text":"and","start":44,"end":47,"id":8},{"text":"adware","start":48,"end":54,"id":9},{"text":"detection","start":55,"end":64,"id":10},{"text":".","start":64,"end":65,"id":11}]} -{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Malware Reverse Engineer opportunity: Lead Pod Security program, implement OWASP Top 10, manage Spark operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":75,"end":87,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":96,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":534212351,"_task_hash":-33304797,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Reverse","start":8,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"opportunity","start":25,"end":36,"id":3},{"text":":","start":36,"end":37,"id":4},{"text":"Lead","start":38,"end":42,"id":5},{"text":"Pod","start":43,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"program","start":56,"end":63,"id":8},{"text":",","start":63,"end":64,"id":9},{"text":"implement","start":65,"end":74,"id":10},{"text":"OWASP","start":75,"end":80,"id":11},{"text":"Top","start":81,"end":84,"id":12},{"text":"10","start":85,"end":87,"id":13},{"text":",","start":87,"end":88,"id":14},{"text":"manage","start":89,"end":95,"id":15},{"text":"Spark","start":96,"end":101,"id":16},{"text":"operations","start":102,"end":112,"id":17},{"text":".","start":112,"end":113,"id":18}]} -{"text":"Lead Information Specialist managing Dark Web Monitoring and Motion Planning initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-3268458,"_task_hash":-832781846,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Information","start":5,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"managing","start":28,"end":36,"id":3},{"text":"Dark","start":37,"end":41,"id":4},{"text":"Web","start":42,"end":45,"id":5},{"text":"Monitoring","start":46,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Motion","start":61,"end":67,"id":8},{"text":"Planning","start":68,"end":76,"id":9},{"text":"initiatives","start":77,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} +{"text":"Accomplished IT Project Manager specializing in Python/Bash and Security Monitoring.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":64,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1785672960,"_task_hash":-957645405,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Project","start":16,"end":23,"id":2},{"text":"Manager","start":24,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Python","start":48,"end":54,"id":6},{"text":"/","start":54,"end":55,"id":7},{"text":"Bash","start":55,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"Monitoring","start":73,"end":83,"id":11},{"text":".","start":83,"end":84,"id":12}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Analyzed Race Condition samples in malware lab.","spans":[{"start":9,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1892574267,"_task_hash":1529547474,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Race","start":9,"end":13,"id":1},{"text":"Condition","start":14,"end":23,"id":2},{"text":"samples","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"malware","start":35,"end":42,"id":5},{"text":"lab","start":43,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} +{"text":"Accomplished IT Solutions Architect specializing in Remote Support Tools and AWS Security.","spans":[{"start":13,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1109085814,"_task_hash":574276668,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Solutions","start":16,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Remote","start":52,"end":58,"id":6},{"text":"Support","start":59,"end":66,"id":7},{"text":"Tools","start":67,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"AWS","start":77,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Documented ARP Spoofing attack chain for threat intel.","spans":[{"start":11,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":11,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-586738392,"_task_hash":-1963028198,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"ARP","start":11,"end":14,"id":1},{"text":"Spoofing","start":15,"end":23,"id":2},{"text":"attack","start":24,"end":30,"id":3},{"text":"chain","start":31,"end":36,"id":4},{"text":"for","start":37,"end":40,"id":5},{"text":"threat","start":41,"end":47,"id":6},{"text":"intel","start":48,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} +{"text":"Implemented Mobile Security controls and monitoring.","spans":[{"start":12,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":43300447,"_task_hash":977240495,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Mobile","start":12,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"controls","start":28,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"monitoring","start":41,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} +{"text":"Front\u2011End Developer with 5+ years experience in Container Orchestration, Project Coordination, and Monitoring Tools.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":99,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1317466646,"_task_hash":347397556,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"5","start":25,"end":26,"id":3},{"text":"+","start":26,"end":27,"id":4},{"text":"years","start":28,"end":33,"id":5},{"text":"experience","start":34,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Container","start":48,"end":57,"id":8},{"text":"Orchestration","start":58,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Project","start":73,"end":80,"id":11},{"text":"Coordination","start":81,"end":93,"id":12},{"text":",","start":93,"end":94,"id":13},{"text":"and","start":95,"end":98,"id":14},{"text":"Monitoring","start":99,"end":109,"id":15},{"text":"Tools","start":110,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} +{"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} +{"text":"UI Designer role available: Privacy by Design experience required, GCP Security knowledge essential.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":28,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":480437965,"_task_hash":-1075861839,"tokens":[{"text":"UI","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"role","start":12,"end":16,"id":2},{"text":"available","start":17,"end":26,"id":3},{"text":":","start":26,"end":27,"id":4},{"text":"Privacy","start":28,"end":35,"id":5},{"text":"by","start":36,"end":38,"id":6},{"text":"Design","start":39,"end":45,"id":7},{"text":"experience","start":46,"end":56,"id":8},{"text":"required","start":57,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"GCP","start":67,"end":70,"id":11},{"text":"Security","start":71,"end":79,"id":12},{"text":"knowledge","start":80,"end":89,"id":13},{"text":"essential","start":90,"end":99,"id":14},{"text":".","start":99,"end":100,"id":15}]} +{"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Lead Threat Detection Specialist managing Privacy Training and Phishing Detection initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-841966876,"_task_hash":715922514,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Threat","start":5,"end":11,"id":1},{"text":"Detection","start":12,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Privacy","start":42,"end":49,"id":5},{"text":"Training","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Phishing","start":63,"end":71,"id":8},{"text":"Detection","start":72,"end":81,"id":9},{"text":"initiatives","start":82,"end":93,"id":10},{"text":".","start":93,"end":94,"id":11}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} -{"text":"Senior Content Marketing Specialist skilled in RESTful APIs, Compliance, and GCP Security.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1114664692,"_task_hash":-723902705,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Content","start":7,"end":14,"id":1},{"text":"Marketing","start":15,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"skilled","start":36,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"RESTful","start":47,"end":54,"id":6},{"text":"APIs","start":55,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Compliance","start":61,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"GCP","start":77,"end":80,"id":12},{"text":"Security","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} -{"text":"SAML certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1108473182,"_task_hash":-1907986411,"tokens":[{"text":"SAML","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} -{"text":"Looking for Game Engineer to lead Service Mesh Security initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-75876538,"_task_hash":-458552846,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Game","start":12,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":"Mesh","start":42,"end":46,"id":7},{"text":"Security","start":47,"end":55,"id":8},{"text":"initiatives","start":56,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} -{"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} -{"text":"Reverse Engineering Analyst with expertise in NIST Framework compliance and Behavioral Analysis operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":803771858,"_task_hash":1665194450,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"Engineering","start":8,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"expertise","start":33,"end":42,"id":4},{"text":"in","start":43,"end":45,"id":5},{"text":"NIST","start":46,"end":50,"id":6},{"text":"Framework","start":51,"end":60,"id":7},{"text":"compliance","start":61,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Behavioral","start":76,"end":86,"id":10},{"text":"Analysis","start":87,"end":95,"id":11},{"text":"operations","start":96,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} -{"text":"SRE with hands-on experience in SIEM, Splunk, and BYOD Security.","spans":[{"start":0,"end":3,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":38,"end":44,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":50,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1213471425,"_task_hash":1328956055,"tokens":[{"text":"SRE","start":0,"end":3,"id":0},{"text":"with","start":4,"end":8,"id":1},{"text":"hands","start":9,"end":14,"id":2},{"text":"-","start":14,"end":15,"id":3},{"text":"on","start":15,"end":17,"id":4},{"text":"experience","start":18,"end":28,"id":5},{"text":"in","start":29,"end":31,"id":6},{"text":"SIEM","start":32,"end":36,"id":7},{"text":",","start":36,"end":37,"id":8},{"text":"Splunk","start":38,"end":44,"id":9},{"text":",","start":44,"end":45,"id":10},{"text":"and","start":46,"end":49,"id":11},{"text":"BYOD","start":50,"end":54,"id":12},{"text":"Security","start":55,"end":63,"id":13},{"text":".","start":63,"end":64,"id":14}]} -{"text":"Holds GDPR.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1954961026,"_task_hash":330250471,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GDPR","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} -{"text":"Looking for AI/ML Security Specialist to lead Database Security initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":6},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":636089356,"_task_hash":-1660686896,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"AI","start":12,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"ML","start":15,"end":17,"id":4},{"text":"Security","start":18,"end":26,"id":5},{"text":"Specialist","start":27,"end":37,"id":6},{"text":"to","start":38,"end":40,"id":7},{"text":"lead","start":41,"end":45,"id":8},{"text":"Database","start":46,"end":54,"id":9},{"text":"Security","start":55,"end":63,"id":10},{"text":"initiatives","start":64,"end":75,"id":11},{"text":".","start":75,"end":76,"id":12}]} -{"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} -{"text":"Advanced Threat Hunter with 7 years experience in Requirements Analysis, Compliance Auditing, and Change Management.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-382930363,"_task_hash":1970453596,"tokens":[{"text":"Advanced","start":0,"end":8,"id":0},{"text":"Threat","start":9,"end":15,"id":1},{"text":"Hunter","start":16,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"7","start":28,"end":29,"id":4},{"text":"years","start":30,"end":35,"id":5},{"text":"experience","start":36,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Requirements","start":50,"end":62,"id":8},{"text":"Analysis","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Compliance","start":73,"end":83,"id":11},{"text":"Auditing","start":84,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"and","start":94,"end":97,"id":14},{"text":"Change","start":98,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} -{"text":"Holds IDS/IPS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-851111634,"_task_hash":1084501406,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} -{"text":"Cyber Forensics Analyst needed for enterprise security team.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2081256573,"_task_hash":301490327,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"needed","start":24,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"security","start":46,"end":54,"id":6},{"text":"team","start":55,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} -{"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} -{"text":"Azure Architect with expertise in NIST Framework compliance and Protocols operations.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1596711979,"_task_hash":1403576846,"tokens":[{"text":"Azure","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"expertise","start":21,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"NIST","start":34,"end":38,"id":5},{"text":"Framework","start":39,"end":48,"id":6},{"text":"compliance","start":49,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Protocols","start":64,"end":73,"id":9},{"text":"operations","start":74,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} -{"text":"Lead Asset Manager managing Vendor Management and AI Policy initiatives.","spans":[{"start":5,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":50,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1407350326,"_task_hash":-2103742763,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Asset","start":5,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"managing","start":19,"end":27,"id":3},{"text":"Vendor","start":28,"end":34,"id":4},{"text":"Management","start":35,"end":45,"id":5},{"text":"and","start":46,"end":49,"id":6},{"text":"AI","start":50,"end":52,"id":7},{"text":"Policy","start":53,"end":59,"id":8},{"text":"initiatives","start":60,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} +{"text":"Game Programmer professional with 5+ years implementing SIEM Operations and managing Post-incident Review programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":85,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-8474384,"_task_hash":839763558,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Programmer","start":5,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"5","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"implementing","start":43,"end":55,"id":7},{"text":"SIEM","start":56,"end":60,"id":8},{"text":"Operations","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"managing","start":76,"end":84,"id":11},{"text":"Post","start":85,"end":89,"id":12},{"text":"-","start":89,"end":90,"id":13},{"text":"incident","start":90,"end":98,"id":14},{"text":"Review","start":99,"end":105,"id":15},{"text":"programs","start":106,"end":114,"id":16},{"text":".","start":114,"end":115,"id":17}]} +{"text":"Network Security Engineer experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1009607125,"_task_hash":-593704316,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"SIEM","start":72,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Kubernetes Security Engineer role available: Test Frameworks experience required, Building Security knowledge essential.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":433548668,"_task_hash":-307689777,"tokens":[{"text":"Kubernetes","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"role","start":29,"end":33,"id":3},{"text":"available","start":34,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"Test","start":45,"end":49,"id":6},{"text":"Frameworks","start":50,"end":60,"id":7},{"text":"experience","start":61,"end":71,"id":8},{"text":"required","start":72,"end":80,"id":9},{"text":",","start":80,"end":81,"id":10},{"text":"Building","start":82,"end":90,"id":11},{"text":"Security","start":91,"end":99,"id":12},{"text":"knowledge","start":100,"end":109,"id":13},{"text":"essential","start":110,"end":119,"id":14},{"text":".","start":119,"end":120,"id":15}]} +{"text":"NIS2 familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-202128334,"_task_hash":-1609255822,"tokens":[{"text":"NIS2","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Fullstack Engineer with hands-on experience in QRadar, QRadar, and Kubernetes Security.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":55,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":67,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1719071285,"_task_hash":-915049459,"tokens":[{"text":"Fullstack","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"QRadar","start":47,"end":53,"id":8},{"text":",","start":53,"end":54,"id":9},{"text":"QRadar","start":55,"end":61,"id":10},{"text":",","start":61,"end":62,"id":11},{"text":"and","start":63,"end":66,"id":12},{"text":"Kubernetes","start":67,"end":77,"id":13},{"text":"Security","start":78,"end":86,"id":14},{"text":".","start":86,"end":87,"id":15}]} +{"text":"Holds OPA.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1953373167,"_task_hash":625579373,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OPA","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} +{"text":"Trained staff on SEC Cyber Rules obligations.","spans":[{"start":17,"end":32,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-811936741,"_task_hash":898325659,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"SEC","start":17,"end":20,"id":3},{"text":"Cyber","start":21,"end":26,"id":4},{"text":"Rules","start":27,"end":32,"id":5},{"text":"obligations","start":33,"end":44,"id":6},{"text":".","start":44,"end":45,"id":7}]} +{"text":"Certified SABSA working as Cloud Infrastructure Security Engineer, focused on Security Champions Program and Privilege Escalation prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":65,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7},{"start":78,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":109,"end":129,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":2112627536,"_task_hash":616430463,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Cloud","start":27,"end":32,"id":4},{"text":"Infrastructure","start":33,"end":47,"id":5},{"text":"Security","start":48,"end":56,"id":6},{"text":"Engineer","start":57,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"focused","start":67,"end":74,"id":9},{"text":"on","start":75,"end":77,"id":10},{"text":"Security","start":78,"end":86,"id":11},{"text":"Champions","start":87,"end":96,"id":12},{"text":"Program","start":97,"end":104,"id":13},{"text":"and","start":105,"end":108,"id":14},{"text":"Privilege","start":109,"end":118,"id":15},{"text":"Escalation","start":119,"end":129,"id":16},{"text":"prevention","start":130,"end":140,"id":17},{"text":".","start":140,"end":141,"id":18}]} +{"text":"Certified in IAM administration.","spans":[{"start":13,"end":16,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1123620820,"_task_hash":545596055,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"in","start":10,"end":12,"id":1},{"text":"IAM","start":13,"end":16,"id":2},{"text":"administration","start":17,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} +{"text":"Crisis Management Specialist with hands-on experience in QRadar, Metasploit, and Service Mesh Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":65,"end":75,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":81,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1569793495,"_task_hash":439698770,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Management","start":7,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"QRadar","start":57,"end":63,"id":9},{"text":",","start":63,"end":64,"id":10},{"text":"Metasploit","start":65,"end":75,"id":11},{"text":",","start":75,"end":76,"id":12},{"text":"and","start":77,"end":80,"id":13},{"text":"Service","start":81,"end":88,"id":14},{"text":"Mesh","start":89,"end":93,"id":15},{"text":"Security","start":94,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} +{"text":"Holds NIST RMF.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1769087407,"_task_hash":-23255768,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"NIST","start":6,"end":10,"id":1},{"text":"RMF","start":11,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} +{"text":"Identity & Access Management Expert professional with 3+ years implementing QRadar and managing AI Integration programs.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":76,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":96,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1067848714,"_task_hash":1345428331,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"professional","start":36,"end":48,"id":5},{"text":"with","start":49,"end":53,"id":6},{"text":"3","start":54,"end":55,"id":7},{"text":"+","start":55,"end":56,"id":8},{"text":"years","start":57,"end":62,"id":9},{"text":"implementing","start":63,"end":75,"id":10},{"text":"QRadar","start":76,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"managing","start":87,"end":95,"id":13},{"text":"AI","start":96,"end":98,"id":14},{"text":"Integration","start":99,"end":110,"id":15},{"text":"programs","start":111,"end":119,"id":16},{"text":".","start":119,"end":120,"id":17}]} +{"text":"Created YARA rules for Golden Ticket detection.","spans":[{"start":23,"end":36,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-511816531,"_task_hash":1818665315,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Golden","start":23,"end":29,"id":4},{"text":"Ticket","start":30,"end":36,"id":5},{"text":"detection","start":37,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} +{"text":"Hiring Cybersecurity Risk Analyst for Root Cause Analysis and botnet detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":62,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-666468590,"_task_hash":2015867182,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Cybersecurity","start":7,"end":20,"id":1},{"text":"Risk","start":21,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Root","start":38,"end":42,"id":5},{"text":"Cause","start":43,"end":48,"id":6},{"text":"Analysis","start":49,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"botnet","start":62,"end":68,"id":9},{"text":"detection","start":69,"end":78,"id":10},{"text":".","start":78,"end":79,"id":11}]} +{"text":"COPPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-467222272,"_task_hash":59755085,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Interface Designer role available: Red Team Operations experience required, Service Mesh Security knowledge essential.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":35,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":76,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1836239873,"_task_hash":-2053797329,"tokens":[{"text":"Interface","start":0,"end":9,"id":0},{"text":"Designer","start":10,"end":18,"id":1},{"text":"role","start":19,"end":23,"id":2},{"text":"available","start":24,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"Red","start":35,"end":38,"id":5},{"text":"Team","start":39,"end":43,"id":6},{"text":"Operations","start":44,"end":54,"id":7},{"text":"experience","start":55,"end":65,"id":8},{"text":"required","start":66,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"Service","start":76,"end":83,"id":11},{"text":"Mesh","start":84,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"knowledge","start":98,"end":107,"id":14},{"text":"essential","start":108,"end":117,"id":15},{"text":".","start":117,"end":118,"id":16}]} +{"text":"HIPAA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-484932612,"_task_hash":-1879933100,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Insider Risk Analyst needed for enterprise security team.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1485789952,"_task_hash":-1651179288,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"needed","start":21,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"security","start":43,"end":51,"id":6},{"text":"team","start":52,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} +{"text":"Required: JIRA, EDR Platforms, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1273461611,"_task_hash":-849382773,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"JIRA","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Platforms","start":20,"end":29,"id":5},{"text":",","start":29,"end":30,"id":6},{"text":"and","start":31,"end":34,"id":7},{"text":"NIST","start":35,"end":39,"id":8},{"text":"Framework","start":40,"end":49,"id":9},{"text":"expertise","start":50,"end":59,"id":10},{"text":".","start":59,"end":60,"id":11}]} +{"text":"Lead Cybersecurity Analyst managing Industrial Control Systems and Adversary Emulation initiatives.","spans":[{"start":5,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-715866232,"_task_hash":-522596987,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cybersecurity","start":5,"end":18,"id":1},{"text":"Analyst","start":19,"end":26,"id":2},{"text":"managing","start":27,"end":35,"id":3},{"text":"Industrial","start":36,"end":46,"id":4},{"text":"Control","start":47,"end":54,"id":5},{"text":"Systems","start":55,"end":62,"id":6},{"text":"and","start":63,"end":66,"id":7},{"text":"Adversary","start":67,"end":76,"id":8},{"text":"Emulation","start":77,"end":86,"id":9},{"text":"initiatives","start":87,"end":98,"id":10},{"text":".","start":98,"end":99,"id":11}]} +{"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Threat Analyst with hands-on experience in CrowdStrike, Wireshark, and Cloud Security.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1637800776,"_task_hash":-714012994,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Analyst","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"hands","start":20,"end":25,"id":3},{"text":"-","start":25,"end":26,"id":4},{"text":"on","start":26,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"CrowdStrike","start":43,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"Wireshark","start":56,"end":65,"id":10},{"text":",","start":65,"end":66,"id":11},{"text":"and","start":67,"end":70,"id":12},{"text":"Cloud","start":71,"end":76,"id":13},{"text":"Security","start":77,"end":85,"id":14},{"text":".","start":85,"end":86,"id":15}]} +{"text":"Holds OSCP Certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851475902,"_task_hash":270501489,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Immediate opening for Business Data Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1295879884,"_task_hash":1315078640,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Business","start":22,"end":30,"id":3},{"text":"Data","start":31,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} +{"text":"Required skills: SIEM, IDS/IPS, ETL certification.","spans":[{"start":17,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":23,"end":30,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":32,"end":35,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-697463645,"_task_hash":434575365,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":",","start":21,"end":22,"id":4},{"text":"IDS","start":23,"end":26,"id":5},{"text":"/","start":26,"end":27,"id":6},{"text":"IPS","start":27,"end":30,"id":7},{"text":",","start":30,"end":31,"id":8},{"text":"ETL","start":32,"end":35,"id":9},{"text":"certification","start":36,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} +{"text":"Lead CTI Analyst managing Kinematics and Mentoring initiatives.","spans":[{"start":5,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":26,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1047638362,"_task_hash":194913407,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"CTI","start":5,"end":8,"id":1},{"text":"Analyst","start":9,"end":16,"id":2},{"text":"managing","start":17,"end":25,"id":3},{"text":"Kinematics","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Mentoring","start":41,"end":50,"id":6},{"text":"initiatives","start":51,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} -{"text":"Senior Application Security Specialist skilled in Test Automation, Red Team Operations, and Security Tools.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":92,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":465398997,"_task_hash":1798525568,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Application","start":7,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Specialist","start":28,"end":38,"id":3},{"text":"skilled","start":39,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Test","start":50,"end":54,"id":6},{"text":"Automation","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Red","start":67,"end":70,"id":9},{"text":"Team","start":71,"end":75,"id":10},{"text":"Operations","start":76,"end":86,"id":11},{"text":",","start":86,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":"Tools","start":101,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} -{"text":"GCP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1956614200,"_task_hash":-459084267,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Lead Anti-Phishing Specialist managing Performance Optimization and Model Serving initiatives.","spans":[{"start":5,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":39,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":68,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1342818651,"_task_hash":-505958493,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Anti","start":5,"end":9,"id":1},{"text":"-","start":9,"end":10,"id":2},{"text":"Phishing","start":10,"end":18,"id":3},{"text":"Specialist","start":19,"end":29,"id":4},{"text":"managing","start":30,"end":38,"id":5},{"text":"Performance","start":39,"end":50,"id":6},{"text":"Optimization","start":51,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Model","start":68,"end":73,"id":9},{"text":"Serving","start":74,"end":81,"id":10},{"text":"initiatives","start":82,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} +{"text":"Threat Hunter with CRISC certification, expert in Microsoft Defender.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":19,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":50,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1784223371,"_task_hash":-473142080,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"CRISC","start":19,"end":24,"id":3},{"text":"certification","start":25,"end":38,"id":4},{"text":",","start":38,"end":39,"id":5},{"text":"expert","start":40,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Microsoft","start":50,"end":59,"id":8},{"text":"Defender","start":60,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} +{"text":"We need a Incident Manager skilled in Password Spraying prevention and Man-in-the-Middle analysis using Metasploit.","spans":[{"start":10,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":38,"end":55,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":71,"end":88,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":17},{"start":104,"end":114,"label":"SECURITY_TOOL","answer":"accept","token_start":20,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1820634383,"_task_hash":620663639,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Incident","start":10,"end":18,"id":3},{"text":"Manager","start":19,"end":26,"id":4},{"text":"skilled","start":27,"end":34,"id":5},{"text":"in","start":35,"end":37,"id":6},{"text":"Password","start":38,"end":46,"id":7},{"text":"Spraying","start":47,"end":55,"id":8},{"text":"prevention","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"Man","start":71,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"in","start":75,"end":77,"id":13},{"text":"-","start":77,"end":78,"id":14},{"text":"the","start":78,"end":81,"id":15},{"text":"-","start":81,"end":82,"id":16},{"text":"Middle","start":82,"end":88,"id":17},{"text":"analysis","start":89,"end":97,"id":18},{"text":"using","start":98,"end":103,"id":19},{"text":"Metasploit","start":104,"end":114,"id":20},{"text":".","start":114,"end":115,"id":21}]} +{"text":"Looking for GRC Specialist to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":732397461,"_task_hash":-611234639,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"GRC","start":12,"end":15,"id":2},{"text":"Specialist","start":16,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Cloud","start":35,"end":40,"id":6},{"text":"Security","start":41,"end":49,"id":7},{"text":"Testing","start":50,"end":57,"id":8},{"text":"initiatives","start":58,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} +{"text":"Must have Nessus experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-889543638,"_task_hash":-1537583104,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Cyber Threat Hunter professional with 3++ years implementing SIEM and managing Privacy Training programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":61,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":79,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":110081951,"_task_hash":836296542,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Threat","start":6,"end":12,"id":1},{"text":"Hunter","start":13,"end":19,"id":2},{"text":"professional","start":20,"end":32,"id":3},{"text":"with","start":33,"end":37,"id":4},{"text":"3++","start":38,"end":41,"id":5},{"text":"years","start":42,"end":47,"id":6},{"text":"implementing","start":48,"end":60,"id":7},{"text":"SIEM","start":61,"end":65,"id":8},{"text":"and","start":66,"end":69,"id":9},{"text":"managing","start":70,"end":78,"id":10},{"text":"Privacy","start":79,"end":86,"id":11},{"text":"Training","start":87,"end":95,"id":12},{"text":"programs","start":96,"end":104,"id":13},{"text":".","start":104,"end":105,"id":14}]} +{"text":"Trained staff on FISMA obligations.","spans":[{"start":17,"end":22,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1635666560,"_task_hash":-344639101,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"FISMA","start":17,"end":22,"id":3},{"text":"obligations","start":23,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} +{"text":"Troubleshot CNAPP performance issues.","spans":[{"start":12,"end":17,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":702497809,"_task_hash":1080442267,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"CNAPP","start":12,"end":17,"id":1},{"text":"performance","start":18,"end":29,"id":2},{"text":"issues","start":30,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} +{"text":"Troubleshot SDK performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1},{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2081855621,"_task_hash":-1017963671,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"SDK","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} +{"text":"Lead Cryptography Expert managing Graphics and Cost Optimization initiatives.","spans":[{"start":5,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":47,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1172717004,"_task_hash":2138035114,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cryptography","start":5,"end":17,"id":1},{"text":"Expert","start":18,"end":24,"id":2},{"text":"managing","start":25,"end":33,"id":3},{"text":"Graphics","start":34,"end":42,"id":4},{"text":"and","start":43,"end":46,"id":5},{"text":"Cost","start":47,"end":51,"id":6},{"text":"Optimization","start":52,"end":64,"id":7},{"text":"initiatives","start":65,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} +{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"AI Security Architect opportunity: Lead Security Protocols program, implement NIST Framework, manage AI Policy operations.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":78,"end":92,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":101,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1485748332,"_task_hash":-726561888,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"opportunity","start":22,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"Lead","start":35,"end":39,"id":5},{"text":"Security","start":40,"end":48,"id":6},{"text":"Protocols","start":49,"end":58,"id":7},{"text":"program","start":59,"end":66,"id":8},{"text":",","start":66,"end":67,"id":9},{"text":"implement","start":68,"end":77,"id":10},{"text":"NIST","start":78,"end":82,"id":11},{"text":"Framework","start":83,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"manage","start":94,"end":100,"id":14},{"text":"AI","start":101,"end":103,"id":15},{"text":"Policy","start":104,"end":110,"id":16},{"text":"operations","start":111,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} +{"text":"Managed Preventive Action across multiple business units.","spans":[{"start":8,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":865580847,"_task_hash":1692101333,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"Preventive","start":8,"end":18,"id":1},{"text":"Action","start":19,"end":25,"id":2},{"text":"across","start":26,"end":32,"id":3},{"text":"multiple","start":33,"end":41,"id":4},{"text":"business","start":42,"end":50,"id":5},{"text":"units","start":51,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} +{"text":"Published research on Vulnerability Management trends.","spans":[{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1676893889,"_task_hash":562901527,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Vulnerability","start":22,"end":35,"id":3},{"text":"Management","start":36,"end":46,"id":4},{"text":"trends","start":47,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} +{"text":"Tested systems for CVE-2022-42475 vulnerability.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":614733751,"_task_hash":-1011968986,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"systems","start":7,"end":14,"id":1},{"text":"for","start":15,"end":18,"id":2},{"text":"CVE-2022","start":19,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"42475","start":28,"end":33,"id":5},{"text":"vulnerability","start":34,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} +{"text":"Network Security Specialist opportunity: Lead Security Protocols program, implement NIST Framework, manage Server-Side Development operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":98,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":107,"end":130,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-2105493264,"_task_hash":-1322085816,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Protocols","start":55,"end":64,"id":7},{"text":"program","start":65,"end":72,"id":8},{"text":",","start":72,"end":73,"id":9},{"text":"implement","start":74,"end":83,"id":10},{"text":"NIST","start":84,"end":88,"id":11},{"text":"Framework","start":89,"end":98,"id":12},{"text":",","start":98,"end":99,"id":13},{"text":"manage","start":100,"end":106,"id":14},{"text":"Server","start":107,"end":113,"id":15},{"text":"-","start":113,"end":114,"id":16},{"text":"Side","start":114,"end":118,"id":17},{"text":"Development","start":119,"end":130,"id":18},{"text":"operations","start":131,"end":141,"id":19},{"text":".","start":141,"end":142,"id":20}]} +{"text":"Join our team as Malware Analyst!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2100412113,"_task_hash":-1992245730,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Malware","start":17,"end":24,"id":4},{"text":"Analyst","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} +{"text":"Must know Wireshark, Metasploit, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1990514557,"_task_hash":-2062444498,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Metasploit","start":21,"end":31,"id":4},{"text":",","start":31,"end":32,"id":5},{"text":"and","start":33,"end":36,"id":6},{"text":"OWASP","start":37,"end":42,"id":7},{"text":"Top","start":43,"end":46,"id":8},{"text":"10","start":47,"end":49,"id":9},{"text":".","start":49,"end":50,"id":10}]} +{"text":"TOGAF certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1611953164,"_task_hash":629751826,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"Ensured compliance with PDPA requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1858430365,"_task_hash":-1864167614,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"PDPA","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} +{"text":"Director of Security with expertise in NIST Framework compliance and AI Auditing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-145505810,"_task_hash":1722454309,"tokens":[{"text":"Director","start":0,"end":8,"id":0},{"text":"of","start":9,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"AI","start":69,"end":71,"id":10},{"text":"Auditing","start":72,"end":80,"id":11},{"text":"operations","start":81,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} +{"text":"Accomplished Data Privacy Consultant specializing in Data Warehousing and Security Culture Building.","spans":[{"start":13,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":74,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1495516960,"_task_hash":-1733013922,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Data","start":13,"end":17,"id":1},{"text":"Privacy","start":18,"end":25,"id":2},{"text":"Consultant","start":26,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Data","start":53,"end":57,"id":6},{"text":"Warehousing","start":58,"end":69,"id":7},{"text":"and","start":70,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":"Culture","start":83,"end":90,"id":10},{"text":"Building","start":91,"end":99,"id":11},{"text":".","start":99,"end":100,"id":12}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Senior Developer experienced in detecting spyware attacks using Burp Suite.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":64,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1141641606,"_task_hash":391730417,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Developer","start":7,"end":16,"id":1},{"text":"experienced","start":17,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"detecting","start":32,"end":41,"id":4},{"text":"spyware","start":42,"end":49,"id":5},{"text":"attacks","start":50,"end":57,"id":6},{"text":"using","start":58,"end":63,"id":7},{"text":"Burp","start":64,"end":68,"id":8},{"text":"Suite","start":69,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Immediate opening for Senior Developer.","spans":[{"start":22,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1320720908,"_task_hash":1501320795,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Senior","start":22,"end":28,"id":3},{"text":"Developer","start":29,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} +{"text":"Required skills: Nessus, Systematic Review, GDPR certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1560273941,"_task_hash":-1236174476,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Systematic","start":25,"end":35,"id":5},{"text":"Review","start":36,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"GDPR","start":44,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} +{"text":"Lead Big Data Engineer managing Technical Documentation and User Psychology initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1745808371,"_task_hash":1880833740,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Big","start":5,"end":8,"id":1},{"text":"Data","start":9,"end":13,"id":2},{"text":"Engineer","start":14,"end":22,"id":3},{"text":"managing","start":23,"end":31,"id":4},{"text":"Technical","start":32,"end":41,"id":5},{"text":"Documentation","start":42,"end":55,"id":6},{"text":"and","start":56,"end":59,"id":7},{"text":"User","start":60,"end":64,"id":8},{"text":"Psychology","start":65,"end":75,"id":9},{"text":"initiatives","start":76,"end":87,"id":10},{"text":".","start":87,"end":88,"id":11}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Hiring Security Operations Analyst for System Maintenance and Man-in-the-Middle detection.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":79,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":652442928,"_task_hash":-878924852,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Operations","start":16,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"System","start":39,"end":45,"id":5},{"text":"Maintenance","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Man","start":62,"end":65,"id":8},{"text":"-","start":65,"end":66,"id":9},{"text":"in","start":66,"end":68,"id":10},{"text":"-","start":68,"end":69,"id":11},{"text":"the","start":69,"end":72,"id":12},{"text":"-","start":72,"end":73,"id":13},{"text":"Middle","start":73,"end":79,"id":14},{"text":"detection","start":80,"end":89,"id":15},{"text":".","start":89,"end":90,"id":16}]} -{"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} -{"text":"Looking for Frontend Engineer to lead Web Application Security initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":38,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-207545630,"_task_hash":-164515385,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Frontend","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"to","start":30,"end":32,"id":4},{"text":"lead","start":33,"end":37,"id":5},{"text":"Web","start":38,"end":41,"id":6},{"text":"Application","start":42,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} -{"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} -{"text":"Certified SABSA working as Research Scientist, focused on Cloud Security Posture Management and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12},{"start":96,"end":100,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-224986300,"_task_hash":-1202083823,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Research","start":27,"end":35,"id":4},{"text":"Scientist","start":36,"end":45,"id":5},{"text":",","start":45,"end":46,"id":6},{"text":"focused","start":47,"end":54,"id":7},{"text":"on","start":55,"end":57,"id":8},{"text":"Cloud","start":58,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"Posture","start":73,"end":80,"id":11},{"text":"Management","start":81,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"CSRF","start":96,"end":100,"id":14},{"text":"prevention","start":101,"end":111,"id":15},{"text":".","start":111,"end":112,"id":16}]} +{"text":"Computer Forensics Investigator experienced in detecting rootkit attacks using SIEM.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":79,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":362333874,"_task_hash":1552502746,"tokens":[{"text":"Computer","start":0,"end":8,"id":0},{"text":"Forensics","start":9,"end":18,"id":1},{"text":"Investigator","start":19,"end":31,"id":2},{"text":"experienced","start":32,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"detecting","start":47,"end":56,"id":5},{"text":"rootkit","start":57,"end":64,"id":6},{"text":"attacks","start":65,"end":72,"id":7},{"text":"using","start":73,"end":78,"id":8},{"text":"SIEM","start":79,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Led incident response for CVE-2021-34527 exploitation.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-626258069,"_task_hash":1810080470,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2021","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"34527","start":35,"end":40,"id":6},{"text":"exploitation","start":41,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Senior Video Game Developer skilled in Version Control, Threat Assessment, and Azure Security.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2126103856,"_task_hash":57899092,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Video","start":7,"end":12,"id":1},{"text":"Game","start":13,"end":17,"id":2},{"text":"Developer","start":18,"end":27,"id":3},{"text":"skilled","start":28,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"Version","start":39,"end":46,"id":6},{"text":"Control","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"Threat","start":56,"end":62,"id":9},{"text":"Assessment","start":63,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Azure","start":79,"end":84,"id":13},{"text":"Security","start":85,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} {"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Certified ISO 31000 working as ML Ops Engineer, focused on Security Champions Program and Session Hijacking prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":59,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":90,"end":107,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1369026444,"_task_hash":778344688,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"31000","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"ML","start":31,"end":33,"id":5},{"text":"Ops","start":34,"end":37,"id":6},{"text":"Engineer","start":38,"end":46,"id":7},{"text":",","start":46,"end":47,"id":8},{"text":"focused","start":48,"end":55,"id":9},{"text":"on","start":56,"end":58,"id":10},{"text":"Security","start":59,"end":67,"id":11},{"text":"Champions","start":68,"end":77,"id":12},{"text":"Program","start":78,"end":85,"id":13},{"text":"and","start":86,"end":89,"id":14},{"text":"Session","start":90,"end":97,"id":15},{"text":"Hijacking","start":98,"end":107,"id":16},{"text":"prevention","start":108,"end":118,"id":17},{"text":".","start":118,"end":119,"id":18}]} -{"text":"SDET experienced in detecting adware attacks using QRadar.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":30,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1421940359,"_task_hash":-1250206968,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"experienced","start":5,"end":16,"id":1},{"text":"in","start":17,"end":19,"id":2},{"text":"detecting","start":20,"end":29,"id":3},{"text":"adware","start":30,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":"using","start":45,"end":50,"id":6},{"text":"QRadar","start":51,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} +{"text":"Tracked supply chain attack group activities and TTPs.","spans":[{"start":8,"end":27,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":767526122,"_task_hash":-1072494143,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"supply","start":8,"end":14,"id":1},{"text":"chain","start":15,"end":20,"id":2},{"text":"attack","start":21,"end":27,"id":3},{"text":"group","start":28,"end":33,"id":4},{"text":"activities","start":34,"end":44,"id":5},{"text":"and","start":45,"end":48,"id":6},{"text":"TTPs","start":49,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} +{"text":"Implemented workaround for CVE-2020-1472 until patch available.","spans":[{"start":27,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1189438104,"_task_hash":413033390,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2020","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"1472","start":36,"end":40,"id":5},{"text":"until","start":41,"end":46,"id":6},{"text":"patch","start":47,"end":52,"id":7},{"text":"available","start":53,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} +{"text":"Identity & Access Management Expert with hands-on experience in Nessus, Splunk, and Cloud Access Security Broker.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13},{"start":84,"end":112,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-190648664,"_task_hash":-38965933,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"hands","start":41,"end":46,"id":6},{"text":"-","start":46,"end":47,"id":7},{"text":"on","start":47,"end":49,"id":8},{"text":"experience","start":50,"end":60,"id":9},{"text":"in","start":61,"end":63,"id":10},{"text":"Nessus","start":64,"end":70,"id":11},{"text":",","start":70,"end":71,"id":12},{"text":"Splunk","start":72,"end":78,"id":13},{"text":",","start":78,"end":79,"id":14},{"text":"and","start":80,"end":83,"id":15},{"text":"Cloud","start":84,"end":89,"id":16},{"text":"Access","start":90,"end":96,"id":17},{"text":"Security","start":97,"end":105,"id":18},{"text":"Broker","start":106,"end":112,"id":19},{"text":".","start":112,"end":113,"id":20}]} +{"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Senior Hardware Engineer position: 5+ years minimum, expert in HR Collaboration, Root Cause Analysis, and Cloud Access Security Broker.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":63,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17},{"start":106,"end":134,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1819278888,"_task_hash":1169700738,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Hardware","start":7,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"position","start":25,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"5","start":35,"end":36,"id":5},{"text":"+","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"minimum","start":44,"end":51,"id":8},{"text":",","start":51,"end":52,"id":9},{"text":"expert","start":53,"end":59,"id":10},{"text":"in","start":60,"end":62,"id":11},{"text":"HR","start":63,"end":65,"id":12},{"text":"Collaboration","start":66,"end":79,"id":13},{"text":",","start":79,"end":80,"id":14},{"text":"Root","start":81,"end":85,"id":15},{"text":"Cause","start":86,"end":91,"id":16},{"text":"Analysis","start":92,"end":100,"id":17},{"text":",","start":100,"end":101,"id":18},{"text":"and","start":102,"end":105,"id":19},{"text":"Cloud","start":106,"end":111,"id":20},{"text":"Access","start":112,"end":118,"id":21},{"text":"Security","start":119,"end":127,"id":22},{"text":"Broker","start":128,"end":134,"id":23},{"text":".","start":134,"end":135,"id":24}]} +{"text":"Trained developers on Heap Overflow prevention.","spans":[{"start":22,"end":35,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1406890519,"_task_hash":-27071094,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Heap","start":22,"end":26,"id":3},{"text":"Overflow","start":27,"end":35,"id":4},{"text":"prevention","start":36,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} +{"text":"Experienced Information Specialist specializing in Security Culture.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2070465964,"_task_hash":1039474500,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Information","start":12,"end":23,"id":1},{"text":"Specialist","start":24,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Security","start":51,"end":59,"id":5},{"text":"Culture","start":60,"end":67,"id":6},{"text":".","start":67,"end":68,"id":7}]} +{"text":"Proficient in SIEM Operations and SIEM Operations.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-805624968,"_task_hash":-2030563451,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":"Operations","start":39,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} +{"text":"Data Protection Officer experienced in detecting DDoS attacks using CrowdStrike.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":68,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":264501389,"_task_hash":25981439,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Protection","start":5,"end":15,"id":1},{"text":"Officer","start":16,"end":23,"id":2},{"text":"experienced","start":24,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"detecting","start":39,"end":48,"id":5},{"text":"DDoS","start":49,"end":53,"id":6},{"text":"attacks","start":54,"end":61,"id":7},{"text":"using","start":62,"end":67,"id":8},{"text":"CrowdStrike","start":68,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"IT Manager with 10 years experience in HTML/CSS, Bash, and Endpoint Detection and Response.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":49,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":59,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":270561966,"_task_hash":-730834628,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"10","start":16,"end":18,"id":3},{"text":"years","start":19,"end":24,"id":4},{"text":"experience","start":25,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"HTML","start":39,"end":43,"id":7},{"text":"/","start":43,"end":44,"id":8},{"text":"CSS","start":44,"end":47,"id":9},{"text":",","start":47,"end":48,"id":10},{"text":"Bash","start":49,"end":53,"id":11},{"text":",","start":53,"end":54,"id":12},{"text":"and","start":55,"end":58,"id":13},{"text":"Endpoint","start":59,"end":67,"id":14},{"text":"Detection","start":68,"end":77,"id":15},{"text":"and","start":78,"end":81,"id":16},{"text":"Response","start":82,"end":90,"id":17},{"text":".","start":90,"end":91,"id":18}]} -{"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Join our team as IT Incident Manager!","spans":[{"start":17,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1898086970,"_task_hash":-1402998369,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"IT","start":17,"end":19,"id":4},{"text":"Incident","start":20,"end":28,"id":5},{"text":"Manager","start":29,"end":36,"id":6},{"text":"!","start":36,"end":37,"id":7}]} -{"text":"Must know Wireshark, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":506850155,"_task_hash":-1192668616,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"CrowdStrike","start":21,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"and","start":34,"end":37,"id":6},{"text":"NIST","start":38,"end":42,"id":7},{"text":"Framework","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} -{"text":"OSCP Certification certification a plus.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":177069532,"_task_hash":1789774490,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"certification","start":19,"end":32,"id":2},{"text":"a","start":33,"end":34,"id":3},{"text":"plus","start":35,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} -{"text":"Looking for Network Security Engineer to lead Security Scanning initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-78234140,"_task_hash":1697654637,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"to","start":38,"end":40,"id":5},{"text":"lead","start":41,"end":45,"id":6},{"text":"Security","start":46,"end":54,"id":7},{"text":"Scanning","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} -{"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} -{"text":"AI Ethics Specialist with expertise in NIST Framework compliance and Solution Frameworks operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-240303149,"_task_hash":1250505949,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Ethics","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"Solution","start":69,"end":77,"id":10},{"text":"Frameworks","start":78,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} -{"text":"Cryptology Expert experienced in detecting ransomware attacks using EDR Tools.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":385310314,"_task_hash":1076110720,"tokens":[{"text":"Cryptology","start":0,"end":10,"id":0},{"text":"Expert","start":11,"end":17,"id":1},{"text":"experienced","start":18,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"detecting","start":33,"end":42,"id":4},{"text":"ransomware","start":43,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"EDR","start":68,"end":71,"id":8},{"text":"Tools","start":72,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Lead Security Systems Consultant managing Manual Testing and Software Architecture initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-940573475,"_task_hash":-468058517,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Systems","start":14,"end":21,"id":2},{"text":"Consultant","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Manual","start":42,"end":48,"id":5},{"text":"Testing","start":49,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Software","start":61,"end":69,"id":8},{"text":"Architecture","start":70,"end":82,"id":9},{"text":"initiatives","start":83,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} +{"text":"Certified ISO 27001 working as Web Developer, focused on Kubernetes Security and Clickjacking prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":57,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":93,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":509210017,"_task_hash":-937146025,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"27001","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"Web","start":31,"end":34,"id":5},{"text":"Developer","start":35,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Kubernetes","start":57,"end":67,"id":10},{"text":"Security","start":68,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Clickjacking","start":81,"end":93,"id":13},{"text":"prevention","start":94,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} +{"text":"Hiring Forensic Examiner for React Native and worm detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":46,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1241334109,"_task_hash":-1428753276,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"React","start":29,"end":34,"id":4},{"text":"Native","start":35,"end":41,"id":5},{"text":"and","start":42,"end":45,"id":6},{"text":"worm","start":46,"end":50,"id":7},{"text":"detection","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} +{"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Senior Front\u2011End Developer skilled in User Behavior Analysis, Test Reporting, and Embedded Systems Security.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":38,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2029727934,"_task_hash":-1126146079,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Front\u2011End","start":7,"end":16,"id":1},{"text":"Developer","start":17,"end":26,"id":2},{"text":"skilled","start":27,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"User","start":38,"end":42,"id":5},{"text":"Behavior","start":43,"end":51,"id":6},{"text":"Analysis","start":52,"end":60,"id":7},{"text":",","start":60,"end":61,"id":8},{"text":"Test","start":62,"end":66,"id":9},{"text":"Reporting","start":67,"end":76,"id":10},{"text":",","start":76,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Embedded","start":82,"end":90,"id":13},{"text":"Systems","start":91,"end":98,"id":14},{"text":"Security","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} +{"text":"STIX/TAXII certified.","spans":[{"start":0,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1844797163,"_task_hash":-642556357,"tokens":[{"text":"STIX","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"TAXII","start":5,"end":10,"id":2},{"text":"certified","start":11,"end":20,"id":3},{"text":".","start":20,"end":21,"id":4}]} +{"text":"Game Programmer with 10+ years experience in R, Cost Optimization, and Quantitative Research.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":48,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":71,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":53351342,"_task_hash":-1074587436,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Programmer","start":5,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"10","start":21,"end":23,"id":3},{"text":"+","start":23,"end":24,"id":4},{"text":"years","start":25,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"R","start":45,"end":46,"id":8},{"text":",","start":46,"end":47,"id":9},{"text":"Cost","start":48,"end":52,"id":10},{"text":"Optimization","start":53,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Quantitative","start":71,"end":83,"id":14},{"text":"Research","start":84,"end":92,"id":15},{"text":".","start":92,"end":93,"id":16}]} +{"text":"Holds OSINT certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1710785194,"_task_hash":-1379140320,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSINT","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} +{"text":"Vendor Manager professional with 10++ years implementing CrowdStrike and managing Authentication programs.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":341697085,"_task_hash":1634630946,"tokens":[{"text":"Vendor","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"professional","start":15,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10++","start":33,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"CrowdStrike","start":57,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Authentication","start":82,"end":96,"id":10},{"text":"programs","start":97,"end":105,"id":11},{"text":".","start":105,"end":106,"id":12}]} +{"text":"We need a Software Architect skilled in Credential Stuffing prevention and adware analysis using EDR Platforms.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":75,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":97,"end":110,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-347579817,"_task_hash":-2134789150,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Software","start":10,"end":18,"id":3},{"text":"Architect","start":19,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"Credential","start":40,"end":50,"id":7},{"text":"Stuffing","start":51,"end":59,"id":8},{"text":"prevention","start":60,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"adware","start":75,"end":81,"id":11},{"text":"analysis","start":82,"end":90,"id":12},{"text":"using","start":91,"end":96,"id":13},{"text":"EDR","start":97,"end":100,"id":14},{"text":"Platforms","start":101,"end":110,"id":15},{"text":".","start":110,"end":111,"id":16}]} +{"text":"Cyber Forensics Analyst needed for enterprise security team.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2081256573,"_task_hash":301490327,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"needed","start":24,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"security","start":46,"end":54,"id":6},{"text":"team","start":55,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} +{"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} +{"text":"Implemented Cloud Security controls and monitoring.","spans":[{"start":12,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1430883564,"_task_hash":1149543654,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Cloud","start":12,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"monitoring","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} +{"text":"Join our team as Cryptographic Engineer!","spans":[{"start":17,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1259104138,"_task_hash":-1372024753,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Cryptographic","start":17,"end":30,"id":4},{"text":"Engineer","start":31,"end":39,"id":5},{"text":"!","start":39,"end":40,"id":6}]} +{"text":"Must know Nessus, Nessus, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1407982977,"_task_hash":-2097005556,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Nessus","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":".","start":44,"end":45,"id":9}]} +{"text":"PRINCE2 certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":439813503,"_task_hash":1835233461,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certification","start":8,"end":21,"id":1},{"text":"a","start":22,"end":23,"id":2},{"text":"plus","start":24,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Machine Learning Researcher opportunity: Lead Security Awareness program, implement OWASP Top 10, manage Design Thinking operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":96,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":105,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1105247123,"_task_hash":296248582,"tokens":[{"text":"Machine","start":0,"end":7,"id":0},{"text":"Learning","start":8,"end":16,"id":1},{"text":"Researcher","start":17,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Awareness","start":55,"end":64,"id":7},{"text":"program","start":65,"end":72,"id":8},{"text":",","start":72,"end":73,"id":9},{"text":"implement","start":74,"end":83,"id":10},{"text":"OWASP","start":84,"end":89,"id":11},{"text":"Top","start":90,"end":93,"id":12},{"text":"10","start":94,"end":96,"id":13},{"text":",","start":96,"end":97,"id":14},{"text":"manage","start":98,"end":104,"id":15},{"text":"Design","start":105,"end":111,"id":16},{"text":"Thinking","start":112,"end":120,"id":17},{"text":"operations","start":121,"end":131,"id":18},{"text":".","start":131,"end":132,"id":19}]} +{"text":"Experience with SSO platforms and integration.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-191473546,"_task_hash":84111667,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"SSO","start":16,"end":19,"id":2},{"text":"platforms","start":20,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"integration","start":34,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} +{"text":"Remediated gaps identified in CIS Control 4 assessment.","spans":[{"start":30,"end":43,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-457484318,"_task_hash":-891663857,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"CIS","start":30,"end":33,"id":4},{"text":"Control","start":34,"end":41,"id":5},{"text":"4","start":42,"end":43,"id":6},{"text":"assessment","start":44,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} +{"text":"We need a Security Awareness Consultant skilled in SSRF prevention and DDoS analysis using SIEM.","spans":[{"start":10,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":51,"end":55,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":8},{"start":71,"end":75,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":91,"end":95,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-440466998,"_task_hash":-1710041281,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Security","start":10,"end":18,"id":3},{"text":"Awareness","start":19,"end":28,"id":4},{"text":"Consultant","start":29,"end":39,"id":5},{"text":"skilled","start":40,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"SSRF","start":51,"end":55,"id":8},{"text":"prevention","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"DDoS","start":71,"end":75,"id":11},{"text":"analysis","start":76,"end":84,"id":12},{"text":"using","start":85,"end":90,"id":13},{"text":"SIEM","start":91,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} +{"text":"Managed NERC CIP certification process.","spans":[{"start":8,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":802791883,"_task_hash":1757782352,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"NERC","start":8,"end":12,"id":1},{"text":"CIP","start":13,"end":16,"id":2},{"text":"certification","start":17,"end":30,"id":3},{"text":"process","start":31,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} +{"text":"Tested WAF rules against DCShadow payloads.","spans":[{"start":25,"end":33,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":499606901,"_task_hash":-673900372,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"DCShadow","start":25,"end":33,"id":4},{"text":"payloads","start":34,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} +{"text":"Accomplished ML Security Architect specializing in Cryptanalysis and Kubernetes Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-806859345,"_task_hash":333871727,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"ML","start":13,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Architect","start":25,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Cryptanalysis","start":51,"end":64,"id":6},{"text":"and","start":65,"end":68,"id":7},{"text":"Kubernetes","start":69,"end":79,"id":8},{"text":"Security","start":80,"end":88,"id":9},{"text":".","start":88,"end":89,"id":10}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Senior Back-End Developer position: 7 years minimum, expert in Cisco, Documentation, and Wireless Security.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":63,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":70,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15},{"start":89,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-364695713,"_task_hash":1003410513,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"position","start":26,"end":34,"id":5},{"text":":","start":34,"end":35,"id":6},{"text":"7","start":36,"end":37,"id":7},{"text":"years","start":38,"end":43,"id":8},{"text":"minimum","start":44,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"expert","start":53,"end":59,"id":11},{"text":"in","start":60,"end":62,"id":12},{"text":"Cisco","start":63,"end":68,"id":13},{"text":",","start":68,"end":69,"id":14},{"text":"Documentation","start":70,"end":83,"id":15},{"text":",","start":83,"end":84,"id":16},{"text":"and","start":85,"end":88,"id":17},{"text":"Wireless","start":89,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} +{"text":"Detected DCSync attack in production environment.","spans":[{"start":9,"end":15,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1584097413,"_task_hash":-61337918,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"DCSync","start":9,"end":15,"id":1},{"text":"attack","start":16,"end":22,"id":2},{"text":"in","start":23,"end":25,"id":3},{"text":"production","start":26,"end":36,"id":4},{"text":"environment","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} +{"text":"Senior Back-End Developer skilled in Agile/Scrum, Log Analysis, and Security Systems.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":37,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":50,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":68,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1922017680,"_task_hash":1966841310,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"skilled","start":26,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"Agile","start":37,"end":42,"id":7},{"text":"/","start":42,"end":43,"id":8},{"text":"Scrum","start":43,"end":48,"id":9},{"text":",","start":48,"end":49,"id":10},{"text":"Log","start":50,"end":53,"id":11},{"text":"Analysis","start":54,"end":62,"id":12},{"text":",","start":62,"end":63,"id":13},{"text":"and","start":64,"end":67,"id":14},{"text":"Security","start":68,"end":76,"id":15},{"text":"Systems","start":77,"end":84,"id":16},{"text":".","start":84,"end":85,"id":17}]} +{"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} +{"text":"Automated Risk Assessment processes using scripts.","spans":[{"start":10,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":58638271,"_task_hash":-1069114071,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Risk","start":10,"end":14,"id":1},{"text":"Assessment","start":15,"end":25,"id":2},{"text":"processes","start":26,"end":35,"id":3},{"text":"using","start":36,"end":41,"id":4},{"text":"scripts","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Certified SQL working as DevOps Specialist, focused on Security Standards and SSRF prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":73,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":82,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1241914655,"_task_hash":336085658,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SQL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"DevOps","start":25,"end":31,"id":4},{"text":"Specialist","start":32,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Standards","start":64,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"SSRF","start":78,"end":82,"id":12},{"text":"prevention","start":83,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} +{"text":"Managed ISO 27001 certification process.","spans":[{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1348017833,"_task_hash":1569066572,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"ISO","start":8,"end":11,"id":1},{"text":"27001","start":12,"end":17,"id":2},{"text":"certification","start":18,"end":31,"id":3},{"text":"process","start":32,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Presented Infrastructure Security updates to leadership.","spans":[{"start":10,"end":33,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1305410353,"_task_hash":448251569,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Infrastructure","start":10,"end":24,"id":1},{"text":"Security","start":25,"end":33,"id":2},{"text":"updates","start":34,"end":41,"id":3},{"text":"to","start":42,"end":44,"id":4},{"text":"leadership","start":45,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} +{"text":"Led ICS Security initiatives across organization.","spans":[{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2056751077,"_task_hash":-1585370482,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"ICS","start":4,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"initiatives","start":17,"end":28,"id":3},{"text":"across","start":29,"end":35,"id":4},{"text":"organization","start":36,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} +{"text":"Mentored junior engineers in Application Security.","spans":[{"start":29,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":736348918,"_task_hash":2126774388,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Application","start":29,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Security Analyst with CISSP certification, expert in Rapid7.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2087050009,"_task_hash":118540194,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"CISSP","start":22,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Rapid7","start":53,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} +{"text":"Certified C/C++ working as Video Game Developer, focused on Security Operations and XSS prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":60,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":516745117,"_task_hash":363867142,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"C","start":10,"end":11,"id":1},{"text":"/","start":11,"end":12,"id":2},{"text":"C++","start":12,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Video","start":27,"end":32,"id":6},{"text":"Game","start":33,"end":37,"id":7},{"text":"Developer","start":38,"end":47,"id":8},{"text":",","start":47,"end":48,"id":9},{"text":"focused","start":49,"end":56,"id":10},{"text":"on","start":57,"end":59,"id":11},{"text":"Security","start":60,"end":68,"id":12},{"text":"Operations","start":69,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"XSS","start":84,"end":87,"id":15},{"text":"prevention","start":88,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} +{"text":"Trained staff on COPPA obligations.","spans":[{"start":17,"end":22,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2047882249,"_task_hash":-942701427,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"COPPA","start":17,"end":22,"id":3},{"text":"obligations","start":23,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} +{"text":"Lead Product Designer managing Model Explainability and Role-Based Access Control initiatives.","spans":[{"start":5,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":56,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-154545094,"_task_hash":880849628,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Product","start":5,"end":12,"id":1},{"text":"Designer","start":13,"end":21,"id":2},{"text":"managing","start":22,"end":30,"id":3},{"text":"Model","start":31,"end":36,"id":4},{"text":"Explainability","start":37,"end":51,"id":5},{"text":"and","start":52,"end":55,"id":6},{"text":"Role","start":56,"end":60,"id":7},{"text":"-","start":60,"end":61,"id":8},{"text":"Based","start":61,"end":66,"id":9},{"text":"Access","start":67,"end":73,"id":10},{"text":"Control","start":74,"end":81,"id":11},{"text":"initiatives","start":82,"end":93,"id":12},{"text":".","start":93,"end":94,"id":13}]} +{"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} +{"text":"Cyber Insurance Consultant professional with 5+ years implementing EDR Tools and managing Load Balancing programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":67,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":90,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":247194162,"_task_hash":-1930161273,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Insurance","start":6,"end":15,"id":1},{"text":"Consultant","start":16,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"5","start":45,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"implementing","start":54,"end":66,"id":8},{"text":"EDR","start":67,"end":70,"id":9},{"text":"Tools","start":71,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"managing","start":81,"end":89,"id":12},{"text":"Load","start":90,"end":94,"id":13},{"text":"Balancing","start":95,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} +{"text":"Mitigated Fileless Malware through code remediation.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-804910381,"_task_hash":-980530543,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Fileless","start":10,"end":18,"id":1},{"text":"Malware","start":19,"end":26,"id":2},{"text":"through","start":27,"end":34,"id":3},{"text":"code","start":35,"end":39,"id":4},{"text":"remediation","start":40,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} +{"text":"Cyberpunk Hacker with 10+ years experience in Intelligence Analysis, Third-Party Risk, and System Maintenance.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":91,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1570087959,"_task_hash":1698623478,"tokens":[{"text":"Cyberpunk","start":0,"end":9,"id":0},{"text":"Hacker","start":10,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Intelligence","start":46,"end":58,"id":8},{"text":"Analysis","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Third","start":69,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"Party","start":75,"end":80,"id":13},{"text":"Risk","start":81,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"and","start":87,"end":90,"id":16},{"text":"System","start":91,"end":97,"id":17},{"text":"Maintenance","start":98,"end":109,"id":18},{"text":".","start":109,"end":110,"id":19}]} +{"text":"Holds ISO 31000 certification.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":461633574,"_task_hash":-1331949047,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"31000","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} +{"text":"Cyber Forensics Analyst role available: Static Analysis experience required, Azure Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":122653602,"_task_hash":1823159266,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Static","start":40,"end":46,"id":6},{"text":"Analysis","start":47,"end":55,"id":7},{"text":"experience","start":56,"end":66,"id":8},{"text":"required","start":67,"end":75,"id":9},{"text":",","start":75,"end":76,"id":10},{"text":"Azure","start":77,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":"knowledge","start":92,"end":101,"id":13},{"text":"essential","start":102,"end":111,"id":14},{"text":".","start":111,"end":112,"id":15}]} +{"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Automated Corrective Action processes using scripts.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":64594979,"_task_hash":-942340474,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Corrective","start":10,"end":20,"id":1},{"text":"Action","start":21,"end":27,"id":2},{"text":"processes","start":28,"end":37,"id":3},{"text":"using","start":38,"end":43,"id":4},{"text":"scripts","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} +{"text":"AI Researcher with expertise in NIST Framework compliance and Mobile Testing operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2084650241,"_task_hash":-292615317,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Researcher","start":3,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Mobile","start":62,"end":68,"id":9},{"text":"Testing","start":69,"end":76,"id":10},{"text":"operations","start":77,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} +{"text":"Business Continuity Manager professional with 7+ years implementing Splunk and managing Privacy Training programs.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1707743092,"_task_hash":-1616230288,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Continuity","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"professional","start":28,"end":40,"id":3},{"text":"with","start":41,"end":45,"id":4},{"text":"7","start":46,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"Splunk","start":68,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"managing","start":79,"end":87,"id":11},{"text":"Privacy","start":88,"end":95,"id":12},{"text":"Training","start":96,"end":104,"id":13},{"text":"programs","start":105,"end":113,"id":14},{"text":".","start":113,"end":114,"id":15}]} +{"text":"Red Team Lead with OSCP certification, expert in Check Point.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-352890884,"_task_hash":-1523589779,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Lead","start":9,"end":13,"id":2},{"text":"with","start":14,"end":18,"id":3},{"text":"OSCP","start":19,"end":23,"id":4},{"text":"certification","start":24,"end":37,"id":5},{"text":",","start":37,"end":38,"id":6},{"text":"expert","start":39,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Check","start":49,"end":54,"id":9},{"text":"Point","start":55,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} +{"text":"Copywriter needed for enterprise security team.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-122257907,"_task_hash":215924090,"tokens":[{"text":"Copywriter","start":0,"end":10,"id":0},{"text":"needed","start":11,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"enterprise","start":22,"end":32,"id":3},{"text":"security","start":33,"end":41,"id":4},{"text":"team","start":42,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} +{"text":"Required: HTML/CSS, Wireshark, and NIST Framework expertise.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":20,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2101613865,"_task_hash":-1265588248,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"HTML","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"CSS","start":15,"end":18,"id":4},{"text":",","start":18,"end":19,"id":5},{"text":"Wireshark","start":20,"end":29,"id":6},{"text":",","start":29,"end":30,"id":7},{"text":"and","start":31,"end":34,"id":8},{"text":"NIST","start":35,"end":39,"id":9},{"text":"Framework","start":40,"end":49,"id":10},{"text":"expertise","start":50,"end":59,"id":11},{"text":".","start":59,"end":60,"id":12}]} +{"text":"Mentored junior engineers in Mobile Security.","spans":[{"start":29,"end":44,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1427029396,"_task_hash":-1208952021,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Mobile","start":29,"end":35,"id":4},{"text":"Security","start":36,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} +{"text":"Join our team as Technical Support Specialist!","spans":[{"start":17,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1648986883,"_task_hash":345219952,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Specialist","start":35,"end":45,"id":6},{"text":"!","start":45,"end":46,"id":7}]} +{"text":"Must know QRadar, Wireshark, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-938554939,"_task_hash":-1824185037,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Wireshark","start":18,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"NIST","start":33,"end":37,"id":7},{"text":"Framework","start":38,"end":47,"id":8},{"text":".","start":47,"end":48,"id":9}]} +{"text":"SOC 2 certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":764903615,"_task_hash":317988584,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"certification","start":6,"end":19,"id":2},{"text":"a","start":20,"end":21,"id":3},{"text":"plus","start":22,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Insider Risk Analyst with 5+ years experience in Post-Incident Review, Zero Trust Architecture, and Multi-Cloud.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":12},{"start":71,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":16},{"start":100,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":19,"token_end":21}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1086643873,"_task_hash":-206759121,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"5","start":26,"end":27,"id":4},{"text":"+","start":27,"end":28,"id":5},{"text":"years","start":29,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Post","start":49,"end":53,"id":9},{"text":"-","start":53,"end":54,"id":10},{"text":"Incident","start":54,"end":62,"id":11},{"text":"Review","start":63,"end":69,"id":12},{"text":",","start":69,"end":70,"id":13},{"text":"Zero","start":71,"end":75,"id":14},{"text":"Trust","start":76,"end":81,"id":15},{"text":"Architecture","start":82,"end":94,"id":16},{"text":",","start":94,"end":95,"id":17},{"text":"and","start":96,"end":99,"id":18},{"text":"Multi","start":100,"end":105,"id":19},{"text":"-","start":105,"end":106,"id":20},{"text":"Cloud","start":106,"end":111,"id":21},{"text":".","start":111,"end":112,"id":22}]} +{"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} +{"text":"Join our team as Penetration Tester!","spans":[{"start":17,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2061733957,"_task_hash":942483020,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Penetration","start":17,"end":28,"id":4},{"text":"Tester","start":29,"end":35,"id":5},{"text":"!","start":35,"end":36,"id":6}]} +{"text":"Must know Burp Suite, Metasploit, and NIST Framework.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1585024134,"_task_hash":2037856303,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":",","start":20,"end":21,"id":4},{"text":"Metasploit","start":22,"end":32,"id":5},{"text":",","start":32,"end":33,"id":6},{"text":"and","start":34,"end":37,"id":7},{"text":"NIST","start":38,"end":42,"id":8},{"text":"Framework","start":43,"end":52,"id":9},{"text":".","start":52,"end":53,"id":10}]} +{"text":"GCP certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1241195216,"_task_hash":1934077859,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} +{"text":"We need a AppSec Engineer skilled in Remote Code Execution prevention and rootkit analysis using Burp Suite.","spans":[{"start":10,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":37,"end":58,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":9},{"start":74,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":97,"end":107,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1037088770,"_task_hash":369241225,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"AppSec","start":10,"end":16,"id":3},{"text":"Engineer","start":17,"end":25,"id":4},{"text":"skilled","start":26,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"Remote","start":37,"end":43,"id":7},{"text":"Code","start":44,"end":48,"id":8},{"text":"Execution","start":49,"end":58,"id":9},{"text":"prevention","start":59,"end":69,"id":10},{"text":"and","start":70,"end":73,"id":11},{"text":"rootkit","start":74,"end":81,"id":12},{"text":"analysis","start":82,"end":90,"id":13},{"text":"using","start":91,"end":96,"id":14},{"text":"Burp","start":97,"end":101,"id":15},{"text":"Suite","start":102,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} +{"text":"Network Security Specialist with 5+ years experience in API Design, Firmware Analysis, and Embedded Systems.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":68,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":91,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-861137221,"_task_hash":-1498007845,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"5","start":33,"end":34,"id":4},{"text":"+","start":34,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"API","start":56,"end":59,"id":9},{"text":"Design","start":60,"end":66,"id":10},{"text":",","start":66,"end":67,"id":11},{"text":"Firmware","start":68,"end":76,"id":12},{"text":"Analysis","start":77,"end":85,"id":13},{"text":",","start":85,"end":86,"id":14},{"text":"and","start":87,"end":90,"id":15},{"text":"Embedded","start":91,"end":99,"id":16},{"text":"Systems","start":100,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} +{"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} +{"text":"Application Security Engineer with 7 years experience in Research Ethics, Threat Assessment, and Windows/Mac Support.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":97,"end":116,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1232973767,"_task_hash":1938608157,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"7","start":35,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Research","start":57,"end":65,"id":8},{"text":"Ethics","start":66,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Threat","start":74,"end":80,"id":11},{"text":"Assessment","start":81,"end":91,"id":12},{"text":",","start":91,"end":92,"id":13},{"text":"and","start":93,"end":96,"id":14},{"text":"Windows","start":97,"end":104,"id":15},{"text":"/","start":104,"end":105,"id":16},{"text":"Mac","start":105,"end":108,"id":17},{"text":"Support","start":109,"end":116,"id":18},{"text":".","start":116,"end":117,"id":19}]} +{"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} +{"text":"Server-Side Developer professional with 10++ years implementing Splunk and managing AI Red Teaming programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":84,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1987930789,"_task_hash":925744311,"tokens":[{"text":"Server","start":0,"end":6,"id":0},{"text":"-","start":6,"end":7,"id":1},{"text":"Side","start":7,"end":11,"id":2},{"text":"Developer","start":12,"end":21,"id":3},{"text":"professional","start":22,"end":34,"id":4},{"text":"with","start":35,"end":39,"id":5},{"text":"10++","start":40,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"implementing","start":51,"end":63,"id":8},{"text":"Splunk","start":64,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"managing","start":75,"end":83,"id":11},{"text":"AI","start":84,"end":86,"id":12},{"text":"Red","start":87,"end":90,"id":13},{"text":"Teaming","start":91,"end":98,"id":14},{"text":"programs","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} +{"text":"Implemented controls to prevent trojan attacks.","spans":[{"start":32,"end":38,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":38,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2012255244,"_task_hash":-370711691,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"trojan","start":32,"end":38,"id":4},{"text":"attacks","start":39,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} +{"text":"Cyber Operations Manager with expertise in NIST Framework compliance and UX operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1371039119,"_task_hash":1461767823,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Operations","start":6,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"NIST","start":43,"end":47,"id":6},{"text":"Framework","start":48,"end":57,"id":7},{"text":"compliance","start":58,"end":68,"id":8},{"text":"and","start":69,"end":72,"id":9},{"text":"UX","start":73,"end":75,"id":10},{"text":"operations","start":76,"end":86,"id":11},{"text":".","start":86,"end":87,"id":12}]} +{"text":"Published research on Risk Management trends.","spans":[{"start":22,"end":37,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1045878783,"_task_hash":906651529,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Risk","start":22,"end":26,"id":3},{"text":"Management","start":27,"end":37,"id":4},{"text":"trends","start":38,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} +{"text":"Mentored junior engineers in GRC.","spans":[{"start":29,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4},{"start":29,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1302872541,"_task_hash":2147278594,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"GRC","start":29,"end":32,"id":4},{"text":".","start":32,"end":33,"id":5}]} +{"text":"Managed Risk Assessment across multiple business units.","spans":[{"start":8,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":415587462,"_task_hash":392472273,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Assessment","start":13,"end":23,"id":2},{"text":"across","start":24,"end":30,"id":3},{"text":"multiple","start":31,"end":39,"id":4},{"text":"business","start":40,"end":48,"id":5},{"text":"units","start":49,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} +{"text":"Ensured compliance with FedRAMP requirements.","spans":[{"start":24,"end":31,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":31,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-271239692,"_task_hash":-499046341,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"FedRAMP","start":24,"end":31,"id":3},{"text":"requirements","start":32,"end":44,"id":4},{"text":".","start":44,"end":45,"id":5}]} +{"text":"UI Developer opportunity: Lead Model Security program, implement NIST Framework, manage Compliance Knowledge operations.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":79,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":11},{"start":88,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1298084215,"_task_hash":1781278755,"tokens":[{"text":"UI","start":0,"end":2,"id":0},{"text":"Developer","start":3,"end":12,"id":1},{"text":"opportunity","start":13,"end":24,"id":2},{"text":":","start":24,"end":25,"id":3},{"text":"Lead","start":26,"end":30,"id":4},{"text":"Model","start":31,"end":36,"id":5},{"text":"Security","start":37,"end":45,"id":6},{"text":"program","start":46,"end":53,"id":7},{"text":",","start":53,"end":54,"id":8},{"text":"implement","start":55,"end":64,"id":9},{"text":"NIST","start":65,"end":69,"id":10},{"text":"Framework","start":70,"end":79,"id":11},{"text":",","start":79,"end":80,"id":12},{"text":"manage","start":81,"end":87,"id":13},{"text":"Compliance","start":88,"end":98,"id":14},{"text":"Knowledge","start":99,"end":108,"id":15},{"text":"operations","start":109,"end":119,"id":16},{"text":".","start":119,"end":120,"id":17}]} +{"text":"Tested effectiveness of ISO 27001 A.6.1 controls.","spans":[{"start":24,"end":39,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1720332587,"_task_hash":465963226,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"effectiveness","start":7,"end":20,"id":1},{"text":"of","start":21,"end":23,"id":2},{"text":"ISO","start":24,"end":27,"id":3},{"text":"27001","start":28,"end":33,"id":4},{"text":"A.6.1","start":34,"end":39,"id":5},{"text":"controls","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} +{"text":"Red Team Operator with 3+ years experience in EnCase, Privacy Engineering, and Impact Assessment.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":54,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":79,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1856023887,"_task_hash":1089894271,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Operator","start":9,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"3","start":23,"end":24,"id":4},{"text":"+","start":24,"end":25,"id":5},{"text":"years","start":26,"end":31,"id":6},{"text":"experience","start":32,"end":42,"id":7},{"text":"in","start":43,"end":45,"id":8},{"text":"EnCase","start":46,"end":52,"id":9},{"text":",","start":52,"end":53,"id":10},{"text":"Privacy","start":54,"end":61,"id":11},{"text":"Engineering","start":62,"end":73,"id":12},{"text":",","start":73,"end":74,"id":13},{"text":"and","start":75,"end":78,"id":14},{"text":"Impact","start":79,"end":85,"id":15},{"text":"Assessment","start":86,"end":96,"id":16},{"text":".","start":96,"end":97,"id":17}]} +{"text":"Holds TOGAF certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1058317034,"_task_hash":2099672658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} +{"text":"Lead Digital Forensics Investigator managing E-Learning Development and Publication Experience initiatives.","spans":[{"start":5,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":45,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":72,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-356991092,"_task_hash":-802201269,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Digital","start":5,"end":12,"id":1},{"text":"Forensics","start":13,"end":22,"id":2},{"text":"Investigator","start":23,"end":35,"id":3},{"text":"managing","start":36,"end":44,"id":4},{"text":"E","start":45,"end":46,"id":5},{"text":"-","start":46,"end":47,"id":6},{"text":"Learning","start":47,"end":55,"id":7},{"text":"Development","start":56,"end":67,"id":8},{"text":"and","start":68,"end":71,"id":9},{"text":"Publication","start":72,"end":83,"id":10},{"text":"Experience","start":84,"end":94,"id":11},{"text":"initiatives","start":95,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Lead Technical Solutions Architect managing Hyperparameter Optimization and AI Governance initiatives.","spans":[{"start":5,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":44,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":76,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-147710371,"_task_hash":688292634,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Technical","start":5,"end":14,"id":1},{"text":"Solutions","start":15,"end":24,"id":2},{"text":"Architect","start":25,"end":34,"id":3},{"text":"managing","start":35,"end":43,"id":4},{"text":"Hyperparameter","start":44,"end":58,"id":5},{"text":"Optimization","start":59,"end":71,"id":6},{"text":"and","start":72,"end":75,"id":7},{"text":"AI","start":76,"end":78,"id":8},{"text":"Governance","start":79,"end":89,"id":9},{"text":"initiatives","start":90,"end":101,"id":10},{"text":".","start":101,"end":102,"id":11}]} +{"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"We need a Machine Learning Product Manager skilled in XXE prevention and Supply Chain Attack analysis using CrowdStrike.","spans":[{"start":10,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":54,"end":57,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":9},{"start":73,"end":92,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":14},{"start":108,"end":119,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1801381321,"_task_hash":-607399080,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Machine","start":10,"end":17,"id":3},{"text":"Learning","start":18,"end":26,"id":4},{"text":"Product","start":27,"end":34,"id":5},{"text":"Manager","start":35,"end":42,"id":6},{"text":"skilled","start":43,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"XXE","start":54,"end":57,"id":9},{"text":"prevention","start":58,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Supply","start":73,"end":79,"id":12},{"text":"Chain","start":80,"end":85,"id":13},{"text":"Attack","start":86,"end":92,"id":14},{"text":"analysis","start":93,"end":101,"id":15},{"text":"using","start":102,"end":107,"id":16},{"text":"CrowdStrike","start":108,"end":119,"id":17},{"text":".","start":119,"end":120,"id":18}]} +{"text":"Immediate opening for Cybersecurity Risk Analyst.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":279018486,"_task_hash":-1028091263,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cybersecurity","start":22,"end":35,"id":3},{"text":"Risk","start":36,"end":40,"id":4},{"text":"Analyst","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} +{"text":"Required skills: Nessus, Content Management Systems, CI/CD certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":53,"end":58,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-954046890,"_task_hash":1061318086,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Content","start":25,"end":32,"id":5},{"text":"Management","start":33,"end":43,"id":6},{"text":"Systems","start":44,"end":51,"id":7},{"text":",","start":51,"end":52,"id":8},{"text":"CI","start":53,"end":55,"id":9},{"text":"/","start":55,"end":56,"id":10},{"text":"CD","start":56,"end":58,"id":11},{"text":"certification","start":59,"end":72,"id":12},{"text":".","start":72,"end":73,"id":13}]} +{"text":"Developed Threat Intelligence strategy and roadmap.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-499934827,"_task_hash":757409479,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Threat","start":10,"end":16,"id":1},{"text":"Intelligence","start":17,"end":29,"id":2},{"text":"strategy","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"roadmap","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} +{"text":"Implemented controls to prevent spear phishing attacks.","spans":[{"start":32,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":32517052,"_task_hash":1974899335,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"spear","start":32,"end":37,"id":4},{"text":"phishing","start":38,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} +{"text":"Senior Forensic Examiner skilled in Elliptic Curve Cryptography, Log Analysis, and CI/CD Security.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":65,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":83,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2072756654,"_task_hash":-1196518591,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"skilled","start":25,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"Elliptic","start":36,"end":44,"id":5},{"text":"Curve","start":45,"end":50,"id":6},{"text":"Cryptography","start":51,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"Log","start":65,"end":68,"id":9},{"text":"Analysis","start":69,"end":77,"id":10},{"text":",","start":77,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"CI","start":83,"end":85,"id":13},{"text":"/","start":85,"end":86,"id":14},{"text":"CD","start":86,"end":88,"id":15},{"text":"Security","start":89,"end":97,"id":16},{"text":".","start":97,"end":98,"id":17}]} +{"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Senior Front-End Developer position: 10+ years minimum, expert in Data Visualization, Agile Testing, and Security Culture Building.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":66,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":86,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18},{"start":105,"end":130,"label":"SECURITY_DOMAIN","answer":"accept","token_start":21,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":897170461,"_task_hash":1944662885,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Front","start":7,"end":12,"id":1},{"text":"-","start":12,"end":13,"id":2},{"text":"End","start":13,"end":16,"id":3},{"text":"Developer","start":17,"end":26,"id":4},{"text":"position","start":27,"end":35,"id":5},{"text":":","start":35,"end":36,"id":6},{"text":"10","start":37,"end":39,"id":7},{"text":"+","start":39,"end":40,"id":8},{"text":"years","start":41,"end":46,"id":9},{"text":"minimum","start":47,"end":54,"id":10},{"text":",","start":54,"end":55,"id":11},{"text":"expert","start":56,"end":62,"id":12},{"text":"in","start":63,"end":65,"id":13},{"text":"Data","start":66,"end":70,"id":14},{"text":"Visualization","start":71,"end":84,"id":15},{"text":",","start":84,"end":85,"id":16},{"text":"Agile","start":86,"end":91,"id":17},{"text":"Testing","start":92,"end":99,"id":18},{"text":",","start":99,"end":100,"id":19},{"text":"and","start":101,"end":104,"id":20},{"text":"Security","start":105,"end":113,"id":21},{"text":"Culture","start":114,"end":121,"id":22},{"text":"Building","start":122,"end":130,"id":23},{"text":".","start":130,"end":131,"id":24}]} +{"text":"Accomplished Security Compliance Officer specializing in Control Mapping and Bluetooth Security.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1179755132,"_task_hash":1551877757,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Compliance","start":22,"end":32,"id":2},{"text":"Officer","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Control","start":57,"end":64,"id":6},{"text":"Mapping","start":65,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"Bluetooth","start":77,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Endpoint Protection Specialist role available: Bug Bounty Programs experience required, Security Patterns knowledge essential.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":88,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":903154708,"_task_hash":880452741,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Protection","start":9,"end":19,"id":1},{"text":"Specialist","start":20,"end":30,"id":2},{"text":"role","start":31,"end":35,"id":3},{"text":"available","start":36,"end":45,"id":4},{"text":":","start":45,"end":46,"id":5},{"text":"Bug","start":47,"end":50,"id":6},{"text":"Bounty","start":51,"end":57,"id":7},{"text":"Programs","start":58,"end":66,"id":8},{"text":"experience","start":67,"end":77,"id":9},{"text":"required","start":78,"end":86,"id":10},{"text":",","start":86,"end":87,"id":11},{"text":"Security","start":88,"end":96,"id":12},{"text":"Patterns","start":97,"end":105,"id":13},{"text":"knowledge","start":106,"end":115,"id":14},{"text":"essential","start":116,"end":125,"id":15},{"text":".","start":125,"end":126,"id":16}]} +{"text":"HIPAA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-484932612,"_task_hash":-1879933100,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Tracked phishing group activities and TTPs.","spans":[{"start":8,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1844199501,"_task_hash":1236268072,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"phishing","start":8,"end":16,"id":1},{"text":"group","start":17,"end":22,"id":2},{"text":"activities","start":23,"end":33,"id":3},{"text":"and","start":34,"end":37,"id":4},{"text":"TTPs","start":38,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} +{"text":"Responsible for EDR operations and maintenance.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-194740117,"_task_hash":1914215545,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"EDR","start":16,"end":19,"id":2},{"text":"operations","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"maintenance","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} +{"text":"SOC Analyst with GSEC certification, expert in YARA.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-45667420,"_task_hash":1231450688,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GSEC","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"YARA","start":47,"end":51,"id":8},{"text":".","start":51,"end":52,"id":9}]} +{"text":"Developed detection for Heap Overflow attacks.","spans":[{"start":24,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1081972140,"_task_hash":1386714543,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Heap","start":24,"end":28,"id":3},{"text":"Overflow","start":29,"end":37,"id":4},{"text":"attacks","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} +{"text":"IAM Expert with hands-on experience in Splunk, Burp Suite, and BYOD Security.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":47,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":63,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":859163062,"_task_hash":1423883503,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"Expert","start":4,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"hands","start":16,"end":21,"id":3},{"text":"-","start":21,"end":22,"id":4},{"text":"on","start":22,"end":24,"id":5},{"text":"experience","start":25,"end":35,"id":6},{"text":"in","start":36,"end":38,"id":7},{"text":"Splunk","start":39,"end":45,"id":8},{"text":",","start":45,"end":46,"id":9},{"text":"Burp","start":47,"end":51,"id":10},{"text":"Suite","start":52,"end":57,"id":11},{"text":",","start":57,"end":58,"id":12},{"text":"and","start":59,"end":62,"id":13},{"text":"BYOD","start":63,"end":67,"id":14},{"text":"Security","start":68,"end":76,"id":15},{"text":".","start":76,"end":77,"id":16}]} +{"text":"Holds PCI DSS.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-371988377,"_task_hash":931213278,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PCI","start":6,"end":9,"id":1},{"text":"DSS","start":10,"end":13,"id":2},{"text":".","start":13,"end":14,"id":3}]} +{"text":"Network Security Specialist experienced in detecting malware attacks using SIEM.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":60,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":75,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-126860802,"_task_hash":1800590202,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"malware","start":53,"end":60,"id":6},{"text":"attacks","start":61,"end":68,"id":7},{"text":"using","start":69,"end":74,"id":8},{"text":"SIEM","start":75,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Web Developer opportunity: Lead Cloud Security program, implement OWASP Top 10, manage AI Policy operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":78,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":87,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1998085039,"_task_hash":-633650847,"tokens":[{"text":"Web","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"opportunity","start":14,"end":25,"id":2},{"text":":","start":25,"end":26,"id":3},{"text":"Lead","start":27,"end":31,"id":4},{"text":"Cloud","start":32,"end":37,"id":5},{"text":"Security","start":38,"end":46,"id":6},{"text":"program","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"implement","start":56,"end":65,"id":9},{"text":"OWASP","start":66,"end":71,"id":10},{"text":"Top","start":72,"end":75,"id":11},{"text":"10","start":76,"end":78,"id":12},{"text":",","start":78,"end":79,"id":13},{"text":"manage","start":80,"end":86,"id":14},{"text":"AI","start":87,"end":89,"id":15},{"text":"Policy","start":90,"end":96,"id":16},{"text":"operations","start":97,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} +{"text":"Ensured GDPR compliance for EU customers.","spans":[{"start":8,"end":12,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1863521779,"_task_hash":-633223993,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"GDPR","start":8,"end":12,"id":1},{"text":"compliance","start":13,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"EU","start":28,"end":30,"id":4},{"text":"customers","start":31,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} +{"text":"Looking for Insider Threat Analyst to lead Cloud Native Security initiatives.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":43,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-200148341,"_task_hash":-1066096023,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Insider","start":12,"end":19,"id":2},{"text":"Threat","start":20,"end":26,"id":3},{"text":"Analyst","start":27,"end":34,"id":4},{"text":"to","start":35,"end":37,"id":5},{"text":"lead","start":38,"end":42,"id":6},{"text":"Cloud","start":43,"end":48,"id":7},{"text":"Native","start":49,"end":55,"id":8},{"text":"Security","start":56,"end":64,"id":9},{"text":"initiatives","start":65,"end":76,"id":10},{"text":".","start":76,"end":77,"id":11}]} +{"text":"Must have ELK Stack experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1719884670,"_task_hash":267623844,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"ELK","start":10,"end":13,"id":2},{"text":"Stack","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"NIST","start":35,"end":39,"id":6},{"text":"Framework","start":40,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} +{"text":"Senior Data Intelligence Analyst position: 3 years minimum, expert in AI Integration, Technical Leadership, and Security Testing.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":70,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":112,"end":128,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1931830500,"_task_hash":2020016986,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Data","start":7,"end":11,"id":1},{"text":"Intelligence","start":12,"end":24,"id":2},{"text":"Analyst","start":25,"end":32,"id":3},{"text":"position","start":33,"end":41,"id":4},{"text":":","start":41,"end":42,"id":5},{"text":"3","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"minimum","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"expert","start":60,"end":66,"id":10},{"text":"in","start":67,"end":69,"id":11},{"text":"AI","start":70,"end":72,"id":12},{"text":"Integration","start":73,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"Technical","start":86,"end":95,"id":15},{"text":"Leadership","start":96,"end":106,"id":16},{"text":",","start":106,"end":107,"id":17},{"text":"and","start":108,"end":111,"id":18},{"text":"Security","start":112,"end":120,"id":19},{"text":"Testing","start":121,"end":128,"id":20},{"text":".","start":128,"end":129,"id":21}]} +{"text":"ML Security Architect professional with 7+ years implementing QRadar and managing Endpoint Detection and Response programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":82,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1038733348,"_task_hash":710933685,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"7","start":40,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"implementing","start":49,"end":61,"id":8},{"text":"QRadar","start":62,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"managing","start":73,"end":81,"id":11},{"text":"Endpoint","start":82,"end":90,"id":12},{"text":"Detection","start":91,"end":100,"id":13},{"text":"and","start":101,"end":104,"id":14},{"text":"Response","start":105,"end":113,"id":15},{"text":"programs","start":114,"end":122,"id":16},{"text":".","start":122,"end":123,"id":17}]} +{"text":"Accomplished Penetration Tester specializing in Neural Architectures and AI Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1158804273,"_task_hash":1090999807,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Penetration","start":13,"end":24,"id":1},{"text":"Tester","start":25,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Neural","start":48,"end":54,"id":5},{"text":"Architectures","start":55,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"AI","start":73,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":".","start":84,"end":85,"id":10}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Hiring Security Awareness Trainer for Quantitative Research and worm detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1558416451,"_task_hash":1157075119,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Trainer","start":26,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Quantitative","start":38,"end":50,"id":5},{"text":"Research","start":51,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"worm","start":64,"end":68,"id":8},{"text":"detection","start":69,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} +{"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Senior Cyber Threat Intelligence Analyst skilled in Database Design, Performance Tools, and Docker Security.","spans":[{"start":7,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":52,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":69,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":983548201,"_task_hash":-1650372796,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Threat","start":13,"end":19,"id":2},{"text":"Intelligence","start":20,"end":32,"id":3},{"text":"Analyst","start":33,"end":40,"id":4},{"text":"skilled","start":41,"end":48,"id":5},{"text":"in","start":49,"end":51,"id":6},{"text":"Database","start":52,"end":60,"id":7},{"text":"Design","start":61,"end":67,"id":8},{"text":",","start":67,"end":68,"id":9},{"text":"Performance","start":69,"end":80,"id":10},{"text":"Tools","start":81,"end":86,"id":11},{"text":",","start":86,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Docker","start":92,"end":98,"id":14},{"text":"Security","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} +{"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Ensured compliance with NIST requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-242873888,"_task_hash":-945831769,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"NIST","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} +{"text":"Digital Forensics Investigator professional with 5++ years implementing SIEM and managing SOC Operations programs.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":90,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-922724083,"_task_hash":1944563458,"tokens":[{"text":"Digital","start":0,"end":7,"id":0},{"text":"Forensics","start":8,"end":17,"id":1},{"text":"Investigator","start":18,"end":30,"id":2},{"text":"professional","start":31,"end":43,"id":3},{"text":"with","start":44,"end":48,"id":4},{"text":"5++","start":49,"end":52,"id":5},{"text":"years","start":53,"end":58,"id":6},{"text":"implementing","start":59,"end":71,"id":7},{"text":"SIEM","start":72,"end":76,"id":8},{"text":"and","start":77,"end":80,"id":9},{"text":"managing","start":81,"end":89,"id":10},{"text":"SOC","start":90,"end":93,"id":11},{"text":"Operations","start":94,"end":104,"id":12},{"text":"programs","start":105,"end":113,"id":13},{"text":".","start":113,"end":114,"id":14}]} +{"text":"Senior Cloud Security Engineer skilled in Critical Thinking, Gantt Charts, and Docker Security.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1916726611,"_task_hash":-1982334766,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"skilled","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"Critical","start":42,"end":50,"id":6},{"text":"Thinking","start":51,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Gantt","start":61,"end":66,"id":9},{"text":"Charts","start":67,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Docker","start":79,"end":85,"id":13},{"text":"Security","start":86,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} +{"text":"HIPAA certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-709067852,"_task_hash":1892356067,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} +{"text":"Experienced Governance Risk Compliance Specialist specializing in Cloud Security Architecture.","spans":[{"start":12,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":66,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":126522113,"_task_hash":-416086117,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Governance","start":12,"end":22,"id":1},{"text":"Risk","start":23,"end":27,"id":2},{"text":"Compliance","start":28,"end":38,"id":3},{"text":"Specialist","start":39,"end":49,"id":4},{"text":"specializing","start":50,"end":62,"id":5},{"text":"in","start":63,"end":65,"id":6},{"text":"Cloud","start":66,"end":71,"id":7},{"text":"Security","start":72,"end":80,"id":8},{"text":"Architecture","start":81,"end":93,"id":9},{"text":".","start":93,"end":94,"id":10}]} +{"text":"Proficient in EDR Tools and ELK Stack.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-471465511,"_task_hash":-1399664345,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"ELK","start":28,"end":31,"id":5},{"text":"Stack","start":32,"end":37,"id":6},{"text":".","start":37,"end":38,"id":7}]} +{"text":"Briefed executives on watering hole risks.","spans":[{"start":22,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":537212393,"_task_hash":-620442867,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"watering","start":22,"end":30,"id":3},{"text":"hole","start":31,"end":35,"id":4},{"text":"risks","start":36,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} +{"text":"Certified SAML working as Machine Learning Operations Engineer, focused on Application Security Architecture and Command Injection prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":62,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7},{"start":75,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":113,"end":130,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-908552705,"_task_hash":226970429,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SAML","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Machine","start":26,"end":33,"id":4},{"text":"Learning","start":34,"end":42,"id":5},{"text":"Operations","start":43,"end":53,"id":6},{"text":"Engineer","start":54,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"focused","start":64,"end":71,"id":9},{"text":"on","start":72,"end":74,"id":10},{"text":"Application","start":75,"end":86,"id":11},{"text":"Security","start":87,"end":95,"id":12},{"text":"Architecture","start":96,"end":108,"id":13},{"text":"and","start":109,"end":112,"id":14},{"text":"Command","start":113,"end":120,"id":15},{"text":"Injection","start":121,"end":130,"id":16},{"text":"prevention","start":131,"end":141,"id":17},{"text":".","start":141,"end":142,"id":18}]} +{"text":"Senior Cyber Forensics Analyst skilled in Software Installation, Training Metrics, and Security Hardening.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":65,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":87,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1764265621,"_task_hash":1315502090,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Forensics","start":13,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"skilled","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"Software","start":42,"end":50,"id":6},{"text":"Installation","start":51,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"Training","start":65,"end":73,"id":9},{"text":"Metrics","start":74,"end":81,"id":10},{"text":",","start":81,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"Security","start":87,"end":95,"id":13},{"text":"Hardening","start":96,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} +{"text":"RBAC certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1173080966,"_task_hash":15292339,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"Built Security Operations team from ground up.","spans":[{"start":6,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-465520618,"_task_hash":1403893913,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Operations","start":15,"end":25,"id":2},{"text":"team","start":26,"end":30,"id":3},{"text":"from","start":31,"end":35,"id":4},{"text":"ground","start":36,"end":42,"id":5},{"text":"up","start":43,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} +{"text":"Senior Security Vulnerability Analyst skilled in ETL, Investigations, and Security Awareness.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":49,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":54,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":74,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1641033163,"_task_hash":559122202,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Vulnerability","start":16,"end":29,"id":2},{"text":"Analyst","start":30,"end":37,"id":3},{"text":"skilled","start":38,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"ETL","start":49,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"Investigations","start":54,"end":68,"id":8},{"text":",","start":68,"end":69,"id":9},{"text":"and","start":70,"end":73,"id":10},{"text":"Security","start":74,"end":82,"id":11},{"text":"Awareness","start":83,"end":92,"id":12},{"text":".","start":92,"end":93,"id":13}]} +{"text":"NLP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1598323033,"_task_hash":-155365979,"tokens":[{"text":"NLP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Red Team Lead with GPEN certification, expert in Suricata.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2055274650,"_task_hash":-295086822,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Lead","start":9,"end":13,"id":2},{"text":"with","start":14,"end":18,"id":3},{"text":"GPEN","start":19,"end":23,"id":4},{"text":"certification","start":24,"end":37,"id":5},{"text":",","start":37,"end":38,"id":6},{"text":"expert","start":39,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Suricata","start":49,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} +{"text":"Senior Security Awareness Consultant skilled in Statistical Analysis, Mobile Debugging, and Security Culture.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":92,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1955760280,"_task_hash":856952950,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Consultant","start":26,"end":36,"id":3},{"text":"skilled","start":37,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Statistical","start":48,"end":59,"id":6},{"text":"Analysis","start":60,"end":68,"id":7},{"text":",","start":68,"end":69,"id":8},{"text":"Mobile","start":70,"end":76,"id":9},{"text":"Debugging","start":77,"end":86,"id":10},{"text":",","start":86,"end":87,"id":11},{"text":"and","start":88,"end":91,"id":12},{"text":"Security","start":92,"end":100,"id":13},{"text":"Culture","start":101,"end":108,"id":14},{"text":".","start":108,"end":109,"id":15}]} +{"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} +{"text":"Mitigated Session Hijacking through code remediation.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1477654235,"_task_hash":1643308753,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Session","start":10,"end":17,"id":1},{"text":"Hijacking","start":18,"end":27,"id":2},{"text":"through","start":28,"end":35,"id":3},{"text":"code","start":36,"end":40,"id":4},{"text":"remediation","start":41,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} +{"text":"Experienced Server-Side Developer specializing in GCP Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":50,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-407726127,"_task_hash":1958966565,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Server","start":12,"end":18,"id":1},{"text":"-","start":18,"end":19,"id":2},{"text":"Side","start":19,"end":23,"id":3},{"text":"Developer","start":24,"end":33,"id":4},{"text":"specializing","start":34,"end":46,"id":5},{"text":"in","start":47,"end":49,"id":6},{"text":"GCP","start":50,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} +{"text":"Proficient in EDR Tools and SIEM Operations.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1382976328,"_task_hash":1898479004,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"SIEM","start":28,"end":32,"id":5},{"text":"Operations","start":33,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} +{"text":"Expert in Risk Management best practices.","spans":[{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1837593425,"_task_hash":-244347856,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Risk","start":10,"end":14,"id":2},{"text":"Management","start":15,"end":25,"id":3},{"text":"best","start":26,"end":30,"id":4},{"text":"practices","start":31,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} +{"text":"Application Security Engineer with GCP Security certification, expert in Splunk.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":47,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":73,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2002321678,"_task_hash":-805227689,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"GCP","start":35,"end":38,"id":4},{"text":"Security","start":39,"end":47,"id":5},{"text":"certification","start":48,"end":61,"id":6},{"text":",","start":61,"end":62,"id":7},{"text":"expert","start":63,"end":69,"id":8},{"text":"in","start":70,"end":72,"id":9},{"text":"Splunk","start":73,"end":79,"id":10},{"text":".","start":79,"end":80,"id":11}]} +{"text":"Managed IDS infrastructure for Fortune 500 client.","spans":[{"start":8,"end":11,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":787237806,"_task_hash":-796720163,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"IDS","start":8,"end":11,"id":1},{"text":"infrastructure","start":12,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"Fortune","start":31,"end":38,"id":4},{"text":"500","start":39,"end":42,"id":5},{"text":"client","start":43,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Experienced Security Assessor specializing in AWS Security.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":46,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":104640891,"_task_hash":1047363618,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Assessor","start":21,"end":29,"id":2},{"text":"specializing","start":30,"end":42,"id":3},{"text":"in","start":43,"end":45,"id":4},{"text":"AWS","start":46,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Proficient in SIEM Operations and SIEM.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1572595690,"_task_hash":1138698751,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} -{"text":"Experienced Cyber Operations Manager specializing in Security Operations.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-804042884,"_task_hash":755021497,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Operations","start":18,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Security","start":53,"end":61,"id":6},{"text":"Operations","start":62,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} -{"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} -{"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and Technical Leadership operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":784981389,"_task_hash":-1885566748,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Technical","start":82,"end":91,"id":13},{"text":"Leadership","start":92,"end":102,"id":14},{"text":"operations","start":103,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} -{"text":"Endpoint Security Specialist with 10 years experience in Version Control, User Activity Monitoring, and Protocols.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13},{"start":104,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1504376676,"_task_hash":1854625531,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"10","start":34,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Version","start":57,"end":64,"id":8},{"text":"Control","start":65,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"User","start":74,"end":78,"id":11},{"text":"Activity","start":79,"end":87,"id":12},{"text":"Monitoring","start":88,"end":98,"id":13},{"text":",","start":98,"end":99,"id":14},{"text":"and","start":100,"end":103,"id":15},{"text":"Protocols","start":104,"end":113,"id":16},{"text":".","start":113,"end":114,"id":17}]} -{"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} -{"text":"Senior Compliance Officer skilled in Log Analysis, Data Governance, and Security Patterns.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":72,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2078451862,"_task_hash":1844235398,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Compliance","start":7,"end":17,"id":1},{"text":"Officer","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Log","start":37,"end":40,"id":5},{"text":"Analysis","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Data","start":51,"end":55,"id":8},{"text":"Governance","start":56,"end":66,"id":9},{"text":",","start":66,"end":67,"id":10},{"text":"and","start":68,"end":71,"id":11},{"text":"Security","start":72,"end":80,"id":12},{"text":"Patterns","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} -{"text":"VR/AR certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":311753143,"_task_hash":1135622316,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} -{"text":"Senior Cyber Threat Hunter position: 7 years minimum, expert in GDPR, Critical Thinking, and BYOD Security.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":70,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":93,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1325779348,"_task_hash":1187695402,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Threat","start":13,"end":19,"id":2},{"text":"Hunter","start":20,"end":26,"id":3},{"text":"position","start":27,"end":35,"id":4},{"text":":","start":35,"end":36,"id":5},{"text":"7","start":37,"end":38,"id":6},{"text":"years","start":39,"end":44,"id":7},{"text":"minimum","start":45,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"expert","start":54,"end":60,"id":10},{"text":"in","start":61,"end":63,"id":11},{"text":"GDPR","start":64,"end":68,"id":12},{"text":",","start":68,"end":69,"id":13},{"text":"Critical","start":70,"end":78,"id":14},{"text":"Thinking","start":79,"end":87,"id":15},{"text":",","start":87,"end":88,"id":16},{"text":"and","start":89,"end":92,"id":17},{"text":"BYOD","start":93,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} -{"text":"Immediate opening for API Developer.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1332043392,"_task_hash":821647175,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"API","start":22,"end":25,"id":3},{"text":"Developer","start":26,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} -{"text":"Required skills: Burp Suite, Ethics Training, ISO 31000 certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":55,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1832737523,"_task_hash":-1621820757,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Ethics","start":29,"end":35,"id":6},{"text":"Training","start":36,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"ISO","start":46,"end":49,"id":9},{"text":"31000","start":50,"end":55,"id":10},{"text":"certification","start":56,"end":69,"id":11},{"text":".","start":69,"end":70,"id":12}]} -{"text":"Join our team as Enterprise Solutions Architect!","spans":[{"start":17,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1867499106,"_task_hash":-1236583068,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Enterprise","start":17,"end":27,"id":4},{"text":"Solutions","start":28,"end":37,"id":5},{"text":"Architect","start":38,"end":47,"id":6},{"text":"!","start":47,"end":48,"id":7}]} -{"text":"Must know Nessus, QRadar, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-967030673,"_task_hash":479774730,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"QRadar","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":".","start":44,"end":45,"id":9}]} -{"text":"TLS/SSL certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":241661517,"_task_hash":-921594864,"tokens":[{"text":"TLS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"SSL","start":4,"end":7,"id":2},{"text":"certification","start":8,"end":21,"id":3},{"text":"a","start":22,"end":23,"id":4},{"text":"plus","start":24,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} -{"text":"Hiring Security Awareness Specialist for Sketch and rootkit detection.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1806641871,"_task_hash":288333503,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"Sketch","start":41,"end":47,"id":5},{"text":"and","start":48,"end":51,"id":6},{"text":"rootkit","start":52,"end":59,"id":7},{"text":"detection","start":60,"end":69,"id":8},{"text":".","start":69,"end":70,"id":9}]} -{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Technical Project Manager role available: Cloud Architecture experience required, Security knowledge essential.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1314791684,"_task_hash":-1031533739,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Project","start":10,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"role","start":26,"end":30,"id":3},{"text":"available","start":31,"end":40,"id":4},{"text":":","start":40,"end":41,"id":5},{"text":"Cloud","start":42,"end":47,"id":6},{"text":"Architecture","start":48,"end":60,"id":7},{"text":"experience","start":61,"end":71,"id":8},{"text":"required","start":72,"end":80,"id":9},{"text":",","start":80,"end":81,"id":10},{"text":"Security","start":82,"end":90,"id":11},{"text":"knowledge","start":91,"end":100,"id":12},{"text":"essential","start":101,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} +{"text":"Looking for Interface Designer to lead Cloud Native Security initiatives.","spans":[{"start":12,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-576128403,"_task_hash":-1206714201,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Interface","start":12,"end":21,"id":2},{"text":"Designer","start":22,"end":30,"id":3},{"text":"to","start":31,"end":33,"id":4},{"text":"lead","start":34,"end":38,"id":5},{"text":"Cloud","start":39,"end":44,"id":6},{"text":"Native","start":45,"end":51,"id":7},{"text":"Security","start":52,"end":60,"id":8},{"text":"initiatives","start":61,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} +{"text":"Must have SIEM experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":42,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-2001643755,"_task_hash":1229096089,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"OWASP","start":30,"end":35,"id":5},{"text":"Top","start":36,"end":39,"id":6},{"text":"10","start":40,"end":42,"id":7},{"text":"knowledge","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} +{"text":"Published threat intel report on rootkit trends.","spans":[{"start":33,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-157696595,"_task_hash":1622176157,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"rootkit","start":33,"end":40,"id":5},{"text":"trends","start":41,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} +{"text":"Led incident response for CVE-2020-1472 exploitation.","spans":[{"start":26,"end":39,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":115126800,"_task_hash":267573877,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2020","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"1472","start":35,"end":39,"id":6},{"text":"exploitation","start":40,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} +{"text":"Implemented Infrastructure Security controls and monitoring.","spans":[{"start":12,"end":35,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":682056907,"_task_hash":-1111954273,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Infrastructure","start":12,"end":26,"id":1},{"text":"Security","start":27,"end":35,"id":2},{"text":"controls","start":36,"end":44,"id":3},{"text":"and","start":45,"end":48,"id":4},{"text":"monitoring","start":49,"end":59,"id":5},{"text":".","start":59,"end":60,"id":6}]} +{"text":"Information Security Architect professional with 7+ years implementing EDR Platforms and managing AI Governance programs.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":71,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":98,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2043957280,"_task_hash":2134600058,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Architect","start":21,"end":30,"id":2},{"text":"professional","start":31,"end":43,"id":3},{"text":"with","start":44,"end":48,"id":4},{"text":"7","start":49,"end":50,"id":5},{"text":"+","start":50,"end":51,"id":6},{"text":"years","start":52,"end":57,"id":7},{"text":"implementing","start":58,"end":70,"id":8},{"text":"EDR","start":71,"end":74,"id":9},{"text":"Platforms","start":75,"end":84,"id":10},{"text":"and","start":85,"end":88,"id":11},{"text":"managing","start":89,"end":97,"id":12},{"text":"AI","start":98,"end":100,"id":13},{"text":"Governance","start":101,"end":111,"id":14},{"text":"programs","start":112,"end":120,"id":15},{"text":".","start":120,"end":121,"id":16}]} +{"text":"Senior IT GRC Specialist position: 7 years minimum, expert in Reporting, Cisco, and Hardware Security Modules.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":73,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":84,"end":109,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1650064380,"_task_hash":-1572858091,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"GRC","start":10,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"position","start":25,"end":33,"id":4},{"text":":","start":33,"end":34,"id":5},{"text":"7","start":35,"end":36,"id":6},{"text":"years","start":37,"end":42,"id":7},{"text":"minimum","start":43,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"expert","start":52,"end":58,"id":10},{"text":"in","start":59,"end":61,"id":11},{"text":"Reporting","start":62,"end":71,"id":12},{"text":",","start":71,"end":72,"id":13},{"text":"Cisco","start":73,"end":78,"id":14},{"text":",","start":78,"end":79,"id":15},{"text":"and","start":80,"end":83,"id":16},{"text":"Hardware","start":84,"end":92,"id":17},{"text":"Security","start":93,"end":101,"id":18},{"text":"Modules","start":102,"end":109,"id":19},{"text":".","start":109,"end":110,"id":20}]} +{"text":"Certified ISO 22301 working as IT Compliance Specialist, focused on Security Automation and XXE prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":55,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":68,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":92,"end":95,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-673550678,"_task_hash":-1394653908,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"22301","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"IT","start":31,"end":33,"id":5},{"text":"Compliance","start":34,"end":44,"id":6},{"text":"Specialist","start":45,"end":55,"id":7},{"text":",","start":55,"end":56,"id":8},{"text":"focused","start":57,"end":64,"id":9},{"text":"on","start":65,"end":67,"id":10},{"text":"Security","start":68,"end":76,"id":11},{"text":"Automation","start":77,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"XXE","start":92,"end":95,"id":14},{"text":"prevention","start":96,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} +{"text":"Threat Hunter role available: Frameworks experience required, Mobile Security knowledge essential.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":62,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":923256876,"_task_hash":859469832,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"role","start":14,"end":18,"id":2},{"text":"available","start":19,"end":28,"id":3},{"text":":","start":28,"end":29,"id":4},{"text":"Frameworks","start":30,"end":40,"id":5},{"text":"experience","start":41,"end":51,"id":6},{"text":"required","start":52,"end":60,"id":7},{"text":",","start":60,"end":61,"id":8},{"text":"Mobile","start":62,"end":68,"id":9},{"text":"Security","start":69,"end":77,"id":10},{"text":"knowledge","start":78,"end":87,"id":11},{"text":"essential","start":88,"end":97,"id":12},{"text":".","start":97,"end":98,"id":13}]} +{"text":"GLBA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1328244680,"_task_hash":-1510078390,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Managed UEBA infrastructure for Fortune 500 client.","spans":[{"start":8,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2004405427,"_task_hash":-1151147415,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"UEBA","start":8,"end":12,"id":1},{"text":"infrastructure","start":13,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"Fortune","start":32,"end":39,"id":4},{"text":"500","start":40,"end":43,"id":5},{"text":"client","start":44,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} +{"text":"Data Analyst with 10 years experience in SOC Management, Network Segmentation, and Style Guides.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":57,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":83,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1836163708,"_task_hash":1134648246,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"10","start":18,"end":20,"id":3},{"text":"years","start":21,"end":26,"id":4},{"text":"experience","start":27,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"SOC","start":41,"end":44,"id":7},{"text":"Management","start":45,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"Network","start":57,"end":64,"id":10},{"text":"Segmentation","start":65,"end":77,"id":11},{"text":",","start":77,"end":78,"id":12},{"text":"and","start":79,"end":82,"id":13},{"text":"Style","start":83,"end":88,"id":14},{"text":"Guides","start":89,"end":95,"id":15},{"text":".","start":95,"end":96,"id":16}]} +{"text":"Holds DNS/DHCP certification.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1789880151,"_task_hash":690454037,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"DNS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DHCP","start":10,"end":14,"id":3},{"text":"certification","start":15,"end":28,"id":4},{"text":".","start":28,"end":29,"id":5}]} +{"text":"Remediated SOC 2 audit findings.","spans":[{"start":11,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":11,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-302515583,"_task_hash":1419157810,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"SOC","start":11,"end":14,"id":1},{"text":"2","start":15,"end":16,"id":2},{"text":"audit","start":17,"end":22,"id":3},{"text":"findings","start":23,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} +{"text":"Experienced AI/ML Product Manager specializing in Kubernetes Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":50,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1260162301,"_task_hash":1049345361,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"AI","start":12,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"ML","start":15,"end":17,"id":3},{"text":"Product","start":18,"end":25,"id":4},{"text":"Manager","start":26,"end":33,"id":5},{"text":"specializing","start":34,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Kubernetes","start":50,"end":60,"id":8},{"text":"Security","start":61,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} +{"text":"Proficient in Wireshark and ELK Stack.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1223315681,"_task_hash":-815345432,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"ELK","start":28,"end":31,"id":4},{"text":"Stack","start":32,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} +{"text":"Penetration Tester opportunity: Lead Security Scanning program, implement OWASP Top 10, manage FPGA operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":74,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1469490418,"_task_hash":-1302941441,"tokens":[{"text":"Penetration","start":0,"end":11,"id":0},{"text":"Tester","start":12,"end":18,"id":1},{"text":"opportunity","start":19,"end":30,"id":2},{"text":":","start":30,"end":31,"id":3},{"text":"Lead","start":32,"end":36,"id":4},{"text":"Security","start":37,"end":45,"id":5},{"text":"Scanning","start":46,"end":54,"id":6},{"text":"program","start":55,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"implement","start":64,"end":73,"id":9},{"text":"OWASP","start":74,"end":79,"id":10},{"text":"Top","start":80,"end":83,"id":11},{"text":"10","start":84,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"FPGA","start":95,"end":99,"id":15},{"text":"operations","start":100,"end":110,"id":16},{"text":".","start":110,"end":111,"id":17}]} +{"text":"Join our team as IT Administrator!","spans":[{"start":17,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1777250452,"_task_hash":1561158960,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"IT","start":17,"end":19,"id":4},{"text":"Administrator","start":20,"end":33,"id":5},{"text":"!","start":33,"end":34,"id":6}]} +{"text":"Must know SIEM, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":719446362,"_task_hash":-664578954,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"CrowdStrike","start":16,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"NIST","start":33,"end":37,"id":7},{"text":"Framework","start":38,"end":47,"id":8},{"text":".","start":47,"end":48,"id":9}]} +{"text":"PMP Certification certification a plus.","spans":[{"start":0,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1450494660,"_task_hash":-506043020,"tokens":[{"text":"PMP","start":0,"end":3,"id":0},{"text":"Certification","start":4,"end":17,"id":1},{"text":"certification","start":18,"end":31,"id":2},{"text":"a","start":32,"end":33,"id":3},{"text":"plus","start":34,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} +{"text":"Analyzed Remote Code Execution samples in malware lab.","spans":[{"start":9,"end":30,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":618739053,"_task_hash":-379651529,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Remote","start":9,"end":15,"id":1},{"text":"Code","start":16,"end":20,"id":2},{"text":"Execution","start":21,"end":30,"id":3},{"text":"samples","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"malware","start":42,"end":49,"id":6},{"text":"lab","start":50,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} +{"text":"Cloud Security Engineer role available: Windows/Mac Support experience required, Kubernetes Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":9},{"start":81,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-469523842,"_task_hash":1447673184,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Windows","start":40,"end":47,"id":6},{"text":"/","start":47,"end":48,"id":7},{"text":"Mac","start":48,"end":51,"id":8},{"text":"Support","start":52,"end":59,"id":9},{"text":"experience","start":60,"end":70,"id":10},{"text":"required","start":71,"end":79,"id":11},{"text":",","start":79,"end":80,"id":12},{"text":"Kubernetes","start":81,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":"knowledge","start":101,"end":110,"id":15},{"text":"essential","start":111,"end":120,"id":16},{"text":".","start":120,"end":121,"id":17}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Accomplished Server-Side Developer specializing in Antivirus/Antimalware and Security Operations.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":51,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":77,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1012452100,"_task_hash":1190843855,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Server","start":13,"end":19,"id":1},{"text":"-","start":19,"end":20,"id":2},{"text":"Side","start":20,"end":24,"id":3},{"text":"Developer","start":25,"end":34,"id":4},{"text":"specializing","start":35,"end":47,"id":5},{"text":"in","start":48,"end":50,"id":6},{"text":"Antivirus","start":51,"end":60,"id":7},{"text":"/","start":60,"end":61,"id":8},{"text":"Antimalware","start":61,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"Operations","start":86,"end":96,"id":12},{"text":".","start":96,"end":97,"id":13}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Join our team as Technical Support Analyst!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-573217798,"_task_hash":1767487203,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Analyst","start":35,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} -{"text":"Must know Wireshark, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-112823401,"_task_hash":-2093315552,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Wireshark","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"and","start":32,"end":35,"id":6},{"text":"OWASP","start":36,"end":41,"id":7},{"text":"Top","start":42,"end":45,"id":8},{"text":"10","start":46,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} -{"text":"AWS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":411302902,"_task_hash":-651527579,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} -{"text":"Front-End Developer professional with 3++ years implementing EDR Tools and managing Privacy-Preserving ML programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":84,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-946005144,"_task_hash":-1347406546,"tokens":[{"text":"Front","start":0,"end":5,"id":0},{"text":"-","start":5,"end":6,"id":1},{"text":"End","start":6,"end":9,"id":2},{"text":"Developer","start":10,"end":19,"id":3},{"text":"professional","start":20,"end":32,"id":4},{"text":"with","start":33,"end":37,"id":5},{"text":"3++","start":38,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"implementing","start":48,"end":60,"id":8},{"text":"EDR","start":61,"end":64,"id":9},{"text":"Tools","start":65,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"managing","start":75,"end":83,"id":12},{"text":"Privacy","start":84,"end":91,"id":13},{"text":"-","start":91,"end":92,"id":14},{"text":"Preserving","start":92,"end":102,"id":15},{"text":"ML","start":103,"end":105,"id":16},{"text":"programs","start":106,"end":114,"id":17},{"text":".","start":114,"end":115,"id":18}]} -{"text":"Senior Cybersecurity Analyst position: 7 years minimum, expert in Content Creation, Hacking, and Cloud Security Architecture.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":66,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":97,"end":124,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":504363669,"_task_hash":278479788,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cybersecurity","start":7,"end":20,"id":1},{"text":"Analyst","start":21,"end":28,"id":2},{"text":"position","start":29,"end":37,"id":3},{"text":":","start":37,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"minimum","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"expert","start":56,"end":62,"id":9},{"text":"in","start":63,"end":65,"id":10},{"text":"Content","start":66,"end":73,"id":11},{"text":"Creation","start":74,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"Hacking","start":84,"end":91,"id":14},{"text":",","start":91,"end":92,"id":15},{"text":"and","start":93,"end":96,"id":16},{"text":"Cloud","start":97,"end":102,"id":17},{"text":"Security","start":103,"end":111,"id":18},{"text":"Architecture","start":112,"end":124,"id":19},{"text":".","start":124,"end":125,"id":20}]} -{"text":"Senior Cloud Security Specialist position: 5 years minimum, expert in Secure Multi-Party Computation, Financial Analysis, and Security Frameworks.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":70,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":16},{"start":102,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":18,"token_end":19},{"start":126,"end":145,"label":"SECURITY_DOMAIN","answer":"accept","token_start":22,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1549225190,"_task_hash":-1011319881,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"position","start":33,"end":41,"id":4},{"text":":","start":41,"end":42,"id":5},{"text":"5","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"minimum","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"expert","start":60,"end":66,"id":10},{"text":"in","start":67,"end":69,"id":11},{"text":"Secure","start":70,"end":76,"id":12},{"text":"Multi","start":77,"end":82,"id":13},{"text":"-","start":82,"end":83,"id":14},{"text":"Party","start":83,"end":88,"id":15},{"text":"Computation","start":89,"end":100,"id":16},{"text":",","start":100,"end":101,"id":17},{"text":"Financial","start":102,"end":111,"id":18},{"text":"Analysis","start":112,"end":120,"id":19},{"text":",","start":120,"end":121,"id":20},{"text":"and","start":122,"end":125,"id":21},{"text":"Security","start":126,"end":134,"id":22},{"text":"Frameworks","start":135,"end":145,"id":23},{"text":".","start":145,"end":146,"id":24}]} -{"text":"Release Manager experienced in detecting adware attacks using Splunk.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-288890557,"_task_hash":-1953510225,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"experienced","start":16,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"detecting","start":31,"end":40,"id":4},{"text":"adware","start":41,"end":47,"id":5},{"text":"attacks","start":48,"end":55,"id":6},{"text":"using","start":56,"end":61,"id":7},{"text":"Splunk","start":62,"end":68,"id":8},{"text":".","start":68,"end":69,"id":9}]} -{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Hiring Risk Analyst for UEBA Tools and APT detection.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":24,"end":34,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":39,"end":42,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1745793283,"_task_hash":-1037340783,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"for","start":20,"end":23,"id":3},{"text":"UEBA","start":24,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":"and","start":35,"end":38,"id":6},{"text":"APT","start":39,"end":42,"id":7},{"text":"detection","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} -{"text":"PCI-DSS compliance experience preferred.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1829455208,"_task_hash":1390445460,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"compliance","start":8,"end":18,"id":3},{"text":"experience","start":19,"end":29,"id":4},{"text":"preferred","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} -{"text":"Accomplished Assistant specializing in Statistical Analysis and Security Policies.","spans":[{"start":13,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":39,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":64,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1776072673,"_task_hash":958763054,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Assistant","start":13,"end":22,"id":1},{"text":"specializing","start":23,"end":35,"id":2},{"text":"in","start":36,"end":38,"id":3},{"text":"Statistical","start":39,"end":50,"id":4},{"text":"Analysis","start":51,"end":59,"id":5},{"text":"and","start":60,"end":63,"id":6},{"text":"Security","start":64,"end":72,"id":7},{"text":"Policies","start":73,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} -{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Seeking Industrial IoT Security Specialist with 3+ years experience in X-Ways Forensics and Network Analysis.","spans":[{"start":8,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":92,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2045265785,"_task_hash":-2089715692,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Industrial","start":8,"end":18,"id":1},{"text":"IoT","start":19,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"Specialist","start":32,"end":42,"id":4},{"text":"with","start":43,"end":47,"id":5},{"text":"3","start":48,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"X","start":71,"end":72,"id":11},{"text":"-","start":72,"end":73,"id":12},{"text":"Ways","start":73,"end":77,"id":13},{"text":"Forensics","start":78,"end":87,"id":14},{"text":"and","start":88,"end":91,"id":15},{"text":"Network","start":92,"end":99,"id":16},{"text":"Analysis","start":100,"end":108,"id":17},{"text":".","start":108,"end":109,"id":18}]} -{"text":"VR/AR required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1837477982,"_task_hash":-1254758870,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} -{"text":"Cloud Architect with hands-on experience in Splunk, EDR Platforms, and Wireless Security.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":52,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":71,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":124512732,"_task_hash":-677473886,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Splunk","start":44,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"EDR","start":52,"end":55,"id":10},{"text":"Platforms","start":56,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Wireless","start":71,"end":79,"id":14},{"text":"Security","start":80,"end":88,"id":15},{"text":".","start":88,"end":89,"id":16}]} -{"text":"Holds PRINCE2.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1460297396,"_task_hash":-885041091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PRINCE2","start":6,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Computer Forensics Investigator experienced in detecting rootkit attacks using SIEM.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":79,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":362333874,"_task_hash":1552502746,"tokens":[{"text":"Computer","start":0,"end":8,"id":0},{"text":"Forensics","start":9,"end":18,"id":1},{"text":"Investigator","start":19,"end":31,"id":2},{"text":"experienced","start":32,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"detecting","start":47,"end":56,"id":5},{"text":"rootkit","start":57,"end":64,"id":6},{"text":"attacks","start":65,"end":72,"id":7},{"text":"using","start":73,"end":78,"id":8},{"text":"SIEM","start":79,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} -{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Certified SLAM working as Infrastructure Security Engineer, focused on MQTT Security and Buffer Overflow prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":71,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":89,"end":104,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-222279151,"_task_hash":-398945424,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SLAM","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Infrastructure","start":26,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":"Engineer","start":50,"end":58,"id":6},{"text":",","start":58,"end":59,"id":7},{"text":"focused","start":60,"end":67,"id":8},{"text":"on","start":68,"end":70,"id":9},{"text":"MQTT","start":71,"end":75,"id":10},{"text":"Security","start":76,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Buffer","start":89,"end":95,"id":13},{"text":"Overflow","start":96,"end":104,"id":14},{"text":"prevention","start":105,"end":115,"id":15},{"text":".","start":115,"end":116,"id":16}]} -{"text":"Accomplished Interface Designer specializing in Tailwind CSS and Network Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":2130861941,"_task_hash":1775570633,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Interface","start":13,"end":22,"id":1},{"text":"Designer","start":23,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Tailwind","start":48,"end":56,"id":5},{"text":"CSS","start":57,"end":60,"id":6},{"text":"and","start":61,"end":64,"id":7},{"text":"Network","start":65,"end":72,"id":8},{"text":"Security","start":73,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} -{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Lead Defensive Security Analyst managing Sandbox Analysis and Regression Testing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-318402082,"_task_hash":1417241188,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Defensive","start":5,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Analyst","start":24,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Sandbox","start":41,"end":48,"id":5},{"text":"Analysis","start":49,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Regression","start":62,"end":72,"id":8},{"text":"Testing","start":73,"end":80,"id":9},{"text":"initiatives","start":81,"end":92,"id":10},{"text":".","start":92,"end":93,"id":11}]} -{"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Immediate opening for Security Awareness Trainer.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1845258642,"_task_hash":1630037966,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Awareness","start":31,"end":40,"id":4},{"text":"Trainer","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} +{"text":"Required skills: Metasploit, Data Pipelines, DNS/DHCP certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":53,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-397976751,"_task_hash":-1461479939,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"Data","start":29,"end":33,"id":5},{"text":"Pipelines","start":34,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"DNS","start":45,"end":48,"id":8},{"text":"/","start":48,"end":49,"id":9},{"text":"DHCP","start":49,"end":53,"id":10},{"text":"certification","start":54,"end":67,"id":11},{"text":".","start":67,"end":68,"id":12}]} +{"text":"Led annual Preventive Action program.","spans":[{"start":11,"end":28,"label":"AUDIT_TERM","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-313144904,"_task_hash":457891249,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"annual","start":4,"end":10,"id":1},{"text":"Preventive","start":11,"end":21,"id":2},{"text":"Action","start":22,"end":28,"id":3},{"text":"program","start":29,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} +{"text":"Simulated Remote Code Execution during red team exercise.","spans":[{"start":10,"end":31,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":355265769,"_task_hash":1116386124,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Remote","start":10,"end":16,"id":1},{"text":"Code","start":17,"end":21,"id":2},{"text":"Execution","start":22,"end":31,"id":3},{"text":"during","start":32,"end":38,"id":4},{"text":"red","start":39,"end":42,"id":5},{"text":"team","start":43,"end":47,"id":6},{"text":"exercise","start":48,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} +{"text":"Exploited Living off the Land vulnerability in web application.","spans":[{"start":10,"end":29,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1422232982,"_task_hash":1975689281,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Living","start":10,"end":16,"id":1},{"text":"off","start":17,"end":20,"id":2},{"text":"the","start":21,"end":24,"id":3},{"text":"Land","start":25,"end":29,"id":4},{"text":"vulnerability","start":30,"end":43,"id":5},{"text":"in","start":44,"end":46,"id":6},{"text":"web","start":47,"end":50,"id":7},{"text":"application","start":51,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} +{"text":"Discovered and reported CVE-2024-1234 affecting critical infrastructure.","spans":[{"start":24,"end":37,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1989801917,"_task_hash":-2095252770,"tokens":[{"text":"Discovered","start":0,"end":10,"id":0},{"text":"and","start":11,"end":14,"id":1},{"text":"reported","start":15,"end":23,"id":2},{"text":"CVE-2024","start":24,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"1234","start":33,"end":37,"id":5},{"text":"affecting","start":38,"end":47,"id":6},{"text":"critical","start":48,"end":56,"id":7},{"text":"infrastructure","start":57,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} +{"text":"CISO with CySA+ certification, expert in Wireshark.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":41,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1649980632,"_task_hash":-527941118,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"with","start":5,"end":9,"id":1},{"text":"CySA+","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":",","start":29,"end":30,"id":4},{"text":"expert","start":31,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"Wireshark","start":41,"end":50,"id":7},{"text":".","start":50,"end":51,"id":8}]} +{"text":"Coordinated disclosure of CVE-2019-11510 with vendor.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":976576997,"_task_hash":-1234639145,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2019","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"11510","start":35,"end":40,"id":5},{"text":"with","start":41,"end":45,"id":6},{"text":"vendor","start":46,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Seeking Malware Researcher with 3++ years experience in Insurance Frameworks and Feature Prioritization.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":81,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1884486082,"_task_hash":1627153437,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Malware","start":8,"end":15,"id":1},{"text":"Researcher","start":16,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"3++","start":32,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Insurance","start":56,"end":65,"id":8},{"text":"Frameworks","start":66,"end":76,"id":9},{"text":"and","start":77,"end":80,"id":10},{"text":"Feature","start":81,"end":88,"id":11},{"text":"Prioritization","start":89,"end":103,"id":12},{"text":".","start":103,"end":104,"id":13}]} {"text":"OSCP Certification required.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1225465137,"_task_hash":997524556,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"required","start":19,"end":27,"id":2},{"text":".","start":27,"end":28,"id":3}]} -{"text":"Software Development Engineer in Test professional with 5++ years implementing SIEM Operations and managing Awareness Programs programs.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":79,"end":94,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1512058564,"_task_hash":1122793132,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Development","start":9,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Test","start":33,"end":37,"id":4},{"text":"professional","start":38,"end":50,"id":5},{"text":"with","start":51,"end":55,"id":6},{"text":"5++","start":56,"end":59,"id":7},{"text":"years","start":60,"end":65,"id":8},{"text":"implementing","start":66,"end":78,"id":9},{"text":"SIEM","start":79,"end":83,"id":10},{"text":"Operations","start":84,"end":94,"id":11},{"text":"and","start":95,"end":98,"id":12},{"text":"managing","start":99,"end":107,"id":13},{"text":"Awareness","start":108,"end":117,"id":14},{"text":"Programs","start":118,"end":126,"id":15},{"text":"programs","start":127,"end":135,"id":16},{"text":".","start":135,"end":136,"id":17}]} -{"text":"Seeking Technical Support Specialist with 3+ years experience in Zero Trust Architecture and Cloud Networking.","spans":[{"start":8,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":65,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":93,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-199143287,"_task_hash":967970076,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Technical","start":8,"end":17,"id":1},{"text":"Support","start":18,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"3","start":42,"end":43,"id":5},{"text":"+","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"experience","start":51,"end":61,"id":8},{"text":"in","start":62,"end":64,"id":9},{"text":"Zero","start":65,"end":69,"id":10},{"text":"Trust","start":70,"end":75,"id":11},{"text":"Architecture","start":76,"end":88,"id":12},{"text":"and","start":89,"end":92,"id":13},{"text":"Cloud","start":93,"end":98,"id":14},{"text":"Networking","start":99,"end":109,"id":15},{"text":".","start":109,"end":110,"id":16}]} -{"text":"SQL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":206140740,"_task_hash":-284236833,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} -{"text":"ML Security Architect professional with 7+ years implementing QRadar and managing Endpoint Detection and Response programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":82,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1038733348,"_task_hash":710933685,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"7","start":40,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"implementing","start":49,"end":61,"id":8},{"text":"QRadar","start":62,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"managing","start":73,"end":81,"id":11},{"text":"Endpoint","start":82,"end":90,"id":12},{"text":"Detection","start":91,"end":100,"id":13},{"text":"and","start":101,"end":104,"id":14},{"text":"Response","start":105,"end":113,"id":15},{"text":"programs","start":114,"end":122,"id":16},{"text":".","start":122,"end":123,"id":17}]} -{"text":"Certified NLP working as Project Manager, focused on Security Frameworks and Clickjacking prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1880065528,"_task_hash":-1366109314,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Project","start":25,"end":32,"id":4},{"text":"Manager","start":33,"end":40,"id":5},{"text":",","start":40,"end":41,"id":6},{"text":"focused","start":42,"end":49,"id":7},{"text":"on","start":50,"end":52,"id":8},{"text":"Security","start":53,"end":61,"id":9},{"text":"Frameworks","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Clickjacking","start":77,"end":89,"id":12},{"text":"prevention","start":90,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} -{"text":"ML Security Architect experienced in detecting ransomware attacks using Splunk.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":732322781,"_task_hash":-2000809147,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Splunk","start":72,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} +{"text":"Certified CI/CD working as Social Engineering Tester, focused on Security Tools and Buffer Overflow prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":65,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":99,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1782210465,"_task_hash":1694329419,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CI","start":10,"end":12,"id":1},{"text":"/","start":12,"end":13,"id":2},{"text":"CD","start":13,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Social","start":27,"end":33,"id":6},{"text":"Engineering","start":34,"end":45,"id":7},{"text":"Tester","start":46,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"focused","start":54,"end":61,"id":10},{"text":"on","start":62,"end":64,"id":11},{"text":"Security","start":65,"end":73,"id":12},{"text":"Tools","start":74,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"Buffer","start":84,"end":90,"id":15},{"text":"Overflow","start":91,"end":99,"id":16},{"text":"prevention","start":100,"end":110,"id":17},{"text":".","start":110,"end":111,"id":18}]} +{"text":"AI/Robotics Engineer experienced in detecting malware attacks using Wireshark.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":46,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1794414067,"_task_hash":-1725650267,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"Robotics","start":3,"end":11,"id":2},{"text":"Engineer","start":12,"end":20,"id":3},{"text":"experienced","start":21,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"detecting","start":36,"end":45,"id":6},{"text":"malware","start":46,"end":53,"id":7},{"text":"attacks","start":54,"end":61,"id":8},{"text":"using","start":62,"end":67,"id":9},{"text":"Wireshark","start":68,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Immediate opening for Autonomous Systems Engineer.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-597487692,"_task_hash":1798677782,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Autonomous","start":22,"end":32,"id":3},{"text":"Systems","start":33,"end":40,"id":4},{"text":"Engineer","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} -{"text":"Required skills: Splunk, Customer Service, TOGAF certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":43,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-783739186,"_task_hash":-344535861,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Customer","start":25,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":",","start":41,"end":42,"id":7},{"text":"TOGAF","start":43,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} -{"text":"Lead Security Director managing Product Strategy and Computer Vision initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1201132838,"_task_hash":2042293184,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Director","start":14,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"Product","start":32,"end":39,"id":4},{"text":"Strategy","start":40,"end":48,"id":5},{"text":"and","start":49,"end":52,"id":6},{"text":"Computer","start":53,"end":61,"id":7},{"text":"Vision","start":62,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} -{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} -{"text":"Accomplished IT Solutions Architect specializing in Remote Support Tools and AWS Security.","spans":[{"start":13,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1109085814,"_task_hash":574276668,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Solutions","start":16,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Remote","start":52,"end":58,"id":6},{"text":"Support","start":59,"end":66,"id":7},{"text":"Tools","start":67,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"AWS","start":77,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Identity & Access Management Expert with hands-on experience in Nessus, Splunk, and Cloud Access Security Broker.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13},{"start":84,"end":112,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-190648664,"_task_hash":-38965933,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"hands","start":41,"end":46,"id":6},{"text":"-","start":46,"end":47,"id":7},{"text":"on","start":47,"end":49,"id":8},{"text":"experience","start":50,"end":60,"id":9},{"text":"in","start":61,"end":63,"id":10},{"text":"Nessus","start":64,"end":70,"id":11},{"text":",","start":70,"end":71,"id":12},{"text":"Splunk","start":72,"end":78,"id":13},{"text":",","start":78,"end":79,"id":14},{"text":"and","start":80,"end":83,"id":15},{"text":"Cloud","start":84,"end":89,"id":16},{"text":"Access","start":90,"end":96,"id":17},{"text":"Security","start":97,"end":105,"id":18},{"text":"Broker","start":106,"end":112,"id":19},{"text":".","start":112,"end":113,"id":20}]} -{"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} -{"text":"Certified NIST RMF working as Security Tester, focused on Physical Security and XXE prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":58,"end":75,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":80,"end":83,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-779515662,"_task_hash":2120551588,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Security","start":30,"end":38,"id":5},{"text":"Tester","start":39,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"focused","start":47,"end":54,"id":8},{"text":"on","start":55,"end":57,"id":9},{"text":"Physical","start":58,"end":66,"id":10},{"text":"Security","start":67,"end":75,"id":11},{"text":"and","start":76,"end":79,"id":12},{"text":"XXE","start":80,"end":83,"id":13},{"text":"prevention","start":84,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} -{"text":"Anti-Phishing Specialist professional with 3+ years implementing EDR Platforms and managing ML Lifecycle Management programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":65,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":857789555,"_task_hash":-1431808319,"tokens":[{"text":"Anti","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"Phishing","start":5,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"professional","start":25,"end":37,"id":4},{"text":"with","start":38,"end":42,"id":5},{"text":"3","start":43,"end":44,"id":6},{"text":"+","start":44,"end":45,"id":7},{"text":"years","start":46,"end":51,"id":8},{"text":"implementing","start":52,"end":64,"id":9},{"text":"EDR","start":65,"end":68,"id":10},{"text":"Platforms","start":69,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"managing","start":83,"end":91,"id":13},{"text":"ML","start":92,"end":94,"id":14},{"text":"Lifecycle","start":95,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":"programs","start":116,"end":124,"id":17},{"text":".","start":124,"end":125,"id":18}]} -{"text":"Hiring Digital Forensics Investigator for URL Analysis and Supply Chain Attack detection.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":78,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":56341108,"_task_hash":317276067,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Digital","start":7,"end":14,"id":1},{"text":"Forensics","start":15,"end":24,"id":2},{"text":"Investigator","start":25,"end":37,"id":3},{"text":"for","start":38,"end":41,"id":4},{"text":"URL","start":42,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":"and","start":55,"end":58,"id":7},{"text":"Supply","start":59,"end":65,"id":8},{"text":"Chain","start":66,"end":71,"id":9},{"text":"Attack","start":72,"end":78,"id":10},{"text":"detection","start":79,"end":88,"id":11},{"text":".","start":88,"end":89,"id":12}]} -{"text":"FISMA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1159449825,"_task_hash":869222594,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} -{"text":"Infrastructure Security Engineer experienced in detecting APT attacks using EDR Platforms.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":58,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":530715541,"_task_hash":-1313114088,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"experienced","start":33,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"detecting","start":48,"end":57,"id":5},{"text":"APT","start":58,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"EDR","start":76,"end":79,"id":9},{"text":"Platforms","start":80,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Security Analyst with GIAC certification, expert in Autopsy.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1230249912,"_task_hash":-848431223,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"GIAC","start":22,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Autopsy","start":52,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} +{"text":"Seeking AI Ethics Specialist with 10+ years experience in Hardware Troubleshooting and EnCase.","spans":[{"start":8,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":87,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1788333870,"_task_hash":348604532,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Ethics","start":11,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"with","start":29,"end":33,"id":4},{"text":"10","start":34,"end":36,"id":5},{"text":"+","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"experience","start":44,"end":54,"id":8},{"text":"in","start":55,"end":57,"id":9},{"text":"Hardware","start":58,"end":66,"id":10},{"text":"Troubleshooting","start":67,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"EnCase","start":87,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} +{"text":"GCP required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-724780022,"_task_hash":-1733528560,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} +{"text":"Cloud Security Engineer with CASP+ certification, expert in Wireshark.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":34,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":60,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1615544001,"_task_hash":1038091401,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"CASP+","start":29,"end":34,"id":4},{"text":"certification","start":35,"end":48,"id":5},{"text":",","start":48,"end":49,"id":6},{"text":"expert","start":50,"end":56,"id":7},{"text":"in","start":57,"end":59,"id":8},{"text":"Wireshark","start":60,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} +{"text":"Responsible for SAML operations and maintenance.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-716743704,"_task_hash":1787153156,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"SAML","start":16,"end":20,"id":2},{"text":"operations","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"maintenance","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} +{"text":"DevSecOps Engineer needed for enterprise security team.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1867819265,"_task_hash":-81217904,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"needed","start":19,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"team","start":50,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} +{"text":"Required: STIX/TAXII, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1492126283,"_task_hash":-836102027,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"STIX","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"TAXII","start":15,"end":20,"id":4},{"text":",","start":20,"end":21,"id":5},{"text":"Metasploit","start":22,"end":32,"id":6},{"text":",","start":32,"end":33,"id":7},{"text":"and","start":34,"end":37,"id":8},{"text":"OWASP","start":38,"end":43,"id":9},{"text":"Top","start":44,"end":47,"id":10},{"text":"10","start":48,"end":50,"id":11},{"text":"expertise","start":51,"end":60,"id":12},{"text":".","start":60,"end":61,"id":13}]} +{"text":"Developed playbooks for cryptominer response.","spans":[{"start":24,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-562202339,"_task_hash":1130460438,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"cryptominer","start":24,"end":35,"id":3},{"text":"response","start":36,"end":44,"id":4},{"text":".","start":44,"end":45,"id":5}]} +{"text":"Compliance Manager with expertise in NIST Framework compliance and Zero Trust operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":820663561,"_task_hash":913147242,"tokens":[{"text":"Compliance","start":0,"end":10,"id":0},{"text":"Manager","start":11,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"expertise","start":24,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"compliance","start":52,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"Zero","start":67,"end":71,"id":9},{"text":"Trust","start":72,"end":77,"id":10},{"text":"operations","start":78,"end":88,"id":11},{"text":".","start":88,"end":89,"id":12}]} +{"text":"Accomplished IT Network Administrator specializing in Privacy by Design and Security Strategy.","spans":[{"start":13,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":54,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":76,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1595560218,"_task_hash":76904998,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Network","start":16,"end":23,"id":2},{"text":"Administrator","start":24,"end":37,"id":3},{"text":"specializing","start":38,"end":50,"id":4},{"text":"in","start":51,"end":53,"id":5},{"text":"Privacy","start":54,"end":61,"id":6},{"text":"by","start":62,"end":64,"id":7},{"text":"Design","start":65,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Security","start":76,"end":84,"id":10},{"text":"Strategy","start":85,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Cybersecurity Insurance Expert with expertise in OWASP Top 10 compliance and YARA Rules operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-427303837,"_task_hash":1336087293,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Insurance","start":14,"end":23,"id":1},{"text":"Expert","start":24,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"expertise","start":36,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"OWASP","start":49,"end":54,"id":6},{"text":"Top","start":55,"end":58,"id":7},{"text":"10","start":59,"end":61,"id":8},{"text":"compliance","start":62,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"YARA","start":77,"end":81,"id":11},{"text":"Rules","start":82,"end":87,"id":12},{"text":"operations","start":88,"end":98,"id":13},{"text":".","start":98,"end":99,"id":14}]} +{"text":"Immediate opening for Cryptography Expert.","spans":[{"start":22,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1653557384,"_task_hash":144541370,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cryptography","start":22,"end":34,"id":3},{"text":"Expert","start":35,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} +{"text":"Required skills: SIEM Operations, Terraform, GDPR certification.","spans":[{"start":17,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":34,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":366393888,"_task_hash":-423753474,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":"Operations","start":22,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"Terraform","start":34,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"GDPR","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} +{"text":"Mentored junior engineers in Malware Analysis.","spans":[{"start":29,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":797334056,"_task_hash":255173589,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Malware","start":29,"end":36,"id":4},{"text":"Analysis","start":37,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} +{"text":"Immediate opening for Application Security Specialist.","spans":[{"start":22,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":593446392,"_task_hash":-220382910,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Application","start":22,"end":33,"id":3},{"text":"Security","start":34,"end":42,"id":4},{"text":"Specialist","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} +{"text":"Required skills: Splunk, User Behavior Analysis, SOC 2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":49,"end":54,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1463325865,"_task_hash":-1898347654,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"User","start":25,"end":29,"id":5},{"text":"Behavior","start":30,"end":38,"id":6},{"text":"Analysis","start":39,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"SOC","start":49,"end":52,"id":9},{"text":"2","start":53,"end":54,"id":10},{"text":"certification","start":55,"end":68,"id":11},{"text":".","start":68,"end":69,"id":12}]} +{"text":"Join our team as Program Manager!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-300991477,"_task_hash":319892983,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Program","start":17,"end":24,"id":4},{"text":"Manager","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} +{"text":"Must know CrowdStrike, Splunk, and NIST Framework.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1557234610,"_task_hash":-1728313749,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"NIST","start":35,"end":39,"id":7},{"text":"Framework","start":40,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} +{"text":"DNS/DHCP certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-554524723,"_task_hash":1346368627,"tokens":[{"text":"DNS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DHCP","start":4,"end":8,"id":2},{"text":"certification","start":9,"end":22,"id":3},{"text":"a","start":23,"end":24,"id":4},{"text":"plus","start":25,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} +{"text":"Hiring AI/ML Product Manager for Psychology and adware detection.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":33,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":48,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":31090923,"_task_hash":1121998727,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Product","start":13,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"for","start":29,"end":32,"id":6},{"text":"Psychology","start":33,"end":43,"id":7},{"text":"and","start":44,"end":47,"id":8},{"text":"adware","start":48,"end":54,"id":9},{"text":"detection","start":55,"end":64,"id":10},{"text":".","start":64,"end":65,"id":11}]} +{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"DevOps Architect professional with 3++ years implementing Metasploit and managing Remote Support Tools programs.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":58,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1675601226,"_task_hash":992584991,"tokens":[{"text":"DevOps","start":0,"end":6,"id":0},{"text":"Architect","start":7,"end":16,"id":1},{"text":"professional","start":17,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"3++","start":35,"end":38,"id":4},{"text":"years","start":39,"end":44,"id":5},{"text":"implementing","start":45,"end":57,"id":6},{"text":"Metasploit","start":58,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Remote","start":82,"end":88,"id":10},{"text":"Support","start":89,"end":96,"id":11},{"text":"Tools","start":97,"end":102,"id":12},{"text":"programs","start":103,"end":111,"id":13},{"text":".","start":111,"end":112,"id":14}]} +{"text":"Senior Technology Manager skilled in Business Analysis, Secret Management, and Security Tools.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2099725091,"_task_hash":-1102378120,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technology","start":7,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Business","start":37,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"Secret","start":56,"end":62,"id":8},{"text":"Management","start":63,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"Security","start":79,"end":87,"id":12},{"text":"Tools","start":88,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} +{"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} +{"text":"Experienced Cyber Operations Manager specializing in Supply Chain Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-914607811,"_task_hash":-40199543,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Operations","start":18,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Supply","start":53,"end":59,"id":6},{"text":"Chain","start":60,"end":65,"id":7},{"text":"Security","start":66,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} +{"text":"Proficient in EDR Tools and EDR Platforms.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":41,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1306359697,"_task_hash":1092743285,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"EDR","start":28,"end":31,"id":5},{"text":"Platforms","start":32,"end":41,"id":6},{"text":".","start":41,"end":42,"id":7}]} +{"text":"Looking for Network Security Architect to lead Container Registry Security initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":595270547,"_task_hash":1795433237,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Architect","start":29,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Container","start":47,"end":56,"id":7},{"text":"Registry","start":57,"end":65,"id":8},{"text":"Security","start":66,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} +{"text":"Must have EDR Platforms experience and NIST Framework knowledge.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1390606848,"_task_hash":1171752415,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":"experience","start":24,"end":34,"id":4},{"text":"and","start":35,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"knowledge","start":54,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Release Manager with hands-on experience in SIEM, EDR Tools, and Cloud Security Architecture.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":48,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":50,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":65,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1136955115,"_task_hash":-451709780,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"SIEM","start":44,"end":48,"id":8},{"text":",","start":48,"end":49,"id":9},{"text":"EDR","start":50,"end":53,"id":10},{"text":"Tools","start":54,"end":59,"id":11},{"text":",","start":59,"end":60,"id":12},{"text":"and","start":61,"end":64,"id":13},{"text":"Cloud","start":65,"end":70,"id":14},{"text":"Security","start":71,"end":79,"id":15},{"text":"Architecture","start":80,"end":92,"id":16},{"text":".","start":92,"end":93,"id":17}]} {"text":"Holds C++.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":526977190,"_task_hash":-1557661950,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} -{"text":"We need a Cryptographic Engineer skilled in CSRF prevention and spyware analysis using Metasploit.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":44,"end":48,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":64,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":87,"end":97,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-673593938,"_task_hash":-1050807372,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cryptographic","start":10,"end":23,"id":3},{"text":"Engineer","start":24,"end":32,"id":4},{"text":"skilled","start":33,"end":40,"id":5},{"text":"in","start":41,"end":43,"id":6},{"text":"CSRF","start":44,"end":48,"id":7},{"text":"prevention","start":49,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"spyware","start":64,"end":71,"id":10},{"text":"analysis","start":72,"end":80,"id":11},{"text":"using","start":81,"end":86,"id":12},{"text":"Metasploit","start":87,"end":97,"id":13},{"text":".","start":97,"end":98,"id":14}]} -{"text":"Lead Computer Forensics Investigator managing Grafana and Replication initiatives.","spans":[{"start":5,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":46,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-552827263,"_task_hash":-338070767,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Computer","start":5,"end":13,"id":1},{"text":"Forensics","start":14,"end":23,"id":2},{"text":"Investigator","start":24,"end":36,"id":3},{"text":"managing","start":37,"end":45,"id":4},{"text":"Grafana","start":46,"end":53,"id":5},{"text":"and","start":54,"end":57,"id":6},{"text":"Replication","start":58,"end":69,"id":7},{"text":"initiatives","start":70,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} -{"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} -{"text":"Seeking CTI Analyst with 3+ years experience in Audit and Database Management.","spans":[{"start":8,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1305089989,"_task_hash":-346214418,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"CTI","start":8,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"with","start":20,"end":24,"id":3},{"text":"3","start":25,"end":26,"id":4},{"text":"+","start":26,"end":27,"id":5},{"text":"years","start":28,"end":33,"id":6},{"text":"experience","start":34,"end":44,"id":7},{"text":"in","start":45,"end":47,"id":8},{"text":"Audit","start":48,"end":53,"id":9},{"text":"and","start":54,"end":57,"id":10},{"text":"Database","start":58,"end":66,"id":11},{"text":"Management","start":67,"end":77,"id":12},{"text":".","start":77,"end":78,"id":13}]} -{"text":"ISO 22301 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":824458430,"_task_hash":1338890337,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} -{"text":"Experienced IT Department Manager specializing in Security Scanning.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":312317294,"_task_hash":1659375320,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Scanning","start":59,"end":67,"id":7},{"text":".","start":67,"end":68,"id":8}]} -{"text":"Proficient in Nessus and Wireshark.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":659279639,"_task_hash":400504924,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Wireshark","start":25,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} -{"text":"Senior Anti-Phishing Specialist skilled in Packet Analysis, Privacy Frameworks, and Service Mesh Security.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":43,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":60,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":84,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-658030376,"_task_hash":2138689841,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Anti","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"Phishing","start":12,"end":20,"id":3},{"text":"Specialist","start":21,"end":31,"id":4},{"text":"skilled","start":32,"end":39,"id":5},{"text":"in","start":40,"end":42,"id":6},{"text":"Packet","start":43,"end":49,"id":7},{"text":"Analysis","start":50,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"Privacy","start":60,"end":67,"id":10},{"text":"Frameworks","start":68,"end":78,"id":11},{"text":",","start":78,"end":79,"id":12},{"text":"and","start":80,"end":83,"id":13},{"text":"Service","start":84,"end":91,"id":14},{"text":"Mesh","start":92,"end":96,"id":15},{"text":"Security","start":97,"end":105,"id":16},{"text":".","start":105,"end":106,"id":17}]} -{"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Experienced IT Department Manager specializing in Runtime Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-371951751,"_task_hash":1179138797,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Runtime","start":50,"end":57,"id":6},{"text":"Security","start":58,"end":66,"id":7},{"text":".","start":66,"end":67,"id":8}]} -{"text":"Proficient in SIEM and Nessus.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1177038604,"_task_hash":1302057457,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Nessus","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} -{"text":"Looking for Endpoint Security Engineer to lead Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1797885356,"_task_hash":-924742124,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Endpoint","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"Architecture","start":56,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} -{"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} -{"text":"Experienced Application Security Engineer specializing in API Security.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1868467689,"_task_hash":-2063311556,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Application","start":12,"end":23,"id":1},{"text":"Security","start":24,"end":32,"id":2},{"text":"Engineer","start":33,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"API","start":58,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} -{"text":"Proficient in Splunk and SIEM.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1369442593,"_task_hash":1934435184,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} -{"text":"Immediate opening for Security Architect.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-414517898,"_task_hash":-2011743341,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Architect","start":31,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} -{"text":"Required skills: CrowdStrike, Solution Architecture, PRINCE2 certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":53,"end":60,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1054653285,"_task_hash":300786099,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Solution","start":30,"end":38,"id":5},{"text":"Architecture","start":39,"end":51,"id":6},{"text":",","start":51,"end":52,"id":7},{"text":"PRINCE2","start":53,"end":60,"id":8},{"text":"certification","start":61,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} -{"text":"Security Defense Analyst with expertise in OWASP Top 10 compliance and Phishing Ops operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":71,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":946099774,"_task_hash":-1889771119,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Analyst","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"OWASP","start":43,"end":48,"id":6},{"text":"Top","start":49,"end":52,"id":7},{"text":"10","start":53,"end":55,"id":8},{"text":"compliance","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"Phishing","start":71,"end":79,"id":11},{"text":"Ops","start":80,"end":83,"id":12},{"text":"operations","start":84,"end":94,"id":13},{"text":".","start":94,"end":95,"id":14}]} -{"text":"Identity Management Engineer professional with 7+ years implementing Wireshark and managing Terraform programs.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":69,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1606958766,"_task_hash":882389241,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"Management","start":9,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"professional","start":29,"end":41,"id":3},{"text":"with","start":42,"end":46,"id":4},{"text":"7","start":47,"end":48,"id":5},{"text":"+","start":48,"end":49,"id":6},{"text":"years","start":50,"end":55,"id":7},{"text":"implementing","start":56,"end":68,"id":8},{"text":"Wireshark","start":69,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"Terraform","start":92,"end":101,"id":12},{"text":"programs","start":102,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} -{"text":"Seeking Emergency Response Manager with 5++ years experience in Memory Forensics and Vendor Evaluation.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1632682232,"_task_hash":2139675679,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Emergency","start":8,"end":17,"id":1},{"text":"Response","start":18,"end":26,"id":2},{"text":"Manager","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Memory","start":64,"end":70,"id":9},{"text":"Forensics","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Vendor","start":85,"end":91,"id":12},{"text":"Evaluation","start":92,"end":102,"id":13},{"text":".","start":102,"end":103,"id":14}]} -{"text":"TOGAF required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":190519494,"_task_hash":-1135331299,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} -{"text":"We need a QA Engineer skilled in Command Injection prevention and ransomware analysis using Splunk.","spans":[{"start":10,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":33,"end":50,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":66,"end":76,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":92,"end":98,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1246329902,"_task_hash":360578031,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"QA","start":10,"end":12,"id":3},{"text":"Engineer","start":13,"end":21,"id":4},{"text":"skilled","start":22,"end":29,"id":5},{"text":"in","start":30,"end":32,"id":6},{"text":"Command","start":33,"end":40,"id":7},{"text":"Injection","start":41,"end":50,"id":8},{"text":"prevention","start":51,"end":61,"id":9},{"text":"and","start":62,"end":65,"id":10},{"text":"ransomware","start":66,"end":76,"id":11},{"text":"analysis","start":77,"end":85,"id":12},{"text":"using","start":86,"end":91,"id":13},{"text":"Splunk","start":92,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} -{"text":"Senior Malware Reverse Engineer skilled in Stakeholder Management, Model Versioning, and Security Culture.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":89,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1043238395,"_task_hash":-2060402775,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Malware","start":7,"end":14,"id":1},{"text":"Reverse","start":15,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Stakeholder","start":43,"end":54,"id":6},{"text":"Management","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Model","start":67,"end":72,"id":9},{"text":"Versioning","start":73,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"Culture","start":98,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} -{"text":"CCPA certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2126018288,"_task_hash":-1395112851,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} -{"text":"Privacy Officer role available: Remote Support Tools experience required, Database Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":74,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1734485722,"_task_hash":1457814816,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Officer","start":8,"end":15,"id":1},{"text":"role","start":16,"end":20,"id":2},{"text":"available","start":21,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"Remote","start":32,"end":38,"id":5},{"text":"Support","start":39,"end":46,"id":6},{"text":"Tools","start":47,"end":52,"id":7},{"text":"experience","start":53,"end":63,"id":8},{"text":"required","start":64,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Database","start":74,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":"knowledge","start":92,"end":101,"id":13},{"text":"essential","start":102,"end":111,"id":14},{"text":".","start":111,"end":112,"id":15}]} -{"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Technical Solutions Architect needed for enterprise security team.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-848380258,"_task_hash":-1007982442,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Solutions","start":10,"end":19,"id":1},{"text":"Architect","start":20,"end":29,"id":2},{"text":"needed","start":30,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"enterprise","start":41,"end":51,"id":5},{"text":"security","start":52,"end":60,"id":6},{"text":"team","start":61,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} -{"text":"Required: GDPR, Nessus, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1255872532,"_task_hash":-520021751,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Nessus","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":"expertise","start":41,"end":50,"id":10},{"text":".","start":50,"end":51,"id":11}]} -{"text":"Insider Threat Analyst opportunity: Lead Cybersecurity program, implement OWASP Top 10, manage Mathematics operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":41,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1487542894,"_task_hash":-1931596651,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Analyst","start":15,"end":22,"id":2},{"text":"opportunity","start":23,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"Lead","start":36,"end":40,"id":5},{"text":"Cybersecurity","start":41,"end":54,"id":6},{"text":"program","start":55,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"implement","start":64,"end":73,"id":9},{"text":"OWASP","start":74,"end":79,"id":10},{"text":"Top","start":80,"end":83,"id":11},{"text":"10","start":84,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"Mathematics","start":95,"end":106,"id":15},{"text":"operations","start":107,"end":117,"id":16},{"text":".","start":117,"end":118,"id":17}]} -{"text":"Senior IAM Engineer skilled in Build Tools, Windows/Mac Support, and Application Security Architecture.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11},{"start":69,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1203031739,"_task_hash":1793382399,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"skilled","start":20,"end":27,"id":3},{"text":"in","start":28,"end":30,"id":4},{"text":"Build","start":31,"end":36,"id":5},{"text":"Tools","start":37,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"Windows","start":44,"end":51,"id":8},{"text":"/","start":51,"end":52,"id":9},{"text":"Mac","start":52,"end":55,"id":10},{"text":"Support","start":56,"end":63,"id":11},{"text":",","start":63,"end":64,"id":12},{"text":"and","start":65,"end":68,"id":13},{"text":"Application","start":69,"end":80,"id":14},{"text":"Security","start":81,"end":89,"id":15},{"text":"Architecture","start":90,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} -{"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Analytics Specialist with expertise in OWASP Top 10 compliance and Framework Design operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1472802493,"_task_hash":-1240698101,"tokens":[{"text":"Analytics","start":0,"end":9,"id":0},{"text":"Specialist","start":10,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"expertise","start":26,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"OWASP","start":39,"end":44,"id":5},{"text":"Top","start":45,"end":48,"id":6},{"text":"10","start":49,"end":51,"id":7},{"text":"compliance","start":52,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"Framework","start":67,"end":76,"id":10},{"text":"Design","start":77,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} -{"text":"Hiring Container Security Expert for AI Regulation and Man-in-the-Middle detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":72,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1024865759,"_task_hash":110508288,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Container","start":7,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Expert","start":26,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"AI","start":37,"end":39,"id":5},{"text":"Regulation","start":40,"end":50,"id":6},{"text":"and","start":51,"end":54,"id":7},{"text":"Man","start":55,"end":58,"id":8},{"text":"-","start":58,"end":59,"id":9},{"text":"in","start":59,"end":61,"id":10},{"text":"-","start":61,"end":62,"id":11},{"text":"the","start":62,"end":65,"id":12},{"text":"-","start":65,"end":66,"id":13},{"text":"Middle","start":66,"end":72,"id":14},{"text":"detection","start":73,"end":82,"id":15},{"text":".","start":82,"end":83,"id":16}]} -{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Hiring Industrial IoT Security Specialist for Wireframing and Supply Chain Attack detection.","spans":[{"start":7,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":46,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-163062240,"_task_hash":797017760,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Industrial","start":7,"end":17,"id":1},{"text":"IoT","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Specialist","start":31,"end":41,"id":4},{"text":"for","start":42,"end":45,"id":5},{"text":"Wireframing","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Supply","start":62,"end":68,"id":8},{"text":"Chain","start":69,"end":74,"id":9},{"text":"Attack","start":75,"end":81,"id":10},{"text":"detection","start":82,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} -{"text":"COPPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-467222272,"_task_hash":59755085,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} -{"text":"Join our team as Social Engineering Tester!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1577165343,"_task_hash":-1784659638,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Social","start":17,"end":23,"id":4},{"text":"Engineering","start":24,"end":35,"id":5},{"text":"Tester","start":36,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} -{"text":"Must know Metasploit, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":22,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":34,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1591159605,"_task_hash":-2075389288,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":",","start":20,"end":21,"id":3},{"text":"Nessus","start":22,"end":28,"id":4},{"text":",","start":28,"end":29,"id":5},{"text":"and","start":30,"end":33,"id":6},{"text":"OWASP","start":34,"end":39,"id":7},{"text":"Top","start":40,"end":43,"id":8},{"text":"10","start":44,"end":46,"id":9},{"text":".","start":46,"end":47,"id":10}]} -{"text":"PRINCE2 certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":439813503,"_task_hash":1835233461,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certification","start":8,"end":21,"id":1},{"text":"a","start":22,"end":23,"id":2},{"text":"plus","start":24,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"QA Analyst needed for enterprise security team.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-584819457,"_task_hash":-518739282,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Analyst","start":3,"end":10,"id":1},{"text":"needed","start":11,"end":17,"id":2},{"text":"for","start":18,"end":21,"id":3},{"text":"enterprise","start":22,"end":32,"id":4},{"text":"security","start":33,"end":41,"id":5},{"text":"team","start":42,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} -{"text":"Required: ISO 31000, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-23046429,"_task_hash":1737669960,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"31000","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"ELK","start":21,"end":24,"id":5},{"text":"Stack","start":25,"end":30,"id":6},{"text":",","start":30,"end":31,"id":7},{"text":"and","start":32,"end":35,"id":8},{"text":"OWASP","start":36,"end":41,"id":9},{"text":"Top","start":42,"end":45,"id":10},{"text":"10","start":46,"end":48,"id":11},{"text":"expertise","start":49,"end":58,"id":12},{"text":".","start":58,"end":59,"id":13}]} -{"text":"Immediate opening for Hardware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-787263074,"_task_hash":-216303877,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Hardware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} -{"text":"Required skills: EDR Platforms, Media Relations, TLS/SSL certification.","spans":[{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":49,"end":56,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1416774968,"_task_hash":-1963616318,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Platforms","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"Media","start":32,"end":37,"id":6},{"text":"Relations","start":38,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"TLS","start":49,"end":52,"id":9},{"text":"/","start":52,"end":53,"id":10},{"text":"SSL","start":53,"end":56,"id":11},{"text":"certification","start":57,"end":70,"id":12},{"text":".","start":70,"end":71,"id":13}]} -{"text":"Seeking Product Security Engineer with 7+ years experience in Message Queues and CCTV Systems.","spans":[{"start":8,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":2119018111,"_task_hash":930113890,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Product","start":8,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"with","start":34,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"experience","start":48,"end":58,"id":8},{"text":"in","start":59,"end":61,"id":9},{"text":"Message","start":62,"end":69,"id":10},{"text":"Queues","start":70,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"CCTV","start":81,"end":85,"id":13},{"text":"Systems","start":86,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} -{"text":"OSINT required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1609453577,"_task_hash":-644759626,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} -{"text":"Senior Threat Detection Specialist position: 3 years minimum, expert in IOC Analysis, Privacy Engineering, and Security Awareness Platforms.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":72,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":111,"end":139,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-2096425349,"_task_hash":1140006178,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Threat","start":7,"end":13,"id":1},{"text":"Detection","start":14,"end":23,"id":2},{"text":"Specialist","start":24,"end":34,"id":3},{"text":"position","start":35,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"3","start":45,"end":46,"id":6},{"text":"years","start":47,"end":52,"id":7},{"text":"minimum","start":53,"end":60,"id":8},{"text":",","start":60,"end":61,"id":9},{"text":"expert","start":62,"end":68,"id":10},{"text":"in","start":69,"end":71,"id":11},{"text":"IOC","start":72,"end":75,"id":12},{"text":"Analysis","start":76,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"Privacy","start":86,"end":93,"id":15},{"text":"Engineering","start":94,"end":105,"id":16},{"text":",","start":105,"end":106,"id":17},{"text":"and","start":107,"end":110,"id":18},{"text":"Security","start":111,"end":119,"id":19},{"text":"Awareness","start":120,"end":129,"id":20},{"text":"Platforms","start":130,"end":139,"id":21},{"text":".","start":139,"end":140,"id":22}]} -{"text":"We need a Disaster Recovery Specialist skilled in SQL Injection prevention and spyware analysis using Splunk.","spans":[{"start":10,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":50,"end":63,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":86,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":102,"end":108,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1964696388,"_task_hash":662300423,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Disaster","start":10,"end":18,"id":3},{"text":"Recovery","start":19,"end":27,"id":4},{"text":"Specialist","start":28,"end":38,"id":5},{"text":"skilled","start":39,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"SQL","start":50,"end":53,"id":8},{"text":"Injection","start":54,"end":63,"id":9},{"text":"prevention","start":64,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"spyware","start":79,"end":86,"id":12},{"text":"analysis","start":87,"end":95,"id":13},{"text":"using","start":96,"end":101,"id":14},{"text":"Splunk","start":102,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} +{"text":"Immediate opening for Firmware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1376834588,"_task_hash":-102165587,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Firmware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Required skills: Nessus, Governance, ROS certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1591218166,"_task_hash":586434627,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Governance","start":25,"end":35,"id":5},{"text":",","start":35,"end":36,"id":6},{"text":"ROS","start":37,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Assessed compliance with PCI DSS 1.1.","spans":[{"start":25,"end":36,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1628150606,"_task_hash":1357999455,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"compliance","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"PCI","start":25,"end":28,"id":3},{"text":"DSS","start":29,"end":32,"id":4},{"text":"1.1","start":33,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} +{"text":"Remediated gaps identified in ISO 27001 A.12.1 assessment.","spans":[{"start":30,"end":46,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1455018914,"_task_hash":-1917523200,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"ISO","start":30,"end":33,"id":4},{"text":"27001","start":34,"end":39,"id":5},{"text":"A.12.1","start":40,"end":46,"id":6},{"text":"assessment","start":47,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} +{"text":"Immediate opening for Cyber Defense Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-690759821,"_task_hash":774450881,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cyber","start":22,"end":27,"id":3},{"text":"Defense","start":28,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} +{"text":"Required skills: ELK Stack, Audit Management, GCP certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":496713111,"_task_hash":-1906825591,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Audit","start":28,"end":33,"id":6},{"text":"Management","start":34,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"GCP","start":46,"end":49,"id":9},{"text":"certification","start":50,"end":63,"id":10},{"text":".","start":63,"end":64,"id":11}]} +{"text":"Immediate opening for Machine Learning Operations Engineer.","spans":[{"start":22,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1592255475,"_task_hash":-1234553566,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Machine","start":22,"end":29,"id":3},{"text":"Learning","start":30,"end":38,"id":4},{"text":"Operations","start":39,"end":49,"id":5},{"text":"Engineer","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} +{"text":"Required skills: QRadar, Playbook Development, GDPR certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":51,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":983515082,"_task_hash":246061336,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"QRadar","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Playbook","start":25,"end":33,"id":5},{"text":"Development","start":34,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"GDPR","start":47,"end":51,"id":8},{"text":"certification","start":52,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} +{"text":"Expert in Purple Team best practices.","spans":[{"start":10,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-731413627,"_task_hash":1544798388,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Purple","start":10,"end":16,"id":2},{"text":"Team","start":17,"end":21,"id":3},{"text":"best","start":22,"end":26,"id":4},{"text":"practices","start":27,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Looking for Threat Analyst to lead Network Security Architecture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1963810898,"_task_hash":243527044,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Threat","start":12,"end":18,"id":2},{"text":"Analyst","start":19,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Network","start":35,"end":42,"id":6},{"text":"Security","start":43,"end":51,"id":7},{"text":"Architecture","start":52,"end":64,"id":8},{"text":"initiatives","start":65,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} -{"text":"DevSecOps Engineer needed for enterprise security team.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1867819265,"_task_hash":-81217904,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"needed","start":19,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"team","start":50,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} -{"text":"Required: STIX/TAXII, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1492126283,"_task_hash":-836102027,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"STIX","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"TAXII","start":15,"end":20,"id":4},{"text":",","start":20,"end":21,"id":5},{"text":"Metasploit","start":22,"end":32,"id":6},{"text":",","start":32,"end":33,"id":7},{"text":"and","start":34,"end":37,"id":8},{"text":"OWASP","start":38,"end":43,"id":9},{"text":"Top","start":44,"end":47,"id":10},{"text":"10","start":48,"end":50,"id":11},{"text":"expertise","start":51,"end":60,"id":12},{"text":".","start":60,"end":61,"id":13}]} -{"text":"Certified IDS/IPS working as Code Reviewer, focused on Email Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":55,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":74,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1117287645,"_task_hash":386808135,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Code","start":29,"end":33,"id":6},{"text":"Reviewer","start":34,"end":42,"id":7},{"text":",","start":42,"end":43,"id":8},{"text":"focused","start":44,"end":51,"id":9},{"text":"on","start":52,"end":54,"id":10},{"text":"Email","start":55,"end":60,"id":11},{"text":"Security","start":61,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Cross","start":74,"end":79,"id":14},{"text":"-","start":79,"end":80,"id":15},{"text":"Site","start":80,"end":84,"id":16},{"text":"Scripting","start":85,"end":94,"id":17},{"text":"prevention","start":95,"end":105,"id":18},{"text":".","start":105,"end":106,"id":19}]} -{"text":"AI Policy Specialist with hands-on experience in SIEM, ELK Stack, and Cloud Native Security.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":55,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":70,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1416263145,"_task_hash":1915343407,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"hands","start":26,"end":31,"id":4},{"text":"-","start":31,"end":32,"id":5},{"text":"on","start":32,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"SIEM","start":49,"end":53,"id":9},{"text":",","start":53,"end":54,"id":10},{"text":"ELK","start":55,"end":58,"id":11},{"text":"Stack","start":59,"end":64,"id":12},{"text":",","start":64,"end":65,"id":13},{"text":"and","start":66,"end":69,"id":14},{"text":"Cloud","start":70,"end":75,"id":15},{"text":"Native","start":76,"end":82,"id":16},{"text":"Security","start":83,"end":91,"id":17},{"text":".","start":91,"end":92,"id":18}]} -{"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} -{"text":"Experienced PM specializing in Email Gateway Security.","spans":[{"start":12,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":31,"end":53,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":696527191,"_task_hash":-2047869119,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"PM","start":12,"end":14,"id":1},{"text":"specializing","start":15,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"Email","start":31,"end":36,"id":4},{"text":"Gateway","start":37,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} -{"text":"Proficient in CrowdStrike and Nessus.","spans":[{"start":14,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1837103489,"_task_hash":693235503,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"CrowdStrike","start":14,"end":25,"id":2},{"text":"and","start":26,"end":29,"id":3},{"text":"Nessus","start":30,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} -{"text":"Content Marketing Specialist needed for enterprise security team.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1184693823,"_task_hash":696041599,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"needed","start":29,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"enterprise","start":40,"end":50,"id":5},{"text":"security","start":51,"end":59,"id":6},{"text":"team","start":60,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} -{"text":"Required: BDD/TDD, Nessus, and NIST Framework expertise.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":19,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1528274654,"_task_hash":-12450306,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"BDD","start":10,"end":13,"id":2},{"text":"/","start":13,"end":14,"id":3},{"text":"TDD","start":14,"end":17,"id":4},{"text":",","start":17,"end":18,"id":5},{"text":"Nessus","start":19,"end":25,"id":6},{"text":",","start":25,"end":26,"id":7},{"text":"and","start":27,"end":30,"id":8},{"text":"NIST","start":31,"end":35,"id":9},{"text":"Framework","start":36,"end":45,"id":10},{"text":"expertise","start":46,"end":55,"id":11},{"text":".","start":55,"end":56,"id":12}]} -{"text":"Security Vulnerability Analyst with hands-on experience in Burp Suite, Splunk, and Security.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":726599488,"_task_hash":-2014331586,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"hands","start":36,"end":41,"id":4},{"text":"-","start":41,"end":42,"id":5},{"text":"on","start":42,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Burp","start":59,"end":63,"id":9},{"text":"Suite","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Security","start":83,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} -{"text":"Holds RBAC.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1050074114,"_task_hash":896161982,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} -{"text":"Experienced Information Specialist specializing in Security Culture.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2070465964,"_task_hash":1039474500,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Information","start":12,"end":23,"id":1},{"text":"Specialist","start":24,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Security","start":51,"end":59,"id":5},{"text":"Culture","start":60,"end":67,"id":6},{"text":".","start":67,"end":68,"id":7}]} -{"text":"Proficient in SIEM Operations and SIEM Operations.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-805624968,"_task_hash":-2030563451,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":"Operations","start":39,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} -{"text":"Accomplished Security Monitoring Analyst specializing in Data Pipelines and Security Awareness Platforms.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-32440618,"_task_hash":-1272989664,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Monitoring","start":22,"end":32,"id":2},{"text":"Analyst","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Data","start":57,"end":61,"id":6},{"text":"Pipelines","start":62,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":"Awareness","start":85,"end":94,"id":10},{"text":"Platforms","start":95,"end":104,"id":11},{"text":".","start":104,"end":105,"id":12}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"IT Project Manager professional with 5++ years implementing QRadar and managing ETL programs.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":60,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":80,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-137095938,"_task_hash":-1794201956,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Project","start":3,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"professional","start":19,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"implementing","start":47,"end":59,"id":7},{"text":"QRadar","start":60,"end":66,"id":8},{"text":"and","start":67,"end":70,"id":9},{"text":"managing","start":71,"end":79,"id":10},{"text":"ETL","start":80,"end":83,"id":11},{"text":"programs","start":84,"end":92,"id":12},{"text":".","start":92,"end":93,"id":13}]} -{"text":"Immediate opening for DevOps Specialist.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1016738327,"_task_hash":-1715349065,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"DevOps","start":22,"end":28,"id":3},{"text":"Specialist","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} -{"text":"Required skills: ELK Stack, Android, SABSA certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":37,"end":42,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1954669909,"_task_hash":1060091812,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Android","start":28,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"SABSA","start":37,"end":42,"id":8},{"text":"certification","start":43,"end":56,"id":9},{"text":".","start":56,"end":57,"id":10}]} +{"text":"Implemented workaround for CVE-2024-0001 until patch available.","spans":[{"start":27,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1575485835,"_task_hash":-1856949250,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2024","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"0001","start":36,"end":40,"id":5},{"text":"until","start":41,"end":46,"id":6},{"text":"patch","start":47,"end":52,"id":7},{"text":"available","start":53,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} +{"text":"Reverse engineered CVE-2022-41040 exploit for threat intelligence.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-627144712,"_task_hash":387807061,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"engineered","start":8,"end":18,"id":1},{"text":"CVE-2022","start":19,"end":27,"id":2},{"text":"-","start":27,"end":28,"id":3},{"text":"41040","start":28,"end":33,"id":4},{"text":"exploit","start":34,"end":41,"id":5},{"text":"for","start":42,"end":45,"id":6},{"text":"threat","start":46,"end":52,"id":7},{"text":"intelligence","start":53,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} +{"text":"Presented Endpoint Security updates to leadership.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-328651494,"_task_hash":-141511980,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Endpoint","start":10,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"updates","start":28,"end":35,"id":3},{"text":"to","start":36,"end":38,"id":4},{"text":"leadership","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Content Marketing Specialist with 3+ years experience in Pipeline Automation, Secret Management, and Communication Skills.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":101,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1460147610,"_task_hash":-274277710,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"Pipeline","start":57,"end":65,"id":9},{"text":"Automation","start":66,"end":76,"id":10},{"text":",","start":76,"end":77,"id":11},{"text":"Secret","start":78,"end":84,"id":12},{"text":"Management","start":85,"end":95,"id":13},{"text":",","start":95,"end":96,"id":14},{"text":"and","start":97,"end":100,"id":15},{"text":"Communication","start":101,"end":114,"id":16},{"text":"Skills","start":115,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} +{"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} +{"text":"Senior IT Manager skilled in Compliance Standards, Server-Side Development, and Email Gateway Security.","spans":[{"start":7,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-616689712,"_task_hash":350562290,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"Manager","start":10,"end":17,"id":2},{"text":"skilled","start":18,"end":25,"id":3},{"text":"in","start":26,"end":28,"id":4},{"text":"Compliance","start":29,"end":39,"id":5},{"text":"Standards","start":40,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Server","start":51,"end":57,"id":8},{"text":"-","start":57,"end":58,"id":9},{"text":"Side","start":58,"end":62,"id":10},{"text":"Development","start":63,"end":74,"id":11},{"text":",","start":74,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"Email","start":80,"end":85,"id":14},{"text":"Gateway","start":86,"end":93,"id":15},{"text":"Security","start":94,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} +{"text":"TOGAF certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1190593017,"_task_hash":-644184999,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} +{"text":"We need a Full Stack Software Engineer skilled in Remote Code Execution prevention and APT analysis using Metasploit.","spans":[{"start":10,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":50,"end":71,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":11},{"start":87,"end":90,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":106,"end":116,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":548695799,"_task_hash":486792931,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Full","start":10,"end":14,"id":3},{"text":"Stack","start":15,"end":20,"id":4},{"text":"Software","start":21,"end":29,"id":5},{"text":"Engineer","start":30,"end":38,"id":6},{"text":"skilled","start":39,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Remote","start":50,"end":56,"id":9},{"text":"Code","start":57,"end":61,"id":10},{"text":"Execution","start":62,"end":71,"id":11},{"text":"prevention","start":72,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"APT","start":87,"end":90,"id":14},{"text":"analysis","start":91,"end":99,"id":15},{"text":"using","start":100,"end":105,"id":16},{"text":"Metasploit","start":106,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} +{"text":"Automated FISMA compliance monitoring.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":736121821,"_task_hash":-945665113,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"FISMA","start":10,"end":15,"id":1},{"text":"compliance","start":16,"end":26,"id":2},{"text":"monitoring","start":27,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"API Developer role available: RPO/RTO Planning experience required, Cybersecurity knowledge essential.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":68,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":272987220,"_task_hash":-1541044332,"tokens":[{"text":"API","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"role","start":14,"end":18,"id":2},{"text":"available","start":19,"end":28,"id":3},{"text":":","start":28,"end":29,"id":4},{"text":"RPO","start":30,"end":33,"id":5},{"text":"/","start":33,"end":34,"id":6},{"text":"RTO","start":34,"end":37,"id":7},{"text":"Planning","start":38,"end":46,"id":8},{"text":"experience","start":47,"end":57,"id":9},{"text":"required","start":58,"end":66,"id":10},{"text":",","start":66,"end":67,"id":11},{"text":"Cybersecurity","start":68,"end":81,"id":12},{"text":"knowledge","start":82,"end":91,"id":13},{"text":"essential","start":92,"end":101,"id":14},{"text":".","start":101,"end":102,"id":15}]} +{"text":"NIS2 familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-202128334,"_task_hash":-1609255822,"tokens":[{"text":"NIS2","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Presented Zero Trust updates to leadership.","spans":[{"start":10,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":677321852,"_task_hash":-1920601183,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Zero","start":10,"end":14,"id":1},{"text":"Trust","start":15,"end":20,"id":2},{"text":"updates","start":21,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"leadership","start":32,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} +{"text":"Certified NLP working as Project Manager, focused on Security Frameworks and Clickjacking prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1880065528,"_task_hash":-1366109314,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Project","start":25,"end":32,"id":4},{"text":"Manager","start":33,"end":40,"id":5},{"text":",","start":40,"end":41,"id":6},{"text":"focused","start":42,"end":49,"id":7},{"text":"on","start":50,"end":52,"id":8},{"text":"Security","start":53,"end":61,"id":9},{"text":"Frameworks","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Clickjacking","start":77,"end":89,"id":12},{"text":"prevention","start":90,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} +{"text":"Coordinated disclosure of CVE-2024-1234 with vendor.","spans":[{"start":26,"end":39,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1983476551,"_task_hash":-1461660378,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2024","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"1234","start":35,"end":39,"id":5},{"text":"with","start":40,"end":44,"id":6},{"text":"vendor","start":45,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} +{"text":"ML Platform Engineer opportunity: Lead Security Systems program, implement NIST Framework, manage Audit Management operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":75,"end":89,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":114,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-489124247,"_task_hash":-465791874,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Platform","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"Security","start":39,"end":47,"id":6},{"text":"Systems","start":48,"end":55,"id":7},{"text":"program","start":56,"end":63,"id":8},{"text":",","start":63,"end":64,"id":9},{"text":"implement","start":65,"end":74,"id":10},{"text":"NIST","start":75,"end":79,"id":11},{"text":"Framework","start":80,"end":89,"id":12},{"text":",","start":89,"end":90,"id":13},{"text":"manage","start":91,"end":97,"id":14},{"text":"Audit","start":98,"end":103,"id":15},{"text":"Management","start":104,"end":114,"id":16},{"text":"operations","start":115,"end":125,"id":17},{"text":".","start":125,"end":126,"id":18}]} +{"text":"DevSecOps Engineer with hands-on experience in ELK Stack, EDR Platforms, and Security Architecture.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":58,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":77,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":573732927,"_task_hash":-1498385821,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"ELK","start":47,"end":50,"id":8},{"text":"Stack","start":51,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"EDR","start":58,"end":61,"id":11},{"text":"Platforms","start":62,"end":71,"id":12},{"text":",","start":71,"end":72,"id":13},{"text":"and","start":73,"end":76,"id":14},{"text":"Security","start":77,"end":85,"id":15},{"text":"Architecture","start":86,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} +{"text":"Holds PRINCE2.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1460297396,"_task_hash":-885041091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PRINCE2","start":6,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Developed playbooks for hacktivist response.","spans":[{"start":24,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-820973283,"_task_hash":796582308,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"hacktivist","start":24,"end":34,"id":3},{"text":"response","start":35,"end":43,"id":4},{"text":".","start":43,"end":44,"id":5}]} +{"text":"Malware Researcher with 7 years experience in AI Market Trends, Switching, and Assessment Methodologies.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-40551218,"_task_hash":1028210847,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Researcher","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"7","start":24,"end":25,"id":3},{"text":"years","start":26,"end":31,"id":4},{"text":"experience","start":32,"end":42,"id":5},{"text":"in","start":43,"end":45,"id":6},{"text":"AI","start":46,"end":48,"id":7},{"text":"Market","start":49,"end":55,"id":8},{"text":"Trends","start":56,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"Switching","start":64,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Assessment","start":79,"end":89,"id":14},{"text":"Methodologies","start":90,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} +{"text":"Holds SLAM certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1691756040,"_task_hash":-1592429569,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SLAM","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Immediate opening for Front End Engineer.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":687271832,"_task_hash":-1109236410,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Front","start":22,"end":27,"id":3},{"text":"End","start":28,"end":31,"id":4},{"text":"Engineer","start":32,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} +{"text":"Required skills: CrowdStrike, Budget Planning, AWS certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1942064953,"_task_hash":1480341155,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Budget","start":30,"end":36,"id":5},{"text":"Planning","start":37,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"AWS","start":47,"end":50,"id":8},{"text":"certification","start":51,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} +{"text":"ML Research Scientist experienced in detecting ransomware attacks using CrowdStrike.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":44203192,"_task_hash":-464813632,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Research","start":3,"end":11,"id":1},{"text":"Scientist","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"CrowdStrike","start":72,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Looking for Network Security Engineer to lead Security Scanning initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-78234140,"_task_hash":1697654637,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"to","start":38,"end":40,"id":5},{"text":"lead","start":41,"end":45,"id":6},{"text":"Security","start":46,"end":54,"id":7},{"text":"Scanning","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} +{"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} +{"text":"QA Engineer professional with 7+ years implementing Burp Suite and managing Brand Communication programs.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":52,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-2138000124,"_task_hash":-584374959,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Engineer","start":3,"end":11,"id":1},{"text":"professional","start":12,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"7","start":30,"end":31,"id":4},{"text":"+","start":31,"end":32,"id":5},{"text":"years","start":33,"end":38,"id":6},{"text":"implementing","start":39,"end":51,"id":7},{"text":"Burp","start":52,"end":56,"id":8},{"text":"Suite","start":57,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"managing","start":67,"end":75,"id":11},{"text":"Brand","start":76,"end":81,"id":12},{"text":"Communication","start":82,"end":95,"id":13},{"text":"programs","start":96,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} +{"text":"Created YARA rules for Race Condition detection.","spans":[{"start":23,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-379445487,"_task_hash":-852151367,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Race","start":23,"end":27,"id":4},{"text":"Condition","start":28,"end":37,"id":5},{"text":"detection","start":38,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Cyber Operations Manager with hands-on experience in QRadar, Metasploit, and Network Security Architecture.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":61,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":77,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1059300965,"_task_hash":-286348287,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Operations","start":6,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"hands","start":30,"end":35,"id":4},{"text":"-","start":35,"end":36,"id":5},{"text":"on","start":36,"end":38,"id":6},{"text":"experience","start":39,"end":49,"id":7},{"text":"in","start":50,"end":52,"id":8},{"text":"QRadar","start":53,"end":59,"id":9},{"text":",","start":59,"end":60,"id":10},{"text":"Metasploit","start":61,"end":71,"id":11},{"text":",","start":71,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"Network","start":77,"end":84,"id":14},{"text":"Security","start":85,"end":93,"id":15},{"text":"Architecture","start":94,"end":106,"id":16},{"text":".","start":106,"end":107,"id":17}]} {"text":"Holds C/C++.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-840917921,"_task_hash":-1037521268,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":".","start":11,"end":12,"id":4}]} -{"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and SQL Server operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1343628236,"_task_hash":1810185313,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"SQL","start":82,"end":85,"id":13},{"text":"Server","start":86,"end":92,"id":14},{"text":"operations","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} -{"text":"Lead Cloud Security Analyst managing Quantitative Research and Kinematics initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1741886891,"_task_hash":-534428039,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cloud","start":5,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"managing","start":28,"end":36,"id":4},{"text":"Quantitative","start":37,"end":49,"id":5},{"text":"Research","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Kinematics","start":63,"end":73,"id":8},{"text":"initiatives","start":74,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} -{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} -{"text":"Seeking Autonomous Systems Engineer with 10++ years experience in Evidence Collection and Content Strategy.","spans":[{"start":8,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":66,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":90,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":597576979,"_task_hash":1243724796,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Autonomous","start":8,"end":18,"id":1},{"text":"Systems","start":19,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"10++","start":41,"end":45,"id":5},{"text":"years","start":46,"end":51,"id":6},{"text":"experience","start":52,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Evidence","start":66,"end":74,"id":9},{"text":"Collection","start":75,"end":85,"id":10},{"text":"and","start":86,"end":89,"id":11},{"text":"Content","start":90,"end":97,"id":12},{"text":"Strategy","start":98,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} -{"text":"HIPAA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370665845,"_task_hash":-1113010267,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} -{"text":"Lead Cyber Insurance Consultant managing Project Coordination and Ticketing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":591145128,"_task_hash":1345228390,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Insurance","start":11,"end":20,"id":2},{"text":"Consultant","start":21,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Project","start":41,"end":48,"id":5},{"text":"Coordination","start":49,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"Ticketing","start":66,"end":75,"id":8},{"text":"initiatives","start":76,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} -{"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} -{"text":"Senior Chief Privacy Officer skilled in PowerShell, Cisco, and Cloud Access Security Broker.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":52,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":537234154,"_task_hash":1750376172,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Chief","start":7,"end":12,"id":1},{"text":"Privacy","start":13,"end":20,"id":2},{"text":"Officer","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"PowerShell","start":40,"end":50,"id":6},{"text":",","start":50,"end":51,"id":7},{"text":"Cisco","start":52,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"and","start":59,"end":62,"id":10},{"text":"Cloud","start":63,"end":68,"id":11},{"text":"Access","start":69,"end":75,"id":12},{"text":"Security","start":76,"end":84,"id":13},{"text":"Broker","start":85,"end":91,"id":14},{"text":".","start":91,"end":92,"id":15}]} -{"text":"SPF/DKIM/DMARC certified.","spans":[{"start":0,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1109510584,"_task_hash":-1427205232,"tokens":[{"text":"SPF","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DKIM","start":4,"end":8,"id":2},{"text":"/","start":8,"end":9,"id":3},{"text":"DMARC","start":9,"end":14,"id":4},{"text":"certified","start":15,"end":24,"id":5},{"text":".","start":24,"end":25,"id":6}]} -{"text":"Immediate opening for Threat Hunter.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-541991024,"_task_hash":1506961299,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Hunter","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} -{"text":"Required skills: Splunk, Audit Coordination, ITIL certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1759538557,"_task_hash":-1019708283,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Audit","start":25,"end":30,"id":5},{"text":"Coordination","start":31,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"ITIL","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} -{"text":"Front\u2011End Developer with expertise in NIST Framework compliance and Compliance Auditing operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":68,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1977940895,"_task_hash":-1501817275,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"NIST","start":38,"end":42,"id":5},{"text":"Framework","start":43,"end":52,"id":6},{"text":"compliance","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Compliance","start":68,"end":78,"id":9},{"text":"Auditing","start":79,"end":87,"id":10},{"text":"operations","start":88,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} -{"text":"Hiring Risk Assessment Analyst for Blog Writing and botnet detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1489530019,"_task_hash":-832746498,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Assessment","start":12,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Blog","start":35,"end":39,"id":5},{"text":"Writing","start":40,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"botnet","start":52,"end":58,"id":8},{"text":"detection","start":59,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} +{"text":"Service Desk Analyst opportunity: Lead Cloud Security Architecture program, implement NIST Framework, manage Creative Writing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":86,"end":100,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":109,"end":125,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-918484941,"_task_hash":1273400116,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Desk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"Cloud","start":39,"end":44,"id":6},{"text":"Security","start":45,"end":53,"id":7},{"text":"Architecture","start":54,"end":66,"id":8},{"text":"program","start":67,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"implement","start":76,"end":85,"id":11},{"text":"NIST","start":86,"end":90,"id":12},{"text":"Framework","start":91,"end":100,"id":13},{"text":",","start":100,"end":101,"id":14},{"text":"manage","start":102,"end":108,"id":15},{"text":"Creative","start":109,"end":117,"id":16},{"text":"Writing","start":118,"end":125,"id":17},{"text":"operations","start":126,"end":136,"id":18},{"text":".","start":136,"end":137,"id":19}]} +{"text":"Infrastructure Security Engineer experienced in detecting APT attacks using EDR Platforms.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":58,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":530715541,"_task_hash":-1313114088,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"experienced","start":33,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"detecting","start":48,"end":57,"id":5},{"text":"APT","start":58,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"EDR","start":76,"end":79,"id":9},{"text":"Platforms","start":80,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Security Awareness Specialist role available: Test Planning experience required, Perimeter Security knowledge essential.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":332876590,"_task_hash":948593926,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"role","start":30,"end":34,"id":3},{"text":"available","start":35,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"Test","start":46,"end":50,"id":6},{"text":"Planning","start":51,"end":59,"id":7},{"text":"experience","start":60,"end":70,"id":8},{"text":"required","start":71,"end":79,"id":9},{"text":",","start":79,"end":80,"id":10},{"text":"Perimeter","start":81,"end":90,"id":11},{"text":"Security","start":91,"end":99,"id":12},{"text":"knowledge","start":100,"end":109,"id":13},{"text":"essential","start":110,"end":119,"id":14},{"text":".","start":119,"end":120,"id":15}]} +{"text":"DORA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":757810043,"_task_hash":-723281915,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Cryptography Expert role available: UX Design experience required, Security Culture Building knowledge essential.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":2112523608,"_task_hash":-1322970219,"tokens":[{"text":"Cryptography","start":0,"end":12,"id":0},{"text":"Expert","start":13,"end":19,"id":1},{"text":"role","start":20,"end":24,"id":2},{"text":"available","start":25,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"UX","start":36,"end":38,"id":5},{"text":"Design","start":39,"end":45,"id":6},{"text":"experience","start":46,"end":56,"id":7},{"text":"required","start":57,"end":65,"id":8},{"text":",","start":65,"end":66,"id":9},{"text":"Security","start":67,"end":75,"id":10},{"text":"Culture","start":76,"end":83,"id":11},{"text":"Building","start":84,"end":92,"id":12},{"text":"knowledge","start":93,"end":102,"id":13},{"text":"essential","start":103,"end":112,"id":14},{"text":".","start":112,"end":113,"id":15}]} +{"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} +{"text":"Led Digital Forensics initiatives across organization.","spans":[{"start":4,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1818388656,"_task_hash":-1529713153,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Digital","start":4,"end":11,"id":1},{"text":"Forensics","start":12,"end":21,"id":2},{"text":"initiatives","start":22,"end":33,"id":3},{"text":"across","start":34,"end":40,"id":4},{"text":"organization","start":41,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} +{"text":"Tested systems for CVE-2023-4863 vulnerability.","spans":[{"start":19,"end":32,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-664542716,"_task_hash":1287393594,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"systems","start":7,"end":14,"id":1},{"text":"for","start":15,"end":18,"id":2},{"text":"CVE-2023","start":19,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"4863","start":28,"end":32,"id":5},{"text":"vulnerability","start":33,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} +{"text":"Immediate opening for Threat Detection Specialist.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":544574104,"_task_hash":2010994894,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Detection","start":29,"end":38,"id":4},{"text":"Specialist","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Required skills: CrowdStrike, Control Systems, OPA certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1601978786,"_task_hash":-1392282474,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Control","start":30,"end":37,"id":5},{"text":"Systems","start":38,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"OPA","start":47,"end":50,"id":8},{"text":"certification","start":51,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} +{"text":"Automated Privacy Act compliance monitoring.","spans":[{"start":10,"end":21,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-426399294,"_task_hash":2082919255,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Privacy","start":10,"end":17,"id":1},{"text":"Act","start":18,"end":21,"id":2},{"text":"compliance","start":22,"end":32,"id":3},{"text":"monitoring","start":33,"end":43,"id":4},{"text":".","start":43,"end":44,"id":5}]} +{"text":"Senior Identity Management Engineer skilled in Cryptanalysis, Threat Actor Analysis, and Mobile Security.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":89,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-934677378,"_task_hash":-2136000353,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Identity","start":7,"end":15,"id":1},{"text":"Management","start":16,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"skilled","start":36,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"Cryptanalysis","start":47,"end":60,"id":6},{"text":",","start":60,"end":61,"id":7},{"text":"Threat","start":62,"end":68,"id":8},{"text":"Actor","start":69,"end":74,"id":9},{"text":"Analysis","start":75,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Mobile","start":89,"end":95,"id":13},{"text":"Security","start":96,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} +{"text":"AI UX certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":488350115,"_task_hash":-1406348696,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certified","start":6,"end":15,"id":2},{"text":".","start":15,"end":16,"id":3}]} +{"text":"Accomplished Game Developer specializing in Claims Management and Email Security.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-932981647,"_task_hash":-1443373030,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Game","start":13,"end":17,"id":1},{"text":"Developer","start":18,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Claims","start":44,"end":50,"id":5},{"text":"Management","start":51,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"Email","start":66,"end":71,"id":8},{"text":"Security","start":72,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Experienced Network Engineer specializing in Security Hardening.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-655368386,"_task_hash":-806281702,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Network","start":12,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Security","start":45,"end":53,"id":5},{"text":"Hardening","start":54,"end":63,"id":6},{"text":".","start":63,"end":64,"id":7}]} +{"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Security Compliance Officer opportunity: Lead Security Scanning Tools program, implement NIST Framework, manage Privacy-Preserving ML operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":237325066,"_task_hash":-1992424386,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Compliance","start":9,"end":19,"id":1},{"text":"Officer","start":20,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Scanning","start":55,"end":63,"id":7},{"text":"Tools","start":64,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"Privacy","start":112,"end":119,"id":16},{"text":"-","start":119,"end":120,"id":17},{"text":"Preserving","start":120,"end":130,"id":18},{"text":"ML","start":131,"end":133,"id":19},{"text":"operations","start":134,"end":144,"id":20},{"text":".","start":144,"end":145,"id":21}]} +{"text":"Join our team as Technical Support Analyst!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-573217798,"_task_hash":1767487203,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Analyst","start":35,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} +{"text":"Must know Wireshark, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-112823401,"_task_hash":-2093315552,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Wireshark","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"and","start":32,"end":35,"id":6},{"text":"OWASP","start":36,"end":41,"id":7},{"text":"Top","start":42,"end":45,"id":8},{"text":"10","start":46,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} +{"text":"AWS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":411302902,"_task_hash":-651527579,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} +{"text":"Analyzed Heap Overflow samples in malware lab.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1831032827,"_task_hash":1904785688,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Heap","start":9,"end":13,"id":1},{"text":"Overflow","start":14,"end":22,"id":2},{"text":"samples","start":23,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"malware","start":34,"end":41,"id":5},{"text":"lab","start":42,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} +{"text":"Specialized in IoT Security for enterprise environments.","spans":[{"start":15,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2014488931,"_task_hash":-1191400475,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"IoT","start":15,"end":18,"id":2},{"text":"Security","start":19,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"environments","start":43,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} +{"text":"Hiring Test Automation Specialist for AI Market Trends and Zero-Day detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":59,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1426683164,"_task_hash":1321380994,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Automation","start":12,"end":22,"id":2},{"text":"Specialist","start":23,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"AI","start":38,"end":40,"id":5},{"text":"Market","start":41,"end":47,"id":6},{"text":"Trends","start":48,"end":54,"id":7},{"text":"and","start":55,"end":58,"id":8},{"text":"Zero","start":59,"end":63,"id":9},{"text":"-","start":63,"end":64,"id":10},{"text":"Day","start":64,"end":67,"id":11},{"text":"detection","start":68,"end":77,"id":12},{"text":".","start":77,"end":78,"id":13}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} -{"text":"AI Policy Specialist with expertise in OWASP Top 10 compliance and Ethical Framework Development operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":2006460857,"_task_hash":1740363865,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Ethical","start":67,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":"Development","start":85,"end":96,"id":13},{"text":"operations","start":97,"end":107,"id":14},{"text":".","start":107,"end":108,"id":15}]} -{"text":"Cybersecurity Threat Hunter experienced in detecting trojan attacks using EDR Tools.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1520846597,"_task_hash":930636680,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Threat","start":14,"end":20,"id":1},{"text":"Hunter","start":21,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"EDR","start":74,"end":77,"id":9},{"text":"Tools","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} +{"text":"Looking for Ethical Hacker to lead Security Culture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":51,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1333134731,"_task_hash":506412747,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Ethical","start":12,"end":19,"id":2},{"text":"Hacker","start":20,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Security","start":35,"end":43,"id":6},{"text":"Culture","start":44,"end":51,"id":7},{"text":"initiatives","start":52,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} +{"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} +{"text":"Analyzed botnet campaign targeting financial sector.","spans":[{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1342292590,"_task_hash":1743081100,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"botnet","start":9,"end":15,"id":1},{"text":"campaign","start":16,"end":24,"id":2},{"text":"targeting","start":25,"end":34,"id":3},{"text":"financial","start":35,"end":44,"id":4},{"text":"sector","start":45,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} +{"text":"Led Cryptography initiatives across organization.","spans":[{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1273649871,"_task_hash":1198296430,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Cryptography","start":4,"end":16,"id":1},{"text":"initiatives","start":17,"end":28,"id":2},{"text":"across","start":29,"end":35,"id":3},{"text":"organization","start":36,"end":48,"id":4},{"text":".","start":48,"end":49,"id":5}]} +{"text":"We need a Lead Software Engineer skilled in Cross-Site Scripting prevention and malware analysis using SIEM Operations.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":44,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":87,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":103,"end":118,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-62018750,"_task_hash":360614429,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Lead","start":10,"end":14,"id":3},{"text":"Software","start":15,"end":23,"id":4},{"text":"Engineer","start":24,"end":32,"id":5},{"text":"skilled","start":33,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Cross","start":44,"end":49,"id":8},{"text":"-","start":49,"end":50,"id":9},{"text":"Site","start":50,"end":54,"id":10},{"text":"Scripting","start":55,"end":64,"id":11},{"text":"prevention","start":65,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"malware","start":80,"end":87,"id":14},{"text":"analysis","start":88,"end":96,"id":15},{"text":"using","start":97,"end":102,"id":16},{"text":"SIEM","start":103,"end":107,"id":17},{"text":"Operations","start":108,"end":118,"id":18},{"text":".","start":118,"end":119,"id":19}]} +{"text":"Threat Hunter with GIAC certification, expert in Snort.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":49,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1809001771,"_task_hash":971513800,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"GIAC","start":19,"end":23,"id":3},{"text":"certification","start":24,"end":37,"id":4},{"text":",","start":37,"end":38,"id":5},{"text":"expert","start":39,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"Snort","start":49,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Penetration Tester exploited CVE-2021-44228 during assessment.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":29,"end":43,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-766177368,"_task_hash":-1585271199,"tokens":[{"text":"Penetration","start":0,"end":11,"id":0},{"text":"Tester","start":12,"end":18,"id":1},{"text":"exploited","start":19,"end":28,"id":2},{"text":"CVE-2021","start":29,"end":37,"id":3},{"text":"-","start":37,"end":38,"id":4},{"text":"44228","start":38,"end":43,"id":5},{"text":"during","start":44,"end":50,"id":6},{"text":"assessment","start":51,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} +{"text":"Join our team as Director of Security!","spans":[{"start":17,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1230822913,"_task_hash":-1815001244,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Director","start":17,"end":25,"id":4},{"text":"of","start":26,"end":28,"id":5},{"text":"Security","start":29,"end":37,"id":6},{"text":"!","start":37,"end":38,"id":7}]} +{"text":"Must know Nessus, Metasploit, and OWASP Top 10.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":34,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1441019918,"_task_hash":-605240810,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Metasploit","start":18,"end":28,"id":4},{"text":",","start":28,"end":29,"id":5},{"text":"and","start":30,"end":33,"id":6},{"text":"OWASP","start":34,"end":39,"id":7},{"text":"Top","start":40,"end":43,"id":8},{"text":"10","start":44,"end":46,"id":9},{"text":".","start":46,"end":47,"id":10}]} +{"text":"ITIL certification a plus.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1265801176,"_task_hash":1926694503,"tokens":[{"text":"ITIL","start":0,"end":4,"id":0},{"text":"certification","start":5,"end":18,"id":1},{"text":"a","start":19,"end":20,"id":2},{"text":"plus","start":21,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Vulnerability Analyst needed for enterprise security team.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-814514146,"_task_hash":1320032525,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Analyst","start":14,"end":21,"id":1},{"text":"needed","start":22,"end":28,"id":2},{"text":"for","start":29,"end":32,"id":3},{"text":"enterprise","start":33,"end":43,"id":4},{"text":"security","start":44,"end":52,"id":5},{"text":"team","start":53,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} +{"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} +{"text":"Senior IT Incident Manager skilled in Firewall Management, Graphics, and Cloud Security Posture Management.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":59,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":73,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1110904482,"_task_hash":-439651632,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"Incident","start":10,"end":18,"id":2},{"text":"Manager","start":19,"end":26,"id":3},{"text":"skilled","start":27,"end":34,"id":4},{"text":"in","start":35,"end":37,"id":5},{"text":"Firewall","start":38,"end":46,"id":6},{"text":"Management","start":47,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"Graphics","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Cloud","start":73,"end":78,"id":12},{"text":"Security","start":79,"end":87,"id":13},{"text":"Posture","start":88,"end":95,"id":14},{"text":"Management","start":96,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} +{"text":"NLP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1598323033,"_task_hash":-155365979,"tokens":[{"text":"NLP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Certified CISSP working on GDPR compliance using Splunk.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":31,"label":"REGULATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":55,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-879423670,"_task_hash":-544447195,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CISSP","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"on","start":24,"end":26,"id":3},{"text":"GDPR","start":27,"end":31,"id":4},{"text":"compliance","start":32,"end":42,"id":5},{"text":"using","start":43,"end":48,"id":6},{"text":"Splunk","start":49,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} +{"text":"Reported DORA compliance status to board.","spans":[{"start":9,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1739208919,"_task_hash":-220778146,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"DORA","start":9,"end":13,"id":1},{"text":"compliance","start":14,"end":24,"id":2},{"text":"status","start":25,"end":31,"id":3},{"text":"to","start":32,"end":34,"id":4},{"text":"board","start":35,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} +{"text":"Trained developers on Privilege Escalation prevention.","spans":[{"start":22,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1486530812,"_task_hash":-287536255,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Privilege","start":22,"end":31,"id":3},{"text":"Escalation","start":32,"end":42,"id":4},{"text":"prevention","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} +{"text":"Software Development Engineer in Test professional with 5++ years implementing SIEM Operations and managing Awareness Programs programs.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":79,"end":94,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1512058564,"_task_hash":1122793132,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Development","start":9,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Test","start":33,"end":37,"id":4},{"text":"professional","start":38,"end":50,"id":5},{"text":"with","start":51,"end":55,"id":6},{"text":"5++","start":56,"end":59,"id":7},{"text":"years","start":60,"end":65,"id":8},{"text":"implementing","start":66,"end":78,"id":9},{"text":"SIEM","start":79,"end":83,"id":10},{"text":"Operations","start":84,"end":94,"id":11},{"text":"and","start":95,"end":98,"id":12},{"text":"managing","start":99,"end":107,"id":13},{"text":"Awareness","start":108,"end":117,"id":14},{"text":"Programs","start":118,"end":126,"id":15},{"text":"programs","start":127,"end":135,"id":16},{"text":".","start":135,"end":136,"id":17}]} +{"text":"Experienced Test Automation Engineer specializing in Pod Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-234572808,"_task_hash":-722647711,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Test","start":12,"end":16,"id":1},{"text":"Automation","start":17,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Pod","start":53,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} +{"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} +{"text":"Mentored junior engineers in Incident Response.","spans":[{"start":29,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1092597003,"_task_hash":-180941308,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Incident","start":29,"end":37,"id":4},{"text":"Response","start":38,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} +{"text":"Application Security Specialist with hands-on experience in EDR Tools, Splunk, and Bluetooth Security.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":60,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":944522749,"_task_hash":1213786730,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Specialist","start":21,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"hands","start":37,"end":42,"id":4},{"text":"-","start":42,"end":43,"id":5},{"text":"on","start":43,"end":45,"id":6},{"text":"experience","start":46,"end":56,"id":7},{"text":"in","start":57,"end":59,"id":8},{"text":"EDR","start":60,"end":63,"id":9},{"text":"Tools","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Bluetooth","start":83,"end":92,"id":15},{"text":"Security","start":93,"end":101,"id":16},{"text":".","start":101,"end":102,"id":17}]} +{"text":"Holds MFA & SSO.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-292355214,"_task_hash":-664029969,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"MFA","start":6,"end":9,"id":1},{"text":"&","start":10,"end":11,"id":2},{"text":"SSO","start":12,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} +{"text":"Database Manager opportunity: Lead Security Design program, implement OWASP Top 10, manage Mobile Testing operations.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":35,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":82,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":91,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":403544498,"_task_hash":-1380006178,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"opportunity","start":17,"end":28,"id":2},{"text":":","start":28,"end":29,"id":3},{"text":"Lead","start":30,"end":34,"id":4},{"text":"Security","start":35,"end":43,"id":5},{"text":"Design","start":44,"end":50,"id":6},{"text":"program","start":51,"end":58,"id":7},{"text":",","start":58,"end":59,"id":8},{"text":"implement","start":60,"end":69,"id":9},{"text":"OWASP","start":70,"end":75,"id":10},{"text":"Top","start":76,"end":79,"id":11},{"text":"10","start":80,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"manage","start":84,"end":90,"id":14},{"text":"Mobile","start":91,"end":97,"id":15},{"text":"Testing","start":98,"end":105,"id":16},{"text":"operations","start":106,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} +{"text":"Developed COPPA policies and procedures.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-909608945,"_task_hash":1830570793,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"COPPA","start":10,"end":15,"id":1},{"text":"policies","start":16,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"procedures","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Experienced UI Designer specializing in IoT Security.","spans":[{"start":12,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":40,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":803800254,"_task_hash":1009363017,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"UI","start":12,"end":14,"id":1},{"text":"Designer","start":15,"end":23,"id":2},{"text":"specializing","start":24,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"IoT","start":40,"end":43,"id":5},{"text":"Security","start":44,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} +{"text":"Proficient in Wireshark and SIEM Operations.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1905473231,"_task_hash":-1012059498,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"SIEM","start":28,"end":32,"id":4},{"text":"Operations","start":33,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} +{"text":"Seeking Penetration Tester with 7+ years experience in Stakeholder Engagement and GraphQL.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":55,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1571132459,"_task_hash":-1204559901,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Penetration","start":8,"end":19,"id":1},{"text":"Tester","start":20,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"7","start":32,"end":33,"id":4},{"text":"+","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"Stakeholder","start":55,"end":66,"id":9},{"text":"Engagement","start":67,"end":77,"id":10},{"text":"and","start":78,"end":81,"id":11},{"text":"GraphQL","start":82,"end":89,"id":12},{"text":".","start":89,"end":90,"id":13}]} +{"text":"ETL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":962383227,"_task_hash":1488707885,"tokens":[{"text":"ETL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} +{"text":"SOC Analyst with GWAPT certification, expert in Carbon Black.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":22,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":48,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":416830488,"_task_hash":-649939691,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GWAPT","start":17,"end":22,"id":3},{"text":"certification","start":23,"end":36,"id":4},{"text":",","start":36,"end":37,"id":5},{"text":"expert","start":38,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Carbon","start":48,"end":54,"id":8},{"text":"Black","start":55,"end":60,"id":9},{"text":".","start":60,"end":61,"id":10}]} +{"text":"Hiring Copywriter for Front End and spyware detection.","spans":[{"start":7,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":22,"end":31,"label":"TECHNICAL_SKILL","answer":"accept","token_start":3,"token_end":4},{"start":36,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1567672656,"_task_hash":2051083649,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Copywriter","start":7,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Front","start":22,"end":27,"id":3},{"text":"End","start":28,"end":31,"id":4},{"text":"and","start":32,"end":35,"id":5},{"text":"spyware","start":36,"end":43,"id":6},{"text":"detection","start":44,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} +{"text":"DORA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1261348331,"_task_hash":-1599854490,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} +{"text":"Front\u2011End Developer with expertise in OWASP Top 10 compliance and Secure Coding operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":66,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1912389602,"_task_hash":1969169953,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"OWASP","start":38,"end":43,"id":5},{"text":"Top","start":44,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Secure","start":66,"end":72,"id":10},{"text":"Coding","start":73,"end":79,"id":11},{"text":"operations","start":80,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} +{"text":"Assessed GRC maturity using industry frameworks.","spans":[{"start":9,"end":12,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":12,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1435863221,"_task_hash":-600871614,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"GRC","start":9,"end":12,"id":1},{"text":"maturity","start":13,"end":21,"id":2},{"text":"using","start":22,"end":27,"id":3},{"text":"industry","start":28,"end":36,"id":4},{"text":"frameworks","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} +{"text":"Expert in OT Security best practices.","spans":[{"start":10,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":432220059,"_task_hash":1165306167,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"OT","start":10,"end":12,"id":2},{"text":"Security","start":13,"end":21,"id":3},{"text":"best","start":22,"end":26,"id":4},{"text":"practices","start":27,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} +{"text":"Accomplished Crisis Manager specializing in Secure Multi-Party Computation and Security Automation.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":9},{"start":79,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1920450796,"_task_hash":10576172,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Crisis","start":13,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Secure","start":44,"end":50,"id":5},{"text":"Multi","start":51,"end":56,"id":6},{"text":"-","start":56,"end":57,"id":7},{"text":"Party","start":57,"end":62,"id":8},{"text":"Computation","start":63,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"Security","start":79,"end":87,"id":11},{"text":"Automation","start":88,"end":98,"id":12},{"text":".","start":98,"end":99,"id":13}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"We need a IoT Solutions Architect skilled in Credential Stuffing prevention and Man-in-the-Middle analysis using Nessus.","spans":[{"start":10,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":45,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":80,"end":97,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":18},{"start":113,"end":119,"label":"SECURITY_TOOL","answer":"accept","token_start":21,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":995067720,"_task_hash":-662391656,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"IoT","start":10,"end":13,"id":3},{"text":"Solutions","start":14,"end":23,"id":4},{"text":"Architect","start":24,"end":33,"id":5},{"text":"skilled","start":34,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Credential","start":45,"end":55,"id":8},{"text":"Stuffing","start":56,"end":64,"id":9},{"text":"prevention","start":65,"end":75,"id":10},{"text":"and","start":76,"end":79,"id":11},{"text":"Man","start":80,"end":83,"id":12},{"text":"-","start":83,"end":84,"id":13},{"text":"in","start":84,"end":86,"id":14},{"text":"-","start":86,"end":87,"id":15},{"text":"the","start":87,"end":90,"id":16},{"text":"-","start":90,"end":91,"id":17},{"text":"Middle","start":91,"end":97,"id":18},{"text":"analysis","start":98,"end":106,"id":19},{"text":"using","start":107,"end":112,"id":20},{"text":"Nessus","start":113,"end":119,"id":21},{"text":".","start":119,"end":120,"id":22}]} +{"text":"Briefed executives on rootkit risks.","spans":[{"start":22,"end":29,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":29,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2015961743,"_task_hash":922725162,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"rootkit","start":22,"end":29,"id":3},{"text":"risks","start":30,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Discovered and reported CVE-2022-27518 affecting critical infrastructure.","spans":[{"start":24,"end":38,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1780412172,"_task_hash":-1355059011,"tokens":[{"text":"Discovered","start":0,"end":10,"id":0},{"text":"and","start":11,"end":14,"id":1},{"text":"reported","start":15,"end":23,"id":2},{"text":"CVE-2022","start":24,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"27518","start":33,"end":38,"id":5},{"text":"affecting","start":39,"end":48,"id":6},{"text":"critical","start":49,"end":57,"id":7},{"text":"infrastructure","start":58,"end":72,"id":8},{"text":".","start":72,"end":73,"id":9}]} +{"text":"Published threat intel report on zero-day exploit trends.","spans":[{"start":33,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1444953499,"_task_hash":664691084,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"zero","start":33,"end":37,"id":5},{"text":"-","start":37,"end":38,"id":6},{"text":"day","start":38,"end":41,"id":7},{"text":"exploit","start":42,"end":49,"id":8},{"text":"trends","start":50,"end":56,"id":9},{"text":".","start":56,"end":57,"id":10}]} +{"text":"Senior Mobile Developer skilled in Compliance Standards, Systematic Review, and Wireless Security.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":35,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":57,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":80,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1365644857,"_task_hash":969834046,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Mobile","start":7,"end":13,"id":1},{"text":"Developer","start":14,"end":23,"id":2},{"text":"skilled","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"Compliance","start":35,"end":45,"id":5},{"text":"Standards","start":46,"end":55,"id":6},{"text":",","start":55,"end":56,"id":7},{"text":"Systematic","start":57,"end":67,"id":8},{"text":"Review","start":68,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"and","start":76,"end":79,"id":11},{"text":"Wireless","start":80,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":".","start":97,"end":98,"id":14}]} +{"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} +{"text":"Quality Assurance Engineer experienced in detecting spyware attacks using SIEM Operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-239533717,"_task_hash":805514424,"tokens":[{"text":"Quality","start":0,"end":7,"id":0},{"text":"Assurance","start":8,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"experienced","start":27,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"detecting","start":42,"end":51,"id":5},{"text":"spyware","start":52,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"SIEM","start":74,"end":78,"id":9},{"text":"Operations","start":79,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"Unity Developer professional with 3++ years implementing CrowdStrike and managing Transparency programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":199479432,"_task_hash":-1071167892,"tokens":[{"text":"Unity","start":0,"end":5,"id":0},{"text":"Developer","start":6,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3++","start":34,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"CrowdStrike","start":57,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Transparency","start":82,"end":94,"id":10},{"text":"programs","start":95,"end":103,"id":11},{"text":".","start":103,"end":104,"id":12}]} -{"text":"Privacy Specialist with hands-on experience in Wireshark, QRadar, and Security Operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":58,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":70,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":95477045,"_task_hash":-2127779324,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Specialist","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Wireshark","start":47,"end":56,"id":8},{"text":",","start":56,"end":57,"id":9},{"text":"QRadar","start":58,"end":64,"id":10},{"text":",","start":64,"end":65,"id":11},{"text":"and","start":66,"end":69,"id":12},{"text":"Security","start":70,"end":78,"id":13},{"text":"Operations","start":79,"end":89,"id":14},{"text":".","start":89,"end":90,"id":15}]} -{"text":"Holds GCP.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":491008461,"_task_hash":874544795,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GCP","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} -{"text":"Certified OPA working as IT Incident Manager, focused on Aqua Security and Password Spraying prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":75,"end":92,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-271006774,"_task_hash":-1777354481,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OPA","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"IT","start":25,"end":27,"id":4},{"text":"Incident","start":28,"end":36,"id":5},{"text":"Manager","start":37,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Aqua","start":57,"end":61,"id":10},{"text":"Security","start":62,"end":70,"id":11},{"text":"and","start":71,"end":74,"id":12},{"text":"Password","start":75,"end":83,"id":13},{"text":"Spraying","start":84,"end":92,"id":14},{"text":"prevention","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} +{"text":"Accomplished Big Data Engineer specializing in Project Management and Security Frameworks.","spans":[{"start":13,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1074750112,"_task_hash":-1427358056,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Big","start":13,"end":16,"id":1},{"text":"Data","start":17,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"specializing","start":31,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"Project","start":47,"end":54,"id":6},{"text":"Management","start":55,"end":65,"id":7},{"text":"and","start":66,"end":69,"id":8},{"text":"Security","start":70,"end":78,"id":9},{"text":"Frameworks","start":79,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"AI experienced in detecting Supply Chain Attack attacks using SIEM Operations.","spans":[{"start":0,"end":2,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":28,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1458539544,"_task_hash":-1676344936,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"experienced","start":3,"end":14,"id":1},{"text":"in","start":15,"end":17,"id":2},{"text":"detecting","start":18,"end":27,"id":3},{"text":"Supply","start":28,"end":34,"id":4},{"text":"Chain","start":35,"end":40,"id":5},{"text":"Attack","start":41,"end":47,"id":6},{"text":"attacks","start":48,"end":55,"id":7},{"text":"using","start":56,"end":61,"id":8},{"text":"SIEM","start":62,"end":66,"id":9},{"text":"Operations","start":67,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Looking for Red Team Operator to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":38,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1012923588,"_task_hash":-275250338,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Red","start":12,"end":15,"id":2},{"text":"Team","start":16,"end":20,"id":3},{"text":"Operator","start":21,"end":29,"id":4},{"text":"to","start":30,"end":32,"id":5},{"text":"lead","start":33,"end":37,"id":6},{"text":"Cloud","start":38,"end":43,"id":7},{"text":"Security","start":44,"end":52,"id":8},{"text":"Testing","start":53,"end":60,"id":9},{"text":"initiatives","start":61,"end":72,"id":10},{"text":".","start":72,"end":73,"id":11}]} {"text":"Must have CrowdStrike experience and NIST Framework knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-3577102,"_task_hash":1298442445,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"knowledge","start":52,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} -{"text":"Accomplished Android Developer specializing in Adversary Emulation and CI/CD Security.","spans":[{"start":13,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":47,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-2082157368,"_task_hash":-130450683,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Android","start":13,"end":20,"id":1},{"text":"Developer","start":21,"end":30,"id":2},{"text":"specializing","start":31,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"Adversary","start":47,"end":56,"id":5},{"text":"Emulation","start":57,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"CI","start":71,"end":73,"id":8},{"text":"/","start":73,"end":74,"id":9},{"text":"CD","start":74,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":".","start":85,"end":86,"id":12}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"Immediate opening for Phishing Defense Expert.","spans":[{"start":22,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-58762404,"_task_hash":-1002142669,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Phishing","start":22,"end":30,"id":3},{"text":"Defense","start":31,"end":38,"id":4},{"text":"Expert","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} -{"text":"Required skills: Burp Suite, Offline Storage, PMP Certification certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":63,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":284157875,"_task_hash":300311886,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Offline","start":29,"end":36,"id":6},{"text":"Storage","start":37,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"PMP","start":46,"end":49,"id":9},{"text":"Certification","start":50,"end":63,"id":10},{"text":"certification","start":64,"end":77,"id":11},{"text":".","start":77,"end":78,"id":12}]} -{"text":"Immediate opening for Firmware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1376834588,"_task_hash":-102165587,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Firmware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} -{"text":"Required skills: Nessus, Governance, ROS certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1591218166,"_task_hash":586434627,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Governance","start":25,"end":35,"id":5},{"text":",","start":35,"end":36,"id":6},{"text":"ROS","start":37,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Technical Support Analyst with hands-on experience in CrowdStrike, QRadar, and Cloud Access Security Broker.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":67,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1390465447,"_task_hash":-1532673348,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"hands","start":31,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"on","start":37,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"CrowdStrike","start":54,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"QRadar","start":67,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Cloud","start":79,"end":84,"id":14},{"text":"Access","start":85,"end":91,"id":15},{"text":"Security","start":92,"end":100,"id":16},{"text":"Broker","start":101,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} -{"text":"Holds LDAP.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1805087655,"_task_hash":149409793,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"LDAP","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} -{"text":"Senior Technology Manager skilled in Business Analysis, Secret Management, and Security Tools.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2099725091,"_task_hash":-1102378120,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technology","start":7,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Business","start":37,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"Secret","start":56,"end":62,"id":8},{"text":"Management","start":63,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"Security","start":79,"end":87,"id":12},{"text":"Tools","start":88,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} -{"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} -{"text":"Governance Risk Compliance Specialist with 5+ years experience in Investigations, Microsoft Defender, and Cloud Hardening.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":66,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":82,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":106,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1759893546,"_task_hash":-2095591746,"tokens":[{"text":"Governance","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Compliance","start":16,"end":26,"id":2},{"text":"Specialist","start":27,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"5","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"in","start":63,"end":65,"id":9},{"text":"Investigations","start":66,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"Microsoft","start":82,"end":91,"id":12},{"text":"Defender","start":92,"end":100,"id":13},{"text":",","start":100,"end":101,"id":14},{"text":"and","start":102,"end":105,"id":15},{"text":"Cloud","start":106,"end":111,"id":16},{"text":"Hardening","start":112,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} -{"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Accomplished Vendor Manager specializing in Agile Testing and Security Standards.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-891686759,"_task_hash":-1538601991,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Vendor","start":13,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Agile","start":44,"end":49,"id":5},{"text":"Testing","start":50,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Security","start":62,"end":70,"id":8},{"text":"Standards","start":71,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} +{"text":"Coordinated disclosure of CVE-2022-22965 with vendor.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-461759303,"_task_hash":19704695,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2022","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"22965","start":35,"end":40,"id":5},{"text":"with","start":41,"end":45,"id":6},{"text":"vendor","start":46,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} +{"text":"Hiring Risk Assessment Analyst for Blog Writing and botnet detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1489530019,"_task_hash":-832746498,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Assessment","start":12,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Blog","start":35,"end":39,"id":5},{"text":"Writing","start":40,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"botnet","start":52,"end":58,"id":8},{"text":"detection","start":59,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} +{"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Recovered systems after Advanced Persistent Threat attack.","spans":[{"start":24,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1351127575,"_task_hash":1203085586,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"Advanced","start":24,"end":32,"id":3},{"text":"Persistent","start":33,"end":43,"id":4},{"text":"Threat","start":44,"end":50,"id":5},{"text":"attack","start":51,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} +{"text":"Accomplished Data Privacy Analyst specializing in Game Mechanics and Aqua Security.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-16775992,"_task_hash":1700120250,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Data","start":13,"end":17,"id":1},{"text":"Privacy","start":18,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Game","start":50,"end":54,"id":6},{"text":"Mechanics","start":55,"end":64,"id":7},{"text":"and","start":65,"end":68,"id":8},{"text":"Aqua","start":69,"end":73,"id":9},{"text":"Security","start":74,"end":82,"id":10},{"text":".","start":82,"end":83,"id":11}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Creative Content Strategist experienced in detecting trojan attacks using ELK Stack.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1503164354,"_task_hash":545052805,"tokens":[{"text":"Creative","start":0,"end":8,"id":0},{"text":"Content","start":9,"end":16,"id":1},{"text":"Strategist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"ELK","start":74,"end":77,"id":9},{"text":"Stack","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Join our team as Program Manager!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-300991477,"_task_hash":319892983,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Program","start":17,"end":24,"id":4},{"text":"Manager","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} -{"text":"Must know CrowdStrike, Splunk, and NIST Framework.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1557234610,"_task_hash":-1728313749,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"NIST","start":35,"end":39,"id":7},{"text":"Framework","start":40,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} -{"text":"DNS/DHCP certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-554524723,"_task_hash":1346368627,"tokens":[{"text":"DNS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DHCP","start":4,"end":8,"id":2},{"text":"certification","start":9,"end":22,"id":3},{"text":"a","start":23,"end":24,"id":4},{"text":"plus","start":25,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} -{"text":"Senior Information Specialist skilled in Reinforcement Learning, Digital Forensics, and Cloud Security Testing.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":88,"end":110,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-210607438,"_task_hash":-513952164,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Information","start":7,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"skilled","start":30,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Reinforcement","start":41,"end":54,"id":5},{"text":"Learning","start":55,"end":63,"id":6},{"text":",","start":63,"end":64,"id":7},{"text":"Digital","start":65,"end":72,"id":8},{"text":"Forensics","start":73,"end":82,"id":9},{"text":",","start":82,"end":83,"id":10},{"text":"and","start":84,"end":87,"id":11},{"text":"Cloud","start":88,"end":93,"id":12},{"text":"Security","start":94,"end":102,"id":13},{"text":"Testing","start":103,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} -{"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Accomplished Cryptography Expert specializing in Issue Resolution and Physical Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1037935585,"_task_hash":-67997519,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cryptography","start":13,"end":25,"id":1},{"text":"Expert","start":26,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Issue","start":49,"end":54,"id":5},{"text":"Resolution","start":55,"end":65,"id":6},{"text":"and","start":66,"end":69,"id":7},{"text":"Physical","start":70,"end":78,"id":8},{"text":"Security","start":79,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} +{"text":"Lead Senior Developer managing Infrastructure Management and Troubleshooting initiatives.","spans":[{"start":5,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-161129108,"_task_hash":-472434969,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Senior","start":5,"end":11,"id":1},{"text":"Developer","start":12,"end":21,"id":2},{"text":"managing","start":22,"end":30,"id":3},{"text":"Infrastructure","start":31,"end":45,"id":4},{"text":"Management","start":46,"end":56,"id":5},{"text":"and","start":57,"end":60,"id":6},{"text":"Troubleshooting","start":61,"end":76,"id":7},{"text":"initiatives","start":77,"end":88,"id":8},{"text":".","start":88,"end":89,"id":9}]} +{"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Detected rootkit activity using behavioral analytics.","spans":[{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-874283467,"_task_hash":-415450954,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"rootkit","start":9,"end":16,"id":1},{"text":"activity","start":17,"end":25,"id":2},{"text":"using","start":26,"end":31,"id":3},{"text":"behavioral","start":32,"end":42,"id":4},{"text":"analytics","start":43,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} +{"text":"Accomplished Solutions Architect specializing in Evidence Analysis and Security Operations.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1863738642,"_task_hash":-618451188,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Solutions","start":13,"end":22,"id":1},{"text":"Architect","start":23,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Evidence","start":49,"end":57,"id":5},{"text":"Analysis","start":58,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"Security","start":71,"end":79,"id":8},{"text":"Operations","start":80,"end":90,"id":9},{"text":".","start":90,"end":91,"id":10}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} -{"text":"Major Incident Manager professional with 5+ years implementing Wireshark and managing Third-Party Risk programs.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":86,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1061602331,"_task_hash":-1066062002,"tokens":[{"text":"Major","start":0,"end":5,"id":0},{"text":"Incident","start":6,"end":14,"id":1},{"text":"Manager","start":15,"end":22,"id":2},{"text":"professional","start":23,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"5","start":41,"end":42,"id":5},{"text":"+","start":42,"end":43,"id":6},{"text":"years","start":44,"end":49,"id":7},{"text":"implementing","start":50,"end":62,"id":8},{"text":"Wireshark","start":63,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"managing","start":77,"end":85,"id":11},{"text":"Third","start":86,"end":91,"id":12},{"text":"-","start":91,"end":92,"id":13},{"text":"Party","start":92,"end":97,"id":14},{"text":"Risk","start":98,"end":102,"id":15},{"text":"programs","start":103,"end":111,"id":16},{"text":".","start":111,"end":112,"id":17}]} -{"text":"Security Compliance Officer opportunity: Lead Security Scanning Tools program, implement NIST Framework, manage Privacy-Preserving ML operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":237325066,"_task_hash":-1992424386,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Compliance","start":9,"end":19,"id":1},{"text":"Officer","start":20,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Scanning","start":55,"end":63,"id":7},{"text":"Tools","start":64,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"Privacy","start":112,"end":119,"id":16},{"text":"-","start":119,"end":120,"id":17},{"text":"Preserving","start":120,"end":130,"id":18},{"text":"ML","start":131,"end":133,"id":19},{"text":"operations","start":134,"end":144,"id":20},{"text":".","start":144,"end":145,"id":21}]} -{"text":"Looking for DevOps Engineer to lead GCP Security initiatives.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-313776545,"_task_hash":445121415,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"DevOps","start":12,"end":18,"id":2},{"text":"Engineer","start":19,"end":27,"id":3},{"text":"to","start":28,"end":30,"id":4},{"text":"lead","start":31,"end":35,"id":5},{"text":"GCP","start":36,"end":39,"id":6},{"text":"Security","start":40,"end":48,"id":7},{"text":"initiatives","start":49,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} -{"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Seeking Defensive Security Analyst with 5++ years experience in Model Deployment and Network Traffic Analysis.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-444322514,"_task_hash":642474622,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Defensive","start":8,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Model","start":64,"end":69,"id":9},{"text":"Deployment","start":70,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Network","start":85,"end":92,"id":12},{"text":"Traffic","start":93,"end":100,"id":13},{"text":"Analysis","start":101,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} -{"text":"PKI required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2132396321,"_task_hash":1739596969,"tokens":[{"text":"PKI","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} -{"text":"Immediate opening for Business Data Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1295879884,"_task_hash":1315078640,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Business","start":22,"end":30,"id":3},{"text":"Data","start":31,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} -{"text":"Required skills: SIEM, IDS/IPS, ETL certification.","spans":[{"start":17,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":23,"end":30,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":32,"end":35,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-697463645,"_task_hash":434575365,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":",","start":21,"end":22,"id":4},{"text":"IDS","start":23,"end":26,"id":5},{"text":"/","start":26,"end":27,"id":6},{"text":"IPS","start":27,"end":30,"id":7},{"text":",","start":30,"end":31,"id":8},{"text":"ETL","start":32,"end":35,"id":9},{"text":"certification","start":36,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} -{"text":"IT Manager role available: Coverage Analysis experience required, Kubernetes Security knowledge essential.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":27,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":70417682,"_task_hash":863908192,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"role","start":11,"end":15,"id":2},{"text":"available","start":16,"end":25,"id":3},{"text":":","start":25,"end":26,"id":4},{"text":"Coverage","start":27,"end":35,"id":5},{"text":"Analysis","start":36,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"required","start":56,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"Kubernetes","start":66,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"knowledge","start":86,"end":95,"id":12},{"text":"essential","start":96,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} -{"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Senior Lead Software Engineer position: 10+ years minimum, expert in Python Scripting, Risk Metrics, and Security Culture.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":87,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":105,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-607272320,"_task_hash":1345620220,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Lead","start":7,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"position","start":30,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"10","start":40,"end":42,"id":6},{"text":"+","start":42,"end":43,"id":7},{"text":"years","start":44,"end":49,"id":8},{"text":"minimum","start":50,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"expert","start":59,"end":65,"id":11},{"text":"in","start":66,"end":68,"id":12},{"text":"Python","start":69,"end":75,"id":13},{"text":"Scripting","start":76,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"Risk","start":87,"end":91,"id":16},{"text":"Metrics","start":92,"end":99,"id":17},{"text":",","start":99,"end":100,"id":18},{"text":"and","start":101,"end":104,"id":19},{"text":"Security","start":105,"end":113,"id":20},{"text":"Culture","start":114,"end":121,"id":21},{"text":".","start":121,"end":122,"id":22}]} -{"text":"Cybersecurity Analyst experienced in detecting adware attacks using Wireshark.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":996495949,"_task_hash":1603530611,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Analyst","start":14,"end":21,"id":1},{"text":"experienced","start":22,"end":33,"id":2},{"text":"in","start":34,"end":36,"id":3},{"text":"detecting","start":37,"end":46,"id":4},{"text":"adware","start":47,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"Wireshark","start":68,"end":77,"id":8},{"text":".","start":77,"end":78,"id":9}]} -{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} -{"text":"Senior VP Security skilled in Device Management, Unreal, and Cloud Security Testing.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":49,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":61,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":849986476,"_task_hash":-1104901216,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"VP","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"skilled","start":19,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"Device","start":30,"end":36,"id":5},{"text":"Management","start":37,"end":47,"id":6},{"text":",","start":47,"end":48,"id":7},{"text":"Unreal","start":49,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"and","start":57,"end":60,"id":10},{"text":"Cloud","start":61,"end":66,"id":11},{"text":"Security","start":67,"end":75,"id":12},{"text":"Testing","start":76,"end":83,"id":13},{"text":".","start":83,"end":84,"id":14}]} -{"text":"ISO 22301 certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1486434936,"_task_hash":-892801137,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"certified","start":10,"end":19,"id":2},{"text":".","start":19,"end":20,"id":3}]} -{"text":"UX Designer with expertise in NIST Framework compliance and Sensor Fusion operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-473935881,"_task_hash":1042614845,"tokens":[{"text":"UX","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"expertise","start":17,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"compliance","start":45,"end":55,"id":7},{"text":"and","start":56,"end":59,"id":8},{"text":"Sensor","start":60,"end":66,"id":9},{"text":"Fusion","start":67,"end":73,"id":10},{"text":"operations","start":74,"end":84,"id":11},{"text":".","start":84,"end":85,"id":12}]} -{"text":"Threat Analyst with hands-on experience in CrowdStrike, Wireshark, and Cloud Security.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1637800776,"_task_hash":-714012994,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Analyst","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"hands","start":20,"end":25,"id":3},{"text":"-","start":25,"end":26,"id":4},{"text":"on","start":26,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"CrowdStrike","start":43,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"Wireshark","start":56,"end":65,"id":10},{"text":",","start":65,"end":66,"id":11},{"text":"and","start":67,"end":70,"id":12},{"text":"Cloud","start":71,"end":76,"id":13},{"text":"Security","start":77,"end":85,"id":14},{"text":".","start":85,"end":86,"id":15}]} -{"text":"Holds OSCP Certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851475902,"_task_hash":270501489,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} -{"text":"Seeking Cyber Threat Intelligence Analyst with 10+ years experience in Mentoring and Sass/SCSS.","spans":[{"start":8,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":85,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1498746376,"_task_hash":1261694452,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Cyber","start":8,"end":13,"id":1},{"text":"Threat","start":14,"end":20,"id":2},{"text":"Intelligence","start":21,"end":33,"id":3},{"text":"Analyst","start":34,"end":41,"id":4},{"text":"with","start":42,"end":46,"id":5},{"text":"10","start":47,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"Mentoring","start":71,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Sass","start":85,"end":89,"id":13},{"text":"/","start":89,"end":90,"id":14},{"text":"SCSS","start":90,"end":94,"id":15},{"text":".","start":94,"end":95,"id":16}]} -{"text":"RBAC required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1198453295,"_task_hash":1243055279,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} -{"text":"Accomplished AI Product Manager specializing in Governance and Security Automation.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":63,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":989925616,"_task_hash":1847595968,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"AI","start":13,"end":15,"id":1},{"text":"Product","start":16,"end":23,"id":2},{"text":"Manager","start":24,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Governance","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Security","start":63,"end":71,"id":8},{"text":"Automation","start":72,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} -{"text":"IT Network Administrator experienced in detecting DDoS attacks using Metasploit.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1587380385,"_task_hash":-485960657,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Network","start":3,"end":10,"id":1},{"text":"Administrator","start":11,"end":24,"id":2},{"text":"experienced","start":25,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"detecting","start":40,"end":49,"id":5},{"text":"DDoS","start":50,"end":54,"id":6},{"text":"attacks","start":55,"end":62,"id":7},{"text":"using","start":63,"end":68,"id":8},{"text":"Metasploit","start":69,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} -{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} -{"text":"We need a DevOps Specialist skilled in XXE prevention and spyware analysis using Nessus.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":39,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":58,"end":65,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":81,"end":87,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-2141627285,"_task_hash":1782367803,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"DevOps","start":10,"end":16,"id":3},{"text":"Specialist","start":17,"end":27,"id":4},{"text":"skilled","start":28,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"XXE","start":39,"end":42,"id":7},{"text":"prevention","start":43,"end":53,"id":8},{"text":"and","start":54,"end":57,"id":9},{"text":"spyware","start":58,"end":65,"id":10},{"text":"analysis","start":66,"end":74,"id":11},{"text":"using","start":75,"end":80,"id":12},{"text":"Nessus","start":81,"end":87,"id":13},{"text":".","start":87,"end":88,"id":14}]} -{"text":"Vulnerability Assessment Analyst opportunity: Lead Terraform Security program, implement NIST Framework, manage Data Synchronization operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":112,"end":132,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1987686193,"_task_hash":-1698901697,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Assessment","start":14,"end":24,"id":1},{"text":"Analyst","start":25,"end":32,"id":2},{"text":"opportunity","start":33,"end":44,"id":3},{"text":":","start":44,"end":45,"id":4},{"text":"Lead","start":46,"end":50,"id":5},{"text":"Terraform","start":51,"end":60,"id":6},{"text":"Security","start":61,"end":69,"id":7},{"text":"program","start":70,"end":77,"id":8},{"text":",","start":77,"end":78,"id":9},{"text":"implement","start":79,"end":88,"id":10},{"text":"NIST","start":89,"end":93,"id":11},{"text":"Framework","start":94,"end":103,"id":12},{"text":",","start":103,"end":104,"id":13},{"text":"manage","start":105,"end":111,"id":14},{"text":"Data","start":112,"end":116,"id":15},{"text":"Synchronization","start":117,"end":132,"id":16},{"text":"operations","start":133,"end":143,"id":17},{"text":".","start":143,"end":144,"id":18}]} -{"text":"Immediate opening for Threat Detection Specialist.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":544574104,"_task_hash":2010994894,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Detection","start":29,"end":38,"id":4},{"text":"Specialist","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} -{"text":"Required skills: Nessus, Kotlin, PRINCE2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":31,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1542057596,"_task_hash":-578400523,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Kotlin","start":25,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"PRINCE2","start":33,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Senior Cyber Defense Analyst skilled in Active Directory, Architecture Standards, and Security Protocols.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":58,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":86,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2002458632,"_task_hash":-999554446,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Defense","start":13,"end":20,"id":2},{"text":"Analyst","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"Active","start":40,"end":46,"id":6},{"text":"Directory","start":47,"end":56,"id":7},{"text":",","start":56,"end":57,"id":8},{"text":"Architecture","start":58,"end":70,"id":9},{"text":"Standards","start":71,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"and","start":82,"end":85,"id":12},{"text":"Security","start":86,"end":94,"id":13},{"text":"Protocols","start":95,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} -{"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} -{"text":"Network Security Architect opportunity: Lead Security Culture Building program, implement NIST Framework, manage Playbook Development operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":90,"end":104,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":113,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-867673426,"_task_hash":1230241513,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"Culture","start":54,"end":61,"id":7},{"text":"Building","start":62,"end":70,"id":8},{"text":"program","start":71,"end":78,"id":9},{"text":",","start":78,"end":79,"id":10},{"text":"implement","start":80,"end":89,"id":11},{"text":"NIST","start":90,"end":94,"id":12},{"text":"Framework","start":95,"end":104,"id":13},{"text":",","start":104,"end":105,"id":14},{"text":"manage","start":106,"end":112,"id":15},{"text":"Playbook","start":113,"end":121,"id":16},{"text":"Development","start":122,"end":133,"id":17},{"text":"operations","start":134,"end":144,"id":18},{"text":".","start":144,"end":145,"id":19}]} -{"text":"Lead DevSecOps Engineer managing PKI and Autonomous Navigation initiatives.","spans":[{"start":5,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":33,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-2010469057,"_task_hash":-1195419762,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"DevSecOps","start":5,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"managing","start":24,"end":32,"id":3},{"text":"PKI","start":33,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Autonomous","start":41,"end":51,"id":6},{"text":"Navigation","start":52,"end":62,"id":7},{"text":"initiatives","start":63,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} -{"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} -{"text":"Senior Crisis Manager position: 10 years minimum, expert in Contract Negotiation, Vishing, and Container Registry Security.","spans":[{"start":7,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":60,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":95,"end":122,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":2015157675,"_task_hash":341438624,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Crisis","start":7,"end":13,"id":1},{"text":"Manager","start":14,"end":21,"id":2},{"text":"position","start":22,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"10","start":32,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"minimum","start":41,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"expert","start":50,"end":56,"id":9},{"text":"in","start":57,"end":59,"id":10},{"text":"Contract","start":60,"end":68,"id":11},{"text":"Negotiation","start":69,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"Vishing","start":82,"end":89,"id":14},{"text":",","start":89,"end":90,"id":15},{"text":"and","start":91,"end":94,"id":16},{"text":"Container","start":95,"end":104,"id":17},{"text":"Registry","start":105,"end":113,"id":18},{"text":"Security","start":114,"end":122,"id":19},{"text":".","start":122,"end":123,"id":20}]} -{"text":"Lead Insider Risk Specialist managing Adult Learning Principles and Phishing Detection initiatives.","spans":[{"start":5,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":68,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1930717197,"_task_hash":-143553317,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Insider","start":5,"end":12,"id":1},{"text":"Risk","start":13,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"managing","start":29,"end":37,"id":4},{"text":"Adult","start":38,"end":43,"id":5},{"text":"Learning","start":44,"end":52,"id":6},{"text":"Principles","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Phishing","start":68,"end":76,"id":9},{"text":"Detection","start":77,"end":86,"id":10},{"text":"initiatives","start":87,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} -{"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} -{"text":"Accomplished Business Continuity Manager specializing in C# and Security Scanning Tools.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":64,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1882260531,"_task_hash":804421001,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Business","start":13,"end":21,"id":1},{"text":"Continuity","start":22,"end":32,"id":2},{"text":"Manager","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"C","start":57,"end":58,"id":6},{"text":"#","start":58,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Security","start":64,"end":72,"id":9},{"text":"Scanning","start":73,"end":81,"id":10},{"text":"Tools","start":82,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} -{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Security Vulnerability Analyst with hands-on experience in Burp Suite, Splunk, and Security.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":726599488,"_task_hash":-2014331586,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"hands","start":36,"end":41,"id":4},{"text":"-","start":41,"end":42,"id":5},{"text":"on","start":42,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Burp","start":59,"end":63,"id":9},{"text":"Suite","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Security","start":83,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} +{"text":"Holds RBAC.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1050074114,"_task_hash":896161982,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Mitigated Format String through code remediation.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1137982284,"_task_hash":-2105046841,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Format","start":10,"end":16,"id":1},{"text":"String","start":17,"end":23,"id":2},{"text":"through","start":24,"end":31,"id":3},{"text":"code","start":32,"end":36,"id":4},{"text":"remediation","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} +{"text":"Senior IAM Engineer skilled in Crisis Response, Python, and Terraform Security.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":48,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":60,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2110622880,"_task_hash":-663088624,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"skilled","start":20,"end":27,"id":3},{"text":"in","start":28,"end":30,"id":4},{"text":"Crisis","start":31,"end":37,"id":5},{"text":"Response","start":38,"end":46,"id":6},{"text":",","start":46,"end":47,"id":7},{"text":"Python","start":48,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"and","start":56,"end":59,"id":10},{"text":"Terraform","start":60,"end":69,"id":11},{"text":"Security","start":70,"end":78,"id":12},{"text":".","start":78,"end":79,"id":13}]} +{"text":"C++ certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1590806424,"_task_hash":1726592216,"tokens":[{"text":"C++","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"IT GRC Specialist with expertise in NIST Framework compliance and Solution Modeling operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":66,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":438739304,"_task_hash":599239579,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"GRC","start":3,"end":6,"id":1},{"text":"Specialist","start":7,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Solution","start":66,"end":74,"id":10},{"text":"Modeling","start":75,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} -{"text":"Looking for GRC Specialist to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":732397461,"_task_hash":-611234639,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"GRC","start":12,"end":15,"id":2},{"text":"Specialist","start":16,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Cloud","start":35,"end":40,"id":6},{"text":"Security","start":41,"end":49,"id":7},{"text":"Testing","start":50,"end":57,"id":8},{"text":"initiatives","start":58,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} -{"text":"Must have Nessus experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-889543638,"_task_hash":-1537583104,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} -{"text":"Threat Hunter with expertise in NIST Framework compliance and Privacy Engineering operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-104127338,"_task_hash":-960350748,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Privacy","start":62,"end":69,"id":9},{"text":"Engineering","start":70,"end":81,"id":10},{"text":"operations","start":82,"end":92,"id":11},{"text":".","start":92,"end":93,"id":12}]} -{"text":"Certified TOGAF working as Unity Developer, focused on Security Culture and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":76,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":642980448,"_task_hash":-226098929,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TOGAF","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Unity","start":27,"end":32,"id":4},{"text":"Developer","start":33,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Culture","start":64,"end":71,"id":10},{"text":"and","start":72,"end":75,"id":11},{"text":"CSRF","start":76,"end":80,"id":12},{"text":"prevention","start":81,"end":91,"id":13},{"text":".","start":91,"end":92,"id":14}]} -{"text":"Experienced Network Engineer specializing in Security Hardening.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-655368386,"_task_hash":-806281702,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Network","start":12,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Security","start":45,"end":53,"id":5},{"text":"Hardening","start":54,"end":63,"id":6},{"text":".","start":63,"end":64,"id":7}]} -{"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Presented Digital Forensics updates to leadership.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-533005828,"_task_hash":691969539,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Digital","start":10,"end":17,"id":1},{"text":"Forensics","start":18,"end":27,"id":2},{"text":"updates","start":28,"end":35,"id":3},{"text":"to","start":36,"end":38,"id":4},{"text":"leadership","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Led Application Security initiatives across organization.","spans":[{"start":4,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":969619651,"_task_hash":272970286,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Application","start":4,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"initiatives","start":25,"end":36,"id":3},{"text":"across","start":37,"end":43,"id":4},{"text":"organization","start":44,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} +{"text":"Data Privacy Analyst experienced in detecting rootkit attacks using CrowdStrike.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":68,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":745604020,"_task_hash":1195046385,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Privacy","start":5,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"experienced","start":21,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"detecting","start":36,"end":45,"id":5},{"text":"rootkit","start":46,"end":53,"id":6},{"text":"attacks","start":54,"end":61,"id":7},{"text":"using","start":62,"end":67,"id":8},{"text":"CrowdStrike","start":68,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]}