{"text":"We need a Governance Risk Compliance Specialist skilled in Remote Code Execution prevention and Man-in-the-Middle analysis using EDR Platforms.","spans":[{"start":10,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":59,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":11},{"start":96,"end":113,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":20},{"start":129,"end":142,"label":"SECURITY_TOOL","answer":"accept","token_start":23,"token_end":24}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1250070946,"_task_hash":-1399765496,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Governance","start":10,"end":20,"id":3},{"text":"Risk","start":21,"end":25,"id":4},{"text":"Compliance","start":26,"end":36,"id":5},{"text":"Specialist","start":37,"end":47,"id":6},{"text":"skilled","start":48,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Remote","start":59,"end":65,"id":9},{"text":"Code","start":66,"end":70,"id":10},{"text":"Execution","start":71,"end":80,"id":11},{"text":"prevention","start":81,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"Man","start":96,"end":99,"id":14},{"text":"-","start":99,"end":100,"id":15},{"text":"in","start":100,"end":102,"id":16},{"text":"-","start":102,"end":103,"id":17},{"text":"the","start":103,"end":106,"id":18},{"text":"-","start":106,"end":107,"id":19},{"text":"Middle","start":107,"end":113,"id":20},{"text":"analysis","start":114,"end":122,"id":21},{"text":"using","start":123,"end":128,"id":22},{"text":"EDR","start":129,"end":132,"id":23},{"text":"Platforms","start":133,"end":142,"id":24},{"text":".","start":142,"end":143,"id":25}]} {"text":"Accomplished IT Operations Manager specializing in Technical Leadership and Pod Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-935636994,"_task_hash":-309378129,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Operations","start":16,"end":26,"id":2},{"text":"Manager","start":27,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Technical","start":51,"end":60,"id":6},{"text":"Leadership","start":61,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Pod","start":76,"end":79,"id":9},{"text":"Security","start":80,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Insider Threat Specialist with expertise in NIST Framework compliance and Data Pipelines operations.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":58,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":74,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2048261745,"_task_hash":1887736849,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Specialist","start":15,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"expertise","start":31,"end":40,"id":4},{"text":"in","start":41,"end":43,"id":5},{"text":"NIST","start":44,"end":48,"id":6},{"text":"Framework","start":49,"end":58,"id":7},{"text":"compliance","start":59,"end":69,"id":8},{"text":"and","start":70,"end":73,"id":9},{"text":"Data","start":74,"end":78,"id":10},{"text":"Pipelines","start":79,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Cryptography Expert professional with 3++ years implementing EDR Tools and managing Sandbox Analysis programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":8},{"start":84,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2128135888,"_task_hash":395365015,"tokens":[{"text":"Cryptography","start":0,"end":12,"id":0},{"text":"Expert","start":13,"end":19,"id":1},{"text":"professional","start":20,"end":32,"id":2},{"text":"with","start":33,"end":37,"id":3},{"text":"3++","start":38,"end":41,"id":4},{"text":"years","start":42,"end":47,"id":5},{"text":"implementing","start":48,"end":60,"id":6},{"text":"EDR","start":61,"end":64,"id":7},{"text":"Tools","start":65,"end":70,"id":8},{"text":"and","start":71,"end":74,"id":9},{"text":"managing","start":75,"end":83,"id":10},{"text":"Sandbox","start":84,"end":91,"id":11},{"text":"Analysis","start":92,"end":100,"id":12},{"text":"programs","start":101,"end":109,"id":13},{"text":".","start":109,"end":110,"id":14}]} {"text":"IAM Engineer experienced in detecting phishing attacks using ELK Stack.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1753139690,"_task_hash":-2139052346,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"Engineer","start":4,"end":12,"id":1},{"text":"experienced","start":13,"end":24,"id":2},{"text":"in","start":25,"end":27,"id":3},{"text":"detecting","start":28,"end":37,"id":4},{"text":"phishing","start":38,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":"using","start":55,"end":60,"id":7},{"text":"ELK","start":61,"end":64,"id":8},{"text":"Stack","start":65,"end":70,"id":9},{"text":".","start":70,"end":71,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"IT Administrator professional with 10+ years implementing Wireshark and managing Threat Modeling programs.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":58,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":81,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2028535025,"_task_hash":-1281299275,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Administrator","start":3,"end":16,"id":1},{"text":"professional","start":17,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"10","start":35,"end":37,"id":4},{"text":"+","start":37,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"implementing","start":45,"end":57,"id":7},{"text":"Wireshark","start":58,"end":67,"id":8},{"text":"and","start":68,"end":71,"id":9},{"text":"managing","start":72,"end":80,"id":10},{"text":"Threat","start":81,"end":87,"id":11},{"text":"Modeling","start":88,"end":96,"id":12},{"text":"programs","start":97,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} {"text":"Accomplished Network Security Engineer specializing in Device Encryption and CI/CD Security.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-569797197,"_task_hash":-553825222,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Network","start":13,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Engineer","start":30,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Device","start":55,"end":61,"id":6},{"text":"Encryption","start":62,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"CI","start":77,"end":79,"id":9},{"text":"/","start":79,"end":80,"id":10},{"text":"CD","start":80,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Analyzed business email compromise campaign targeting financial sector.","spans":[{"start":9,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-239864389,"_task_hash":-914402255,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"business","start":9,"end":17,"id":1},{"text":"email","start":18,"end":23,"id":2},{"text":"compromise","start":24,"end":34,"id":3},{"text":"campaign","start":35,"end":43,"id":4},{"text":"targeting","start":44,"end":53,"id":5},{"text":"financial","start":54,"end":63,"id":6},{"text":"sector","start":64,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Experienced Phishing Defense Expert specializing in Security Patterns.","spans":[{"start":12,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-508742494,"_task_hash":-1477076563,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Phishing","start":12,"end":20,"id":1},{"text":"Defense","start":21,"end":28,"id":2},{"text":"Expert","start":29,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Security","start":52,"end":60,"id":6},{"text":"Patterns","start":61,"end":69,"id":7},{"text":".","start":69,"end":70,"id":8}]} {"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Software Security Engineer opportunity: Lead Web Application Security program, implement NIST Framework, manage SLA Management operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1085427779,"_task_hash":-110632279,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Web","start":45,"end":48,"id":6},{"text":"Application","start":49,"end":60,"id":7},{"text":"Security","start":61,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"SLA","start":112,"end":115,"id":16},{"text":"Management","start":116,"end":126,"id":17},{"text":"operations","start":127,"end":137,"id":18},{"text":".","start":137,"end":138,"id":19}]} {"text":"Presented Mobile Security updates to leadership.","spans":[{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1001913688,"_task_hash":-254064588,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Mobile","start":10,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"updates","start":26,"end":33,"id":3},{"text":"to","start":34,"end":36,"id":4},{"text":"leadership","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Led Cloud Security initiatives across organization.","spans":[{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1833648151,"_task_hash":-993253922,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Cloud","start":4,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"initiatives","start":19,"end":30,"id":3},{"text":"across","start":31,"end":37,"id":4},{"text":"organization","start":38,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Certified OPA working as IT Incident Manager, focused on Aqua Security and Password Spraying prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":75,"end":92,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-271006774,"_task_hash":-1777354481,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OPA","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"IT","start":25,"end":27,"id":4},{"text":"Incident","start":28,"end":36,"id":5},{"text":"Manager","start":37,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Aqua","start":57,"end":61,"id":10},{"text":"Security","start":62,"end":70,"id":11},{"text":"and","start":71,"end":74,"id":12},{"text":"Password","start":75,"end":83,"id":13},{"text":"Spraying","start":84,"end":92,"id":14},{"text":"prevention","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} {"text":"Managed SOX certification process.","spans":[{"start":8,"end":11,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1063656648,"_task_hash":413392215,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"SOX","start":8,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":"process","start":26,"end":33,"id":3},{"text":".","start":33,"end":34,"id":4}]} {"text":"Implemented controls for CFAA audit.","spans":[{"start":25,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1286808847,"_task_hash":-1713405554,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"CFAA","start":25,"end":29,"id":3},{"text":"audit","start":30,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"AI Robotics Engineer with expertise in OWASP Top 10 compliance and Governance operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1071709533,"_task_hash":-2081326183,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Robotics","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Governance","start":67,"end":77,"id":11},{"text":"operations","start":78,"end":88,"id":12},{"text":".","start":88,"end":89,"id":13}]} {"text":"Coordinated Security Review with external auditors.","spans":[{"start":12,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-385846225,"_task_hash":-1085594272,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Review","start":21,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"external","start":33,"end":41,"id":4},{"text":"auditors","start":42,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Briefed executives on keylogger risks.","spans":[{"start":22,"end":31,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":280022965,"_task_hash":1995135894,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"keylogger","start":22,"end":31,"id":3},{"text":"risks","start":32,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} {"text":"Forensic Analyst with CISA certification, expert in Snort.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":621093887,"_task_hash":469212095,"tokens":[{"text":"Forensic","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"CISA","start":22,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Snort","start":52,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} {"text":"Join our team as Network Administrator!","spans":[{"start":17,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":2099251261,"_task_hash":384898659,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Network","start":17,"end":24,"id":4},{"text":"Administrator","start":25,"end":38,"id":5},{"text":"!","start":38,"end":39,"id":6}]} {"text":"Must know CrowdStrike, EDR Platforms, and OWASP Top 10.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":42,"end":54,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-76888070,"_task_hash":-1460454603,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"EDR","start":23,"end":26,"id":4},{"text":"Platforms","start":27,"end":36,"id":5},{"text":",","start":36,"end":37,"id":6},{"text":"and","start":38,"end":41,"id":7},{"text":"OWASP","start":42,"end":47,"id":8},{"text":"Top","start":48,"end":51,"id":9},{"text":"10","start":52,"end":54,"id":10},{"text":".","start":54,"end":55,"id":11}]} {"text":"MITRE ATT&CK certification a plus.","spans":[{"start":0,"end":12,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1354205953,"_task_hash":-427481648,"tokens":[{"text":"MITRE","start":0,"end":5,"id":0},{"text":"ATT&CK","start":6,"end":12,"id":1},{"text":"certification","start":13,"end":26,"id":2},{"text":"a","start":27,"end":28,"id":3},{"text":"plus","start":29,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Certified in NDR administration.","spans":[{"start":13,"end":16,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":375812706,"_task_hash":2085653664,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"in","start":10,"end":12,"id":1},{"text":"NDR","start":13,"end":16,"id":2},{"text":"administration","start":17,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"Lead Cyber Insurance Specialist managing Device Management and Incident Response initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1004529044,"_task_hash":-1379613567,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Insurance","start":11,"end":20,"id":2},{"text":"Specialist","start":21,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Device","start":41,"end":47,"id":5},{"text":"Management","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Incident","start":63,"end":71,"id":8},{"text":"Response","start":72,"end":80,"id":9},{"text":"initiatives","start":81,"end":92,"id":10},{"text":".","start":92,"end":93,"id":11}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Head of InfoSec needed for enterprise security team.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":409990663,"_task_hash":698333875,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"InfoSec","start":8,"end":15,"id":2},{"text":"needed","start":16,"end":22,"id":3},{"text":"for","start":23,"end":26,"id":4},{"text":"enterprise","start":27,"end":37,"id":5},{"text":"security","start":38,"end":46,"id":6},{"text":"team","start":47,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"Required: SAML, ELK Stack, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1980996984,"_task_hash":1444639524,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"SAML","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"ELK","start":16,"end":19,"id":4},{"text":"Stack","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} {"text":"Managed CWPP infrastructure for Fortune 500 client.","spans":[{"start":8,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1618054782,"_task_hash":461013656,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"CWPP","start":8,"end":12,"id":1},{"text":"infrastructure","start":13,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"Fortune","start":32,"end":39,"id":4},{"text":"500","start":40,"end":43,"id":5},{"text":"client","start":44,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Certified PRINCE2 working as Video Game Developer, focused on Security Culture Building and Remote Code Execution prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":29,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":92,"end":113,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1672051576,"_task_hash":-999554531,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PRINCE2","start":10,"end":17,"id":1},{"text":"working","start":18,"end":25,"id":2},{"text":"as","start":26,"end":28,"id":3},{"text":"Video","start":29,"end":34,"id":4},{"text":"Game","start":35,"end":39,"id":5},{"text":"Developer","start":40,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"focused","start":51,"end":58,"id":8},{"text":"on","start":59,"end":61,"id":9},{"text":"Security","start":62,"end":70,"id":10},{"text":"Culture","start":71,"end":78,"id":11},{"text":"Building","start":79,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Remote","start":92,"end":98,"id":14},{"text":"Code","start":99,"end":103,"id":15},{"text":"Execution","start":104,"end":113,"id":16},{"text":"prevention","start":114,"end":124,"id":17},{"text":".","start":124,"end":125,"id":18}]} {"text":"Published threat intel report on trojan trends.","spans":[{"start":33,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":93512554,"_task_hash":917838253,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"trojan","start":33,"end":39,"id":5},{"text":"trends","start":40,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Security Operations Manager with CompTIA Security+ certification, expert in Cobalt Strike.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":197738527,"_task_hash":-2052935275,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"CompTIA","start":33,"end":40,"id":4},{"text":"Security+","start":41,"end":50,"id":5},{"text":"certification","start":51,"end":64,"id":6},{"text":",","start":64,"end":65,"id":7},{"text":"expert","start":66,"end":72,"id":8},{"text":"in","start":73,"end":75,"id":9},{"text":"Cobalt","start":76,"end":82,"id":10},{"text":"Strike","start":83,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} {"text":"Certified SPF/DKIM/DMARC working as API Developer, focused on Mobile App Security and XSS prevention.","spans":[{"start":10,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5},{"start":36,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":8,"token_end":9},{"start":62,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15},{"start":86,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-2120067568,"_task_hash":-116678502,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SPF","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"DKIM","start":14,"end":18,"id":3},{"text":"/","start":18,"end":19,"id":4},{"text":"DMARC","start":19,"end":24,"id":5},{"text":"working","start":25,"end":32,"id":6},{"text":"as","start":33,"end":35,"id":7},{"text":"API","start":36,"end":39,"id":8},{"text":"Developer","start":40,"end":49,"id":9},{"text":",","start":49,"end":50,"id":10},{"text":"focused","start":51,"end":58,"id":11},{"text":"on","start":59,"end":61,"id":12},{"text":"Mobile","start":62,"end":68,"id":13},{"text":"App","start":69,"end":72,"id":14},{"text":"Security","start":73,"end":81,"id":15},{"text":"and","start":82,"end":85,"id":16},{"text":"XSS","start":86,"end":89,"id":17},{"text":"prevention","start":90,"end":100,"id":18},{"text":".","start":100,"end":101,"id":19}]} {"text":"We need a Network Specialist skilled in Credential Stuffing prevention and trojan analysis using Splunk.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":75,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":97,"end":103,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-722896188,"_task_hash":208225426,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Network","start":10,"end":17,"id":3},{"text":"Specialist","start":18,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"Credential","start":40,"end":50,"id":7},{"text":"Stuffing","start":51,"end":59,"id":8},{"text":"prevention","start":60,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"trojan","start":75,"end":81,"id":11},{"text":"analysis","start":82,"end":90,"id":12},{"text":"using","start":91,"end":96,"id":13},{"text":"Splunk","start":97,"end":103,"id":14},{"text":".","start":103,"end":104,"id":15}]} {"text":"Developed Data Security strategy and roadmap.","spans":[{"start":10,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1607786422,"_task_hash":-14402285,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Data","start":10,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"strategy","start":24,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"roadmap","start":37,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Briefed executives on supply chain attack risks.","spans":[{"start":22,"end":41,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-589472483,"_task_hash":-1211219228,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"supply","start":22,"end":28,"id":3},{"text":"chain","start":29,"end":34,"id":4},{"text":"attack","start":35,"end":41,"id":5},{"text":"risks","start":42,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Experienced Software Tester specializing in Security Awareness Platforms.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1830900795,"_task_hash":749664281,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Software","start":12,"end":20,"id":1},{"text":"Tester","start":21,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Security","start":44,"end":52,"id":5},{"text":"Awareness","start":53,"end":62,"id":6},{"text":"Platforms","start":63,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} {"text":"Proficient in Splunk and SIEM.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1369442593,"_task_hash":1934435184,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Governance Risk Compliance Specialist with expertise in OWASP Top 10 compliance and Privacy Engineering operations.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":56,"end":68,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":84,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1204508886,"_task_hash":688685451,"tokens":[{"text":"Governance","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Compliance","start":16,"end":26,"id":2},{"text":"Specialist","start":27,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"expertise","start":43,"end":52,"id":5},{"text":"in","start":53,"end":55,"id":6},{"text":"OWASP","start":56,"end":61,"id":7},{"text":"Top","start":62,"end":65,"id":8},{"text":"10","start":66,"end":68,"id":9},{"text":"compliance","start":69,"end":79,"id":10},{"text":"and","start":80,"end":83,"id":11},{"text":"Privacy","start":84,"end":91,"id":12},{"text":"Engineering","start":92,"end":103,"id":13},{"text":"operations","start":104,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} {"text":"Game Developer opportunity: Lead Security Testing program, implement OWASP Top 10, manage Active Directory operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":69,"end":81,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":90,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1966106059,"_task_hash":2042744899,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Developer","start":5,"end":14,"id":1},{"text":"opportunity","start":15,"end":26,"id":2},{"text":":","start":26,"end":27,"id":3},{"text":"Lead","start":28,"end":32,"id":4},{"text":"Security","start":33,"end":41,"id":5},{"text":"Testing","start":42,"end":49,"id":6},{"text":"program","start":50,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"implement","start":59,"end":68,"id":9},{"text":"OWASP","start":69,"end":74,"id":10},{"text":"Top","start":75,"end":78,"id":11},{"text":"10","start":79,"end":81,"id":12},{"text":",","start":81,"end":82,"id":13},{"text":"manage","start":83,"end":89,"id":14},{"text":"Active","start":90,"end":96,"id":15},{"text":"Directory","start":97,"end":106,"id":16},{"text":"operations","start":107,"end":117,"id":17},{"text":".","start":117,"end":118,"id":18}]} {"text":"Senior Lead Software Engineer position: 10+ years minimum, expert in Python Scripting, Risk Metrics, and Security Culture.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":87,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":105,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-607272320,"_task_hash":1345620220,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Lead","start":7,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"position","start":30,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"10","start":40,"end":42,"id":6},{"text":"+","start":42,"end":43,"id":7},{"text":"years","start":44,"end":49,"id":8},{"text":"minimum","start":50,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"expert","start":59,"end":65,"id":11},{"text":"in","start":66,"end":68,"id":12},{"text":"Python","start":69,"end":75,"id":13},{"text":"Scripting","start":76,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"Risk","start":87,"end":91,"id":16},{"text":"Metrics","start":92,"end":99,"id":17},{"text":",","start":99,"end":100,"id":18},{"text":"and","start":101,"end":104,"id":19},{"text":"Security","start":105,"end":113,"id":20},{"text":"Culture","start":114,"end":121,"id":21},{"text":".","start":121,"end":122,"id":22}]} {"text":"Developed Risk Register methodology and procedures.","spans":[{"start":10,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1840424339,"_task_hash":-2073699887,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Risk","start":10,"end":14,"id":1},{"text":"Register","start":15,"end":23,"id":2},{"text":"methodology","start":24,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"procedures","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Led ITAR compliance program.","spans":[{"start":4,"end":8,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-370128953,"_task_hash":762904031,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"ITAR","start":4,"end":8,"id":1},{"text":"compliance","start":9,"end":19,"id":2},{"text":"program","start":20,"end":27,"id":3},{"text":".","start":27,"end":28,"id":4}]} {"text":"Implemented controls to prevent rootkit attacks.","spans":[{"start":32,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1973922827,"_task_hash":-54996909,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"rootkit","start":32,"end":39,"id":4},{"text":"attacks","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Solutions Architect needed for enterprise security team.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":214130941,"_task_hash":-1513736229,"tokens":[{"text":"Solutions","start":0,"end":9,"id":0},{"text":"Architect","start":10,"end":19,"id":1},{"text":"needed","start":20,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"enterprise","start":31,"end":41,"id":4},{"text":"security","start":42,"end":50,"id":5},{"text":"team","start":51,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Required: NIST RMF, Metasploit, and NIST Framework expertise.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":20,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":550941277,"_task_hash":-121284653,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"NIST","start":10,"end":14,"id":2},{"text":"RMF","start":15,"end":18,"id":3},{"text":",","start":18,"end":19,"id":4},{"text":"Metasploit","start":20,"end":30,"id":5},{"text":",","start":30,"end":31,"id":6},{"text":"and","start":32,"end":35,"id":7},{"text":"NIST","start":36,"end":40,"id":8},{"text":"Framework","start":41,"end":50,"id":9},{"text":"expertise","start":51,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} {"text":"Experienced AI Research Scientist specializing in Security Protocols.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1933218090,"_task_hash":-317288291,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"AI","start":12,"end":14,"id":1},{"text":"Research","start":15,"end":23,"id":2},{"text":"Scientist","start":24,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Protocols","start":59,"end":68,"id":7},{"text":".","start":68,"end":69,"id":8}]} {"text":"Proficient in SIEM Operations and ELK Stack.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1617648284,"_task_hash":-2132650581,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"ELK","start":34,"end":37,"id":5},{"text":"Stack","start":38,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} {"text":"Accomplished IAM Expert specializing in Penetration Testing and Supply Chain Security.","spans":[{"start":13,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":40,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":554137659,"_task_hash":-650738669,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IAM","start":13,"end":16,"id":1},{"text":"Expert","start":17,"end":23,"id":2},{"text":"specializing","start":24,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"Penetration","start":40,"end":51,"id":5},{"text":"Testing","start":52,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"Supply","start":64,"end":70,"id":8},{"text":"Chain","start":71,"end":76,"id":9},{"text":"Security","start":77,"end":85,"id":10},{"text":".","start":85,"end":86,"id":11}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Briefed executives on backdoor risks.","spans":[{"start":22,"end":30,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":504160783,"_task_hash":1845579902,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"backdoor","start":22,"end":30,"id":3},{"text":"risks","start":31,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Looking for Frontend Engineer to lead Web Application Security initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":38,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-207545630,"_task_hash":-164515385,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Frontend","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"to","start":30,"end":32,"id":4},{"text":"lead","start":33,"end":37,"id":5},{"text":"Web","start":38,"end":41,"id":6},{"text":"Application","start":42,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"Technical Project Manager experienced in detecting botnet attacks using Wireshark.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-31993733,"_task_hash":1557656150,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Project","start":10,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Wireshark","start":72,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Accomplished IT Project Manager specializing in Python/Bash and Security Monitoring.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":64,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1785672960,"_task_hash":-957645405,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Project","start":16,"end":23,"id":2},{"text":"Manager","start":24,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Python","start":48,"end":54,"id":6},{"text":"/","start":54,"end":55,"id":7},{"text":"Bash","start":55,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"Monitoring","start":73,"end":83,"id":11},{"text":".","start":83,"end":84,"id":12}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Analyzed Race Condition samples in malware lab.","spans":[{"start":9,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1892574267,"_task_hash":1529547474,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Race","start":9,"end":13,"id":1},{"text":"Condition","start":14,"end":23,"id":2},{"text":"samples","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"malware","start":35,"end":42,"id":5},{"text":"lab","start":43,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Accomplished IT Solutions Architect specializing in Remote Support Tools and AWS Security.","spans":[{"start":13,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1109085814,"_task_hash":574276668,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Solutions","start":16,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Remote","start":52,"end":58,"id":6},{"text":"Support","start":59,"end":66,"id":7},{"text":"Tools","start":67,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"AWS","start":77,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Documented ARP Spoofing attack chain for threat intel.","spans":[{"start":11,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":11,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-586738392,"_task_hash":-1963028198,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"ARP","start":11,"end":14,"id":1},{"text":"Spoofing","start":15,"end":23,"id":2},{"text":"attack","start":24,"end":30,"id":3},{"text":"chain","start":31,"end":36,"id":4},{"text":"for","start":37,"end":40,"id":5},{"text":"threat","start":41,"end":47,"id":6},{"text":"intel","start":48,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Implemented Mobile Security controls and monitoring.","spans":[{"start":12,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":43300447,"_task_hash":977240495,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Mobile","start":12,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"controls","start":28,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"monitoring","start":41,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Front\u2011End Developer with 5+ years experience in Container Orchestration, Project Coordination, and Monitoring Tools.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":99,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1317466646,"_task_hash":347397556,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"5","start":25,"end":26,"id":3},{"text":"+","start":26,"end":27,"id":4},{"text":"years","start":28,"end":33,"id":5},{"text":"experience","start":34,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Container","start":48,"end":57,"id":8},{"text":"Orchestration","start":58,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Project","start":73,"end":80,"id":11},{"text":"Coordination","start":81,"end":93,"id":12},{"text":",","start":93,"end":94,"id":13},{"text":"and","start":95,"end":98,"id":14},{"text":"Monitoring","start":99,"end":109,"id":15},{"text":"Tools","start":110,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} {"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"UI Designer role available: Privacy by Design experience required, GCP Security knowledge essential.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":28,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":480437965,"_task_hash":-1075861839,"tokens":[{"text":"UI","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"role","start":12,"end":16,"id":2},{"text":"available","start":17,"end":26,"id":3},{"text":":","start":26,"end":27,"id":4},{"text":"Privacy","start":28,"end":35,"id":5},{"text":"by","start":36,"end":38,"id":6},{"text":"Design","start":39,"end":45,"id":7},{"text":"experience","start":46,"end":56,"id":8},{"text":"required","start":57,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"GCP","start":67,"end":70,"id":11},{"text":"Security","start":71,"end":79,"id":12},{"text":"knowledge","start":80,"end":89,"id":13},{"text":"essential","start":90,"end":99,"id":14},{"text":".","start":99,"end":100,"id":15}]} {"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Lead Threat Detection Specialist managing Privacy Training and Phishing Detection initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-841966876,"_task_hash":715922514,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Threat","start":5,"end":11,"id":1},{"text":"Detection","start":12,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Privacy","start":42,"end":49,"id":5},{"text":"Training","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Phishing","start":63,"end":71,"id":8},{"text":"Detection","start":72,"end":81,"id":9},{"text":"initiatives","start":82,"end":93,"id":10},{"text":".","start":93,"end":94,"id":11}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Game Programmer professional with 5+ years implementing SIEM Operations and managing Post-incident Review programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":85,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-8474384,"_task_hash":839763558,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Programmer","start":5,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"5","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"implementing","start":43,"end":55,"id":7},{"text":"SIEM","start":56,"end":60,"id":8},{"text":"Operations","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"managing","start":76,"end":84,"id":11},{"text":"Post","start":85,"end":89,"id":12},{"text":"-","start":89,"end":90,"id":13},{"text":"incident","start":90,"end":98,"id":14},{"text":"Review","start":99,"end":105,"id":15},{"text":"programs","start":106,"end":114,"id":16},{"text":".","start":114,"end":115,"id":17}]} {"text":"Network Security Engineer experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1009607125,"_task_hash":-593704316,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"SIEM","start":72,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Kubernetes Security Engineer role available: Test Frameworks experience required, Building Security knowledge essential.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":433548668,"_task_hash":-307689777,"tokens":[{"text":"Kubernetes","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"role","start":29,"end":33,"id":3},{"text":"available","start":34,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"Test","start":45,"end":49,"id":6},{"text":"Frameworks","start":50,"end":60,"id":7},{"text":"experience","start":61,"end":71,"id":8},{"text":"required","start":72,"end":80,"id":9},{"text":",","start":80,"end":81,"id":10},{"text":"Building","start":82,"end":90,"id":11},{"text":"Security","start":91,"end":99,"id":12},{"text":"knowledge","start":100,"end":109,"id":13},{"text":"essential","start":110,"end":119,"id":14},{"text":".","start":119,"end":120,"id":15}]} {"text":"NIS2 familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-202128334,"_task_hash":-1609255822,"tokens":[{"text":"NIS2","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Fullstack Engineer with hands-on experience in QRadar, QRadar, and Kubernetes Security.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":55,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":67,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1719071285,"_task_hash":-915049459,"tokens":[{"text":"Fullstack","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"QRadar","start":47,"end":53,"id":8},{"text":",","start":53,"end":54,"id":9},{"text":"QRadar","start":55,"end":61,"id":10},{"text":",","start":61,"end":62,"id":11},{"text":"and","start":63,"end":66,"id":12},{"text":"Kubernetes","start":67,"end":77,"id":13},{"text":"Security","start":78,"end":86,"id":14},{"text":".","start":86,"end":87,"id":15}]} {"text":"Holds OPA.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1953373167,"_task_hash":625579373,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OPA","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Trained staff on SEC Cyber Rules obligations.","spans":[{"start":17,"end":32,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-811936741,"_task_hash":898325659,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"SEC","start":17,"end":20,"id":3},{"text":"Cyber","start":21,"end":26,"id":4},{"text":"Rules","start":27,"end":32,"id":5},{"text":"obligations","start":33,"end":44,"id":6},{"text":".","start":44,"end":45,"id":7}]} {"text":"Certified SABSA working as Cloud Infrastructure Security Engineer, focused on Security Champions Program and Privilege Escalation prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":65,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7},{"start":78,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":109,"end":129,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":2112627536,"_task_hash":616430463,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Cloud","start":27,"end":32,"id":4},{"text":"Infrastructure","start":33,"end":47,"id":5},{"text":"Security","start":48,"end":56,"id":6},{"text":"Engineer","start":57,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"focused","start":67,"end":74,"id":9},{"text":"on","start":75,"end":77,"id":10},{"text":"Security","start":78,"end":86,"id":11},{"text":"Champions","start":87,"end":96,"id":12},{"text":"Program","start":97,"end":104,"id":13},{"text":"and","start":105,"end":108,"id":14},{"text":"Privilege","start":109,"end":118,"id":15},{"text":"Escalation","start":119,"end":129,"id":16},{"text":"prevention","start":130,"end":140,"id":17},{"text":".","start":140,"end":141,"id":18}]} {"text":"Certified in IAM administration.","spans":[{"start":13,"end":16,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1123620820,"_task_hash":545596055,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"in","start":10,"end":12,"id":1},{"text":"IAM","start":13,"end":16,"id":2},{"text":"administration","start":17,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"Crisis Management Specialist with hands-on experience in QRadar, Metasploit, and Service Mesh Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":65,"end":75,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":81,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1569793495,"_task_hash":439698770,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Management","start":7,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"QRadar","start":57,"end":63,"id":9},{"text":",","start":63,"end":64,"id":10},{"text":"Metasploit","start":65,"end":75,"id":11},{"text":",","start":75,"end":76,"id":12},{"text":"and","start":77,"end":80,"id":13},{"text":"Service","start":81,"end":88,"id":14},{"text":"Mesh","start":89,"end":93,"id":15},{"text":"Security","start":94,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} {"text":"Holds NIST RMF.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1769087407,"_task_hash":-23255768,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"NIST","start":6,"end":10,"id":1},{"text":"RMF","start":11,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Identity & Access Management Expert professional with 3+ years implementing QRadar and managing AI Integration programs.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":76,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":96,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1067848714,"_task_hash":1345428331,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"professional","start":36,"end":48,"id":5},{"text":"with","start":49,"end":53,"id":6},{"text":"3","start":54,"end":55,"id":7},{"text":"+","start":55,"end":56,"id":8},{"text":"years","start":57,"end":62,"id":9},{"text":"implementing","start":63,"end":75,"id":10},{"text":"QRadar","start":76,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"managing","start":87,"end":95,"id":13},{"text":"AI","start":96,"end":98,"id":14},{"text":"Integration","start":99,"end":110,"id":15},{"text":"programs","start":111,"end":119,"id":16},{"text":".","start":119,"end":120,"id":17}]} {"text":"Created YARA rules for Golden Ticket detection.","spans":[{"start":23,"end":36,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-511816531,"_task_hash":1818665315,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Golden","start":23,"end":29,"id":4},{"text":"Ticket","start":30,"end":36,"id":5},{"text":"detection","start":37,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Hiring Cybersecurity Risk Analyst for Root Cause Analysis and botnet detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":62,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-666468590,"_task_hash":2015867182,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Cybersecurity","start":7,"end":20,"id":1},{"text":"Risk","start":21,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Root","start":38,"end":42,"id":5},{"text":"Cause","start":43,"end":48,"id":6},{"text":"Analysis","start":49,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"botnet","start":62,"end":68,"id":9},{"text":"detection","start":69,"end":78,"id":10},{"text":".","start":78,"end":79,"id":11}]} {"text":"COPPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-467222272,"_task_hash":59755085,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Interface Designer role available: Red Team Operations experience required, Service Mesh Security knowledge essential.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":35,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":76,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1836239873,"_task_hash":-2053797329,"tokens":[{"text":"Interface","start":0,"end":9,"id":0},{"text":"Designer","start":10,"end":18,"id":1},{"text":"role","start":19,"end":23,"id":2},{"text":"available","start":24,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"Red","start":35,"end":38,"id":5},{"text":"Team","start":39,"end":43,"id":6},{"text":"Operations","start":44,"end":54,"id":7},{"text":"experience","start":55,"end":65,"id":8},{"text":"required","start":66,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"Service","start":76,"end":83,"id":11},{"text":"Mesh","start":84,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"knowledge","start":98,"end":107,"id":14},{"text":"essential","start":108,"end":117,"id":15},{"text":".","start":117,"end":118,"id":16}]} {"text":"HIPAA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-484932612,"_task_hash":-1879933100,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Insider Risk Analyst needed for enterprise security team.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1485789952,"_task_hash":-1651179288,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"needed","start":21,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"security","start":43,"end":51,"id":6},{"text":"team","start":52,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Required: JIRA, EDR Platforms, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1273461611,"_task_hash":-849382773,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"JIRA","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Platforms","start":20,"end":29,"id":5},{"text":",","start":29,"end":30,"id":6},{"text":"and","start":31,"end":34,"id":7},{"text":"NIST","start":35,"end":39,"id":8},{"text":"Framework","start":40,"end":49,"id":9},{"text":"expertise","start":50,"end":59,"id":10},{"text":".","start":59,"end":60,"id":11}]} {"text":"Lead Cybersecurity Analyst managing Industrial Control Systems and Adversary Emulation initiatives.","spans":[{"start":5,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-715866232,"_task_hash":-522596987,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cybersecurity","start":5,"end":18,"id":1},{"text":"Analyst","start":19,"end":26,"id":2},{"text":"managing","start":27,"end":35,"id":3},{"text":"Industrial","start":36,"end":46,"id":4},{"text":"Control","start":47,"end":54,"id":5},{"text":"Systems","start":55,"end":62,"id":6},{"text":"and","start":63,"end":66,"id":7},{"text":"Adversary","start":67,"end":76,"id":8},{"text":"Emulation","start":77,"end":86,"id":9},{"text":"initiatives","start":87,"end":98,"id":10},{"text":".","start":98,"end":99,"id":11}]} {"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Threat Analyst with hands-on experience in CrowdStrike, Wireshark, and Cloud Security.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1637800776,"_task_hash":-714012994,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Analyst","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"hands","start":20,"end":25,"id":3},{"text":"-","start":25,"end":26,"id":4},{"text":"on","start":26,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"CrowdStrike","start":43,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"Wireshark","start":56,"end":65,"id":10},{"text":",","start":65,"end":66,"id":11},{"text":"and","start":67,"end":70,"id":12},{"text":"Cloud","start":71,"end":76,"id":13},{"text":"Security","start":77,"end":85,"id":14},{"text":".","start":85,"end":86,"id":15}]} {"text":"Holds OSCP Certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851475902,"_task_hash":270501489,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Immediate opening for Business Data Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1295879884,"_task_hash":1315078640,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Business","start":22,"end":30,"id":3},{"text":"Data","start":31,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Required skills: SIEM, IDS/IPS, ETL certification.","spans":[{"start":17,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":23,"end":30,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":32,"end":35,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-697463645,"_task_hash":434575365,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":",","start":21,"end":22,"id":4},{"text":"IDS","start":23,"end":26,"id":5},{"text":"/","start":26,"end":27,"id":6},{"text":"IPS","start":27,"end":30,"id":7},{"text":",","start":30,"end":31,"id":8},{"text":"ETL","start":32,"end":35,"id":9},{"text":"certification","start":36,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} {"text":"Lead CTI Analyst managing Kinematics and Mentoring initiatives.","spans":[{"start":5,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":26,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1047638362,"_task_hash":194913407,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"CTI","start":5,"end":8,"id":1},{"text":"Analyst","start":9,"end":16,"id":2},{"text":"managing","start":17,"end":25,"id":3},{"text":"Kinematics","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Mentoring","start":41,"end":50,"id":6},{"text":"initiatives","start":51,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Threat Hunter with CRISC certification, expert in Microsoft Defender.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":19,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":50,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1784223371,"_task_hash":-473142080,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"CRISC","start":19,"end":24,"id":3},{"text":"certification","start":25,"end":38,"id":4},{"text":",","start":38,"end":39,"id":5},{"text":"expert","start":40,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Microsoft","start":50,"end":59,"id":8},{"text":"Defender","start":60,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} {"text":"We need a Incident Manager skilled in Password Spraying prevention and Man-in-the-Middle analysis using Metasploit.","spans":[{"start":10,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":38,"end":55,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":71,"end":88,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":17},{"start":104,"end":114,"label":"SECURITY_TOOL","answer":"accept","token_start":20,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1820634383,"_task_hash":620663639,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Incident","start":10,"end":18,"id":3},{"text":"Manager","start":19,"end":26,"id":4},{"text":"skilled","start":27,"end":34,"id":5},{"text":"in","start":35,"end":37,"id":6},{"text":"Password","start":38,"end":46,"id":7},{"text":"Spraying","start":47,"end":55,"id":8},{"text":"prevention","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"Man","start":71,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"in","start":75,"end":77,"id":13},{"text":"-","start":77,"end":78,"id":14},{"text":"the","start":78,"end":81,"id":15},{"text":"-","start":81,"end":82,"id":16},{"text":"Middle","start":82,"end":88,"id":17},{"text":"analysis","start":89,"end":97,"id":18},{"text":"using","start":98,"end":103,"id":19},{"text":"Metasploit","start":104,"end":114,"id":20},{"text":".","start":114,"end":115,"id":21}]} {"text":"Looking for GRC Specialist to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":732397461,"_task_hash":-611234639,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"GRC","start":12,"end":15,"id":2},{"text":"Specialist","start":16,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Cloud","start":35,"end":40,"id":6},{"text":"Security","start":41,"end":49,"id":7},{"text":"Testing","start":50,"end":57,"id":8},{"text":"initiatives","start":58,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Must have Nessus experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-889543638,"_task_hash":-1537583104,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Cyber Threat Hunter professional with 3++ years implementing SIEM and managing Privacy Training programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":61,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":79,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":110081951,"_task_hash":836296542,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Threat","start":6,"end":12,"id":1},{"text":"Hunter","start":13,"end":19,"id":2},{"text":"professional","start":20,"end":32,"id":3},{"text":"with","start":33,"end":37,"id":4},{"text":"3++","start":38,"end":41,"id":5},{"text":"years","start":42,"end":47,"id":6},{"text":"implementing","start":48,"end":60,"id":7},{"text":"SIEM","start":61,"end":65,"id":8},{"text":"and","start":66,"end":69,"id":9},{"text":"managing","start":70,"end":78,"id":10},{"text":"Privacy","start":79,"end":86,"id":11},{"text":"Training","start":87,"end":95,"id":12},{"text":"programs","start":96,"end":104,"id":13},{"text":".","start":104,"end":105,"id":14}]} {"text":"Trained staff on FISMA obligations.","spans":[{"start":17,"end":22,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1635666560,"_task_hash":-344639101,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"FISMA","start":17,"end":22,"id":3},{"text":"obligations","start":23,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Troubleshot CNAPP performance issues.","spans":[{"start":12,"end":17,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":702497809,"_task_hash":1080442267,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"CNAPP","start":12,"end":17,"id":1},{"text":"performance","start":18,"end":29,"id":2},{"text":"issues","start":30,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Troubleshot SDK performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1},{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2081855621,"_task_hash":-1017963671,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"SDK","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"Lead Cryptography Expert managing Graphics and Cost Optimization initiatives.","spans":[{"start":5,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":47,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1172717004,"_task_hash":2138035114,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cryptography","start":5,"end":17,"id":1},{"text":"Expert","start":18,"end":24,"id":2},{"text":"managing","start":25,"end":33,"id":3},{"text":"Graphics","start":34,"end":42,"id":4},{"text":"and","start":43,"end":46,"id":5},{"text":"Cost","start":47,"end":51,"id":6},{"text":"Optimization","start":52,"end":64,"id":7},{"text":"initiatives","start":65,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"AI Security Architect opportunity: Lead Security Protocols program, implement NIST Framework, manage AI Policy operations.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":78,"end":92,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":101,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1485748332,"_task_hash":-726561888,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"opportunity","start":22,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"Lead","start":35,"end":39,"id":5},{"text":"Security","start":40,"end":48,"id":6},{"text":"Protocols","start":49,"end":58,"id":7},{"text":"program","start":59,"end":66,"id":8},{"text":",","start":66,"end":67,"id":9},{"text":"implement","start":68,"end":77,"id":10},{"text":"NIST","start":78,"end":82,"id":11},{"text":"Framework","start":83,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"manage","start":94,"end":100,"id":14},{"text":"AI","start":101,"end":103,"id":15},{"text":"Policy","start":104,"end":110,"id":16},{"text":"operations","start":111,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} {"text":"Managed Preventive Action across multiple business units.","spans":[{"start":8,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":865580847,"_task_hash":1692101333,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"Preventive","start":8,"end":18,"id":1},{"text":"Action","start":19,"end":25,"id":2},{"text":"across","start":26,"end":32,"id":3},{"text":"multiple","start":33,"end":41,"id":4},{"text":"business","start":42,"end":50,"id":5},{"text":"units","start":51,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Published research on Vulnerability Management trends.","spans":[{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1676893889,"_task_hash":562901527,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Vulnerability","start":22,"end":35,"id":3},{"text":"Management","start":36,"end":46,"id":4},{"text":"trends","start":47,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Tested systems for CVE-2022-42475 vulnerability.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":614733751,"_task_hash":-1011968986,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"systems","start":7,"end":14,"id":1},{"text":"for","start":15,"end":18,"id":2},{"text":"CVE-2022","start":19,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"42475","start":28,"end":33,"id":5},{"text":"vulnerability","start":34,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Network Security Specialist opportunity: Lead Security Protocols program, implement NIST Framework, manage Server-Side Development operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":98,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":107,"end":130,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-2105493264,"_task_hash":-1322085816,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Protocols","start":55,"end":64,"id":7},{"text":"program","start":65,"end":72,"id":8},{"text":",","start":72,"end":73,"id":9},{"text":"implement","start":74,"end":83,"id":10},{"text":"NIST","start":84,"end":88,"id":11},{"text":"Framework","start":89,"end":98,"id":12},{"text":",","start":98,"end":99,"id":13},{"text":"manage","start":100,"end":106,"id":14},{"text":"Server","start":107,"end":113,"id":15},{"text":"-","start":113,"end":114,"id":16},{"text":"Side","start":114,"end":118,"id":17},{"text":"Development","start":119,"end":130,"id":18},{"text":"operations","start":131,"end":141,"id":19},{"text":".","start":141,"end":142,"id":20}]} {"text":"Join our team as Malware Analyst!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2100412113,"_task_hash":-1992245730,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Malware","start":17,"end":24,"id":4},{"text":"Analyst","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} {"text":"Must know Wireshark, Metasploit, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1990514557,"_task_hash":-2062444498,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Metasploit","start":21,"end":31,"id":4},{"text":",","start":31,"end":32,"id":5},{"text":"and","start":33,"end":36,"id":6},{"text":"OWASP","start":37,"end":42,"id":7},{"text":"Top","start":43,"end":46,"id":8},{"text":"10","start":47,"end":49,"id":9},{"text":".","start":49,"end":50,"id":10}]} {"text":"TOGAF certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1611953164,"_task_hash":629751826,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Ensured compliance with PDPA requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1858430365,"_task_hash":-1864167614,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"PDPA","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Director of Security with expertise in NIST Framework compliance and AI Auditing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-145505810,"_task_hash":1722454309,"tokens":[{"text":"Director","start":0,"end":8,"id":0},{"text":"of","start":9,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"AI","start":69,"end":71,"id":10},{"text":"Auditing","start":72,"end":80,"id":11},{"text":"operations","start":81,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Accomplished Data Privacy Consultant specializing in Data Warehousing and Security Culture Building.","spans":[{"start":13,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":74,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1495516960,"_task_hash":-1733013922,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Data","start":13,"end":17,"id":1},{"text":"Privacy","start":18,"end":25,"id":2},{"text":"Consultant","start":26,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Data","start":53,"end":57,"id":6},{"text":"Warehousing","start":58,"end":69,"id":7},{"text":"and","start":70,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":"Culture","start":83,"end":90,"id":10},{"text":"Building","start":91,"end":99,"id":11},{"text":".","start":99,"end":100,"id":12}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Senior Developer experienced in detecting spyware attacks using Burp Suite.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":64,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1141641606,"_task_hash":391730417,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Developer","start":7,"end":16,"id":1},{"text":"experienced","start":17,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"detecting","start":32,"end":41,"id":4},{"text":"spyware","start":42,"end":49,"id":5},{"text":"attacks","start":50,"end":57,"id":6},{"text":"using","start":58,"end":63,"id":7},{"text":"Burp","start":64,"end":68,"id":8},{"text":"Suite","start":69,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Immediate opening for Senior Developer.","spans":[{"start":22,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1320720908,"_task_hash":1501320795,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Senior","start":22,"end":28,"id":3},{"text":"Developer","start":29,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Required skills: Nessus, Systematic Review, GDPR certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1560273941,"_task_hash":-1236174476,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Systematic","start":25,"end":35,"id":5},{"text":"Review","start":36,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"GDPR","start":44,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} {"text":"Lead Big Data Engineer managing Technical Documentation and User Psychology initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1745808371,"_task_hash":1880833740,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Big","start":5,"end":8,"id":1},{"text":"Data","start":9,"end":13,"id":2},{"text":"Engineer","start":14,"end":22,"id":3},{"text":"managing","start":23,"end":31,"id":4},{"text":"Technical","start":32,"end":41,"id":5},{"text":"Documentation","start":42,"end":55,"id":6},{"text":"and","start":56,"end":59,"id":7},{"text":"User","start":60,"end":64,"id":8},{"text":"Psychology","start":65,"end":75,"id":9},{"text":"initiatives","start":76,"end":87,"id":10},{"text":".","start":87,"end":88,"id":11}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Computer Forensics Investigator experienced in detecting rootkit attacks using SIEM.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":79,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":362333874,"_task_hash":1552502746,"tokens":[{"text":"Computer","start":0,"end":8,"id":0},{"text":"Forensics","start":9,"end":18,"id":1},{"text":"Investigator","start":19,"end":31,"id":2},{"text":"experienced","start":32,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"detecting","start":47,"end":56,"id":5},{"text":"rootkit","start":57,"end":64,"id":6},{"text":"attacks","start":65,"end":72,"id":7},{"text":"using","start":73,"end":78,"id":8},{"text":"SIEM","start":79,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Led incident response for CVE-2021-34527 exploitation.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-626258069,"_task_hash":1810080470,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2021","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"34527","start":35,"end":40,"id":6},{"text":"exploitation","start":41,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Senior Video Game Developer skilled in Version Control, Threat Assessment, and Azure Security.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2126103856,"_task_hash":57899092,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Video","start":7,"end":12,"id":1},{"text":"Game","start":13,"end":17,"id":2},{"text":"Developer","start":18,"end":27,"id":3},{"text":"skilled","start":28,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"Version","start":39,"end":46,"id":6},{"text":"Control","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"Threat","start":56,"end":62,"id":9},{"text":"Assessment","start":63,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Azure","start":79,"end":84,"id":13},{"text":"Security","start":85,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} {"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Tracked supply chain attack group activities and TTPs.","spans":[{"start":8,"end":27,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":767526122,"_task_hash":-1072494143,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"supply","start":8,"end":14,"id":1},{"text":"chain","start":15,"end":20,"id":2},{"text":"attack","start":21,"end":27,"id":3},{"text":"group","start":28,"end":33,"id":4},{"text":"activities","start":34,"end":44,"id":5},{"text":"and","start":45,"end":48,"id":6},{"text":"TTPs","start":49,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Implemented workaround for CVE-2020-1472 until patch available.","spans":[{"start":27,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1189438104,"_task_hash":413033390,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2020","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"1472","start":36,"end":40,"id":5},{"text":"until","start":41,"end":46,"id":6},{"text":"patch","start":47,"end":52,"id":7},{"text":"available","start":53,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Identity & Access Management Expert with hands-on experience in Nessus, Splunk, and Cloud Access Security Broker.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13},{"start":84,"end":112,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-190648664,"_task_hash":-38965933,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"hands","start":41,"end":46,"id":6},{"text":"-","start":46,"end":47,"id":7},{"text":"on","start":47,"end":49,"id":8},{"text":"experience","start":50,"end":60,"id":9},{"text":"in","start":61,"end":63,"id":10},{"text":"Nessus","start":64,"end":70,"id":11},{"text":",","start":70,"end":71,"id":12},{"text":"Splunk","start":72,"end":78,"id":13},{"text":",","start":78,"end":79,"id":14},{"text":"and","start":80,"end":83,"id":15},{"text":"Cloud","start":84,"end":89,"id":16},{"text":"Access","start":90,"end":96,"id":17},{"text":"Security","start":97,"end":105,"id":18},{"text":"Broker","start":106,"end":112,"id":19},{"text":".","start":112,"end":113,"id":20}]} {"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Senior Hardware Engineer position: 5+ years minimum, expert in HR Collaboration, Root Cause Analysis, and Cloud Access Security Broker.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":63,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17},{"start":106,"end":134,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1819278888,"_task_hash":1169700738,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Hardware","start":7,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"position","start":25,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"5","start":35,"end":36,"id":5},{"text":"+","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"minimum","start":44,"end":51,"id":8},{"text":",","start":51,"end":52,"id":9},{"text":"expert","start":53,"end":59,"id":10},{"text":"in","start":60,"end":62,"id":11},{"text":"HR","start":63,"end":65,"id":12},{"text":"Collaboration","start":66,"end":79,"id":13},{"text":",","start":79,"end":80,"id":14},{"text":"Root","start":81,"end":85,"id":15},{"text":"Cause","start":86,"end":91,"id":16},{"text":"Analysis","start":92,"end":100,"id":17},{"text":",","start":100,"end":101,"id":18},{"text":"and","start":102,"end":105,"id":19},{"text":"Cloud","start":106,"end":111,"id":20},{"text":"Access","start":112,"end":118,"id":21},{"text":"Security","start":119,"end":127,"id":22},{"text":"Broker","start":128,"end":134,"id":23},{"text":".","start":134,"end":135,"id":24}]} {"text":"Trained developers on Heap Overflow prevention.","spans":[{"start":22,"end":35,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1406890519,"_task_hash":-27071094,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Heap","start":22,"end":26,"id":3},{"text":"Overflow","start":27,"end":35,"id":4},{"text":"prevention","start":36,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Experienced Information Specialist specializing in Security Culture.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2070465964,"_task_hash":1039474500,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Information","start":12,"end":23,"id":1},{"text":"Specialist","start":24,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Security","start":51,"end":59,"id":5},{"text":"Culture","start":60,"end":67,"id":6},{"text":".","start":67,"end":68,"id":7}]} {"text":"Proficient in SIEM Operations and SIEM Operations.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-805624968,"_task_hash":-2030563451,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":"Operations","start":39,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Data Protection Officer experienced in detecting DDoS attacks using CrowdStrike.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":68,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":264501389,"_task_hash":25981439,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Protection","start":5,"end":15,"id":1},{"text":"Officer","start":16,"end":23,"id":2},{"text":"experienced","start":24,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"detecting","start":39,"end":48,"id":5},{"text":"DDoS","start":49,"end":53,"id":6},{"text":"attacks","start":54,"end":61,"id":7},{"text":"using","start":62,"end":67,"id":8},{"text":"CrowdStrike","start":68,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Certified ISO 27001 working as Web Developer, focused on Kubernetes Security and Clickjacking prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":57,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":93,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":509210017,"_task_hash":-937146025,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"27001","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"Web","start":31,"end":34,"id":5},{"text":"Developer","start":35,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Kubernetes","start":57,"end":67,"id":10},{"text":"Security","start":68,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Clickjacking","start":81,"end":93,"id":13},{"text":"prevention","start":94,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} {"text":"Hiring Forensic Examiner for React Native and worm detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":46,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1241334109,"_task_hash":-1428753276,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"React","start":29,"end":34,"id":4},{"text":"Native","start":35,"end":41,"id":5},{"text":"and","start":42,"end":45,"id":6},{"text":"worm","start":46,"end":50,"id":7},{"text":"detection","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Senior Front\u2011End Developer skilled in User Behavior Analysis, Test Reporting, and Embedded Systems Security.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":38,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2029727934,"_task_hash":-1126146079,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Front\u2011End","start":7,"end":16,"id":1},{"text":"Developer","start":17,"end":26,"id":2},{"text":"skilled","start":27,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"User","start":38,"end":42,"id":5},{"text":"Behavior","start":43,"end":51,"id":6},{"text":"Analysis","start":52,"end":60,"id":7},{"text":",","start":60,"end":61,"id":8},{"text":"Test","start":62,"end":66,"id":9},{"text":"Reporting","start":67,"end":76,"id":10},{"text":",","start":76,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Embedded","start":82,"end":90,"id":13},{"text":"Systems","start":91,"end":98,"id":14},{"text":"Security","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"STIX/TAXII certified.","spans":[{"start":0,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1844797163,"_task_hash":-642556357,"tokens":[{"text":"STIX","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"TAXII","start":5,"end":10,"id":2},{"text":"certified","start":11,"end":20,"id":3},{"text":".","start":20,"end":21,"id":4}]} {"text":"Game Programmer with 10+ years experience in R, Cost Optimization, and Quantitative Research.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":48,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":71,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":53351342,"_task_hash":-1074587436,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Programmer","start":5,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"10","start":21,"end":23,"id":3},{"text":"+","start":23,"end":24,"id":4},{"text":"years","start":25,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"R","start":45,"end":46,"id":8},{"text":",","start":46,"end":47,"id":9},{"text":"Cost","start":48,"end":52,"id":10},{"text":"Optimization","start":53,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Quantitative","start":71,"end":83,"id":14},{"text":"Research","start":84,"end":92,"id":15},{"text":".","start":92,"end":93,"id":16}]} {"text":"Holds OSINT certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1710785194,"_task_hash":-1379140320,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSINT","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Vendor Manager professional with 10++ years implementing CrowdStrike and managing Authentication programs.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":341697085,"_task_hash":1634630946,"tokens":[{"text":"Vendor","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"professional","start":15,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10++","start":33,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"CrowdStrike","start":57,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Authentication","start":82,"end":96,"id":10},{"text":"programs","start":97,"end":105,"id":11},{"text":".","start":105,"end":106,"id":12}]} {"text":"We need a Software Architect skilled in Credential Stuffing prevention and adware analysis using EDR Platforms.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":75,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":97,"end":110,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-347579817,"_task_hash":-2134789150,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Software","start":10,"end":18,"id":3},{"text":"Architect","start":19,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"Credential","start":40,"end":50,"id":7},{"text":"Stuffing","start":51,"end":59,"id":8},{"text":"prevention","start":60,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"adware","start":75,"end":81,"id":11},{"text":"analysis","start":82,"end":90,"id":12},{"text":"using","start":91,"end":96,"id":13},{"text":"EDR","start":97,"end":100,"id":14},{"text":"Platforms","start":101,"end":110,"id":15},{"text":".","start":110,"end":111,"id":16}]} {"text":"Cyber Forensics Analyst needed for enterprise security team.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2081256573,"_task_hash":301490327,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"needed","start":24,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"security","start":46,"end":54,"id":6},{"text":"team","start":55,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} {"text":"Implemented Cloud Security controls and monitoring.","spans":[{"start":12,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1430883564,"_task_hash":1149543654,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Cloud","start":12,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"monitoring","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Join our team as Cryptographic Engineer!","spans":[{"start":17,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1259104138,"_task_hash":-1372024753,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Cryptographic","start":17,"end":30,"id":4},{"text":"Engineer","start":31,"end":39,"id":5},{"text":"!","start":39,"end":40,"id":6}]} {"text":"Must know Nessus, Nessus, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1407982977,"_task_hash":-2097005556,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Nessus","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":".","start":44,"end":45,"id":9}]} {"text":"PRINCE2 certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":439813503,"_task_hash":1835233461,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certification","start":8,"end":21,"id":1},{"text":"a","start":22,"end":23,"id":2},{"text":"plus","start":24,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Machine Learning Researcher opportunity: Lead Security Awareness program, implement OWASP Top 10, manage Design Thinking operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":96,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":105,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1105247123,"_task_hash":296248582,"tokens":[{"text":"Machine","start":0,"end":7,"id":0},{"text":"Learning","start":8,"end":16,"id":1},{"text":"Researcher","start":17,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Awareness","start":55,"end":64,"id":7},{"text":"program","start":65,"end":72,"id":8},{"text":",","start":72,"end":73,"id":9},{"text":"implement","start":74,"end":83,"id":10},{"text":"OWASP","start":84,"end":89,"id":11},{"text":"Top","start":90,"end":93,"id":12},{"text":"10","start":94,"end":96,"id":13},{"text":",","start":96,"end":97,"id":14},{"text":"manage","start":98,"end":104,"id":15},{"text":"Design","start":105,"end":111,"id":16},{"text":"Thinking","start":112,"end":120,"id":17},{"text":"operations","start":121,"end":131,"id":18},{"text":".","start":131,"end":132,"id":19}]} {"text":"Experience with SSO platforms and integration.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-191473546,"_task_hash":84111667,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"SSO","start":16,"end":19,"id":2},{"text":"platforms","start":20,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"integration","start":34,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Remediated gaps identified in CIS Control 4 assessment.","spans":[{"start":30,"end":43,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-457484318,"_task_hash":-891663857,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"CIS","start":30,"end":33,"id":4},{"text":"Control","start":34,"end":41,"id":5},{"text":"4","start":42,"end":43,"id":6},{"text":"assessment","start":44,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"We need a Security Awareness Consultant skilled in SSRF prevention and DDoS analysis using SIEM.","spans":[{"start":10,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":51,"end":55,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":8},{"start":71,"end":75,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":91,"end":95,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-440466998,"_task_hash":-1710041281,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Security","start":10,"end":18,"id":3},{"text":"Awareness","start":19,"end":28,"id":4},{"text":"Consultant","start":29,"end":39,"id":5},{"text":"skilled","start":40,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"SSRF","start":51,"end":55,"id":8},{"text":"prevention","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"DDoS","start":71,"end":75,"id":11},{"text":"analysis","start":76,"end":84,"id":12},{"text":"using","start":85,"end":90,"id":13},{"text":"SIEM","start":91,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} {"text":"Managed NERC CIP certification process.","spans":[{"start":8,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":802791883,"_task_hash":1757782352,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"NERC","start":8,"end":12,"id":1},{"text":"CIP","start":13,"end":16,"id":2},{"text":"certification","start":17,"end":30,"id":3},{"text":"process","start":31,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Tested WAF rules against DCShadow payloads.","spans":[{"start":25,"end":33,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":499606901,"_task_hash":-673900372,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"DCShadow","start":25,"end":33,"id":4},{"text":"payloads","start":34,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Accomplished ML Security Architect specializing in Cryptanalysis and Kubernetes Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-806859345,"_task_hash":333871727,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"ML","start":13,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Architect","start":25,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Cryptanalysis","start":51,"end":64,"id":6},{"text":"and","start":65,"end":68,"id":7},{"text":"Kubernetes","start":69,"end":79,"id":8},{"text":"Security","start":80,"end":88,"id":9},{"text":".","start":88,"end":89,"id":10}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Senior Back-End Developer position: 7 years minimum, expert in Cisco, Documentation, and Wireless Security.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":63,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":70,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15},{"start":89,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-364695713,"_task_hash":1003410513,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"position","start":26,"end":34,"id":5},{"text":":","start":34,"end":35,"id":6},{"text":"7","start":36,"end":37,"id":7},{"text":"years","start":38,"end":43,"id":8},{"text":"minimum","start":44,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"expert","start":53,"end":59,"id":11},{"text":"in","start":60,"end":62,"id":12},{"text":"Cisco","start":63,"end":68,"id":13},{"text":",","start":68,"end":69,"id":14},{"text":"Documentation","start":70,"end":83,"id":15},{"text":",","start":83,"end":84,"id":16},{"text":"and","start":85,"end":88,"id":17},{"text":"Wireless","start":89,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} {"text":"Detected DCSync attack in production environment.","spans":[{"start":9,"end":15,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1584097413,"_task_hash":-61337918,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"DCSync","start":9,"end":15,"id":1},{"text":"attack","start":16,"end":22,"id":2},{"text":"in","start":23,"end":25,"id":3},{"text":"production","start":26,"end":36,"id":4},{"text":"environment","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Senior Back-End Developer skilled in Agile/Scrum, Log Analysis, and Security Systems.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":37,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":50,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":68,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1922017680,"_task_hash":1966841310,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"skilled","start":26,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"Agile","start":37,"end":42,"id":7},{"text":"/","start":42,"end":43,"id":8},{"text":"Scrum","start":43,"end":48,"id":9},{"text":",","start":48,"end":49,"id":10},{"text":"Log","start":50,"end":53,"id":11},{"text":"Analysis","start":54,"end":62,"id":12},{"text":",","start":62,"end":63,"id":13},{"text":"and","start":64,"end":67,"id":14},{"text":"Security","start":68,"end":76,"id":15},{"text":"Systems","start":77,"end":84,"id":16},{"text":".","start":84,"end":85,"id":17}]} {"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Automated Risk Assessment processes using scripts.","spans":[{"start":10,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":25,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":58638271,"_task_hash":-1069114071,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Risk","start":10,"end":14,"id":1},{"text":"Assessment","start":15,"end":25,"id":2},{"text":"processes","start":26,"end":35,"id":3},{"text":"using","start":36,"end":41,"id":4},{"text":"scripts","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Certified SQL working as DevOps Specialist, focused on Security Standards and SSRF prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":73,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":82,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1241914655,"_task_hash":336085658,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SQL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"DevOps","start":25,"end":31,"id":4},{"text":"Specialist","start":32,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Standards","start":64,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"SSRF","start":78,"end":82,"id":12},{"text":"prevention","start":83,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} {"text":"Managed ISO 27001 certification process.","spans":[{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1348017833,"_task_hash":1569066572,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"ISO","start":8,"end":11,"id":1},{"text":"27001","start":12,"end":17,"id":2},{"text":"certification","start":18,"end":31,"id":3},{"text":"process","start":32,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Presented Infrastructure Security updates to leadership.","spans":[{"start":10,"end":33,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1305410353,"_task_hash":448251569,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Infrastructure","start":10,"end":24,"id":1},{"text":"Security","start":25,"end":33,"id":2},{"text":"updates","start":34,"end":41,"id":3},{"text":"to","start":42,"end":44,"id":4},{"text":"leadership","start":45,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"Led ICS Security initiatives across organization.","spans":[{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2056751077,"_task_hash":-1585370482,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"ICS","start":4,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"initiatives","start":17,"end":28,"id":3},{"text":"across","start":29,"end":35,"id":4},{"text":"organization","start":36,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Mentored junior engineers in Application Security.","spans":[{"start":29,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":736348918,"_task_hash":2126774388,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Application","start":29,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Security Analyst with CISSP certification, expert in Rapid7.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2087050009,"_task_hash":118540194,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"CISSP","start":22,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Rapid7","start":53,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Certified C/C++ working as Video Game Developer, focused on Security Operations and XSS prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":60,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":516745117,"_task_hash":363867142,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"C","start":10,"end":11,"id":1},{"text":"/","start":11,"end":12,"id":2},{"text":"C++","start":12,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Video","start":27,"end":32,"id":6},{"text":"Game","start":33,"end":37,"id":7},{"text":"Developer","start":38,"end":47,"id":8},{"text":",","start":47,"end":48,"id":9},{"text":"focused","start":49,"end":56,"id":10},{"text":"on","start":57,"end":59,"id":11},{"text":"Security","start":60,"end":68,"id":12},{"text":"Operations","start":69,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"XSS","start":84,"end":87,"id":15},{"text":"prevention","start":88,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"Trained staff on COPPA obligations.","spans":[{"start":17,"end":22,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2047882249,"_task_hash":-942701427,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"COPPA","start":17,"end":22,"id":3},{"text":"obligations","start":23,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Lead Product Designer managing Model Explainability and Role-Based Access Control initiatives.","spans":[{"start":5,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":56,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-154545094,"_task_hash":880849628,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Product","start":5,"end":12,"id":1},{"text":"Designer","start":13,"end":21,"id":2},{"text":"managing","start":22,"end":30,"id":3},{"text":"Model","start":31,"end":36,"id":4},{"text":"Explainability","start":37,"end":51,"id":5},{"text":"and","start":52,"end":55,"id":6},{"text":"Role","start":56,"end":60,"id":7},{"text":"-","start":60,"end":61,"id":8},{"text":"Based","start":61,"end":66,"id":9},{"text":"Access","start":67,"end":73,"id":10},{"text":"Control","start":74,"end":81,"id":11},{"text":"initiatives","start":82,"end":93,"id":12},{"text":".","start":93,"end":94,"id":13}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Cyber Insurance Consultant professional with 5+ years implementing EDR Tools and managing Load Balancing programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":67,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":90,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":247194162,"_task_hash":-1930161273,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Insurance","start":6,"end":15,"id":1},{"text":"Consultant","start":16,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"5","start":45,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"implementing","start":54,"end":66,"id":8},{"text":"EDR","start":67,"end":70,"id":9},{"text":"Tools","start":71,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"managing","start":81,"end":89,"id":12},{"text":"Load","start":90,"end":94,"id":13},{"text":"Balancing","start":95,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} {"text":"Mitigated Fileless Malware through code remediation.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-804910381,"_task_hash":-980530543,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Fileless","start":10,"end":18,"id":1},{"text":"Malware","start":19,"end":26,"id":2},{"text":"through","start":27,"end":34,"id":3},{"text":"code","start":35,"end":39,"id":4},{"text":"remediation","start":40,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Cyberpunk Hacker with 10+ years experience in Intelligence Analysis, Third-Party Risk, and System Maintenance.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":91,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1570087959,"_task_hash":1698623478,"tokens":[{"text":"Cyberpunk","start":0,"end":9,"id":0},{"text":"Hacker","start":10,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Intelligence","start":46,"end":58,"id":8},{"text":"Analysis","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Third","start":69,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"Party","start":75,"end":80,"id":13},{"text":"Risk","start":81,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"and","start":87,"end":90,"id":16},{"text":"System","start":91,"end":97,"id":17},{"text":"Maintenance","start":98,"end":109,"id":18},{"text":".","start":109,"end":110,"id":19}]} {"text":"Holds ISO 31000 certification.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":461633574,"_task_hash":-1331949047,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"31000","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} {"text":"Cyber Forensics Analyst role available: Static Analysis experience required, Azure Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":122653602,"_task_hash":1823159266,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Static","start":40,"end":46,"id":6},{"text":"Analysis","start":47,"end":55,"id":7},{"text":"experience","start":56,"end":66,"id":8},{"text":"required","start":67,"end":75,"id":9},{"text":",","start":75,"end":76,"id":10},{"text":"Azure","start":77,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":"knowledge","start":92,"end":101,"id":13},{"text":"essential","start":102,"end":111,"id":14},{"text":".","start":111,"end":112,"id":15}]} {"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Automated Corrective Action processes using scripts.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":64594979,"_task_hash":-942340474,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Corrective","start":10,"end":20,"id":1},{"text":"Action","start":21,"end":27,"id":2},{"text":"processes","start":28,"end":37,"id":3},{"text":"using","start":38,"end":43,"id":4},{"text":"scripts","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"AI Researcher with expertise in NIST Framework compliance and Mobile Testing operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2084650241,"_task_hash":-292615317,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Researcher","start":3,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Mobile","start":62,"end":68,"id":9},{"text":"Testing","start":69,"end":76,"id":10},{"text":"operations","start":77,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} {"text":"Business Continuity Manager professional with 7+ years implementing Splunk and managing Privacy Training programs.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1707743092,"_task_hash":-1616230288,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Continuity","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"professional","start":28,"end":40,"id":3},{"text":"with","start":41,"end":45,"id":4},{"text":"7","start":46,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"Splunk","start":68,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"managing","start":79,"end":87,"id":11},{"text":"Privacy","start":88,"end":95,"id":12},{"text":"Training","start":96,"end":104,"id":13},{"text":"programs","start":105,"end":113,"id":14},{"text":".","start":113,"end":114,"id":15}]} {"text":"Red Team Lead with OSCP certification, expert in Check Point.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-352890884,"_task_hash":-1523589779,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Lead","start":9,"end":13,"id":2},{"text":"with","start":14,"end":18,"id":3},{"text":"OSCP","start":19,"end":23,"id":4},{"text":"certification","start":24,"end":37,"id":5},{"text":",","start":37,"end":38,"id":6},{"text":"expert","start":39,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Check","start":49,"end":54,"id":9},{"text":"Point","start":55,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} {"text":"Copywriter needed for enterprise security team.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-122257907,"_task_hash":215924090,"tokens":[{"text":"Copywriter","start":0,"end":10,"id":0},{"text":"needed","start":11,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"enterprise","start":22,"end":32,"id":3},{"text":"security","start":33,"end":41,"id":4},{"text":"team","start":42,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Required: HTML/CSS, Wireshark, and NIST Framework expertise.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":20,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2101613865,"_task_hash":-1265588248,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"HTML","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"CSS","start":15,"end":18,"id":4},{"text":",","start":18,"end":19,"id":5},{"text":"Wireshark","start":20,"end":29,"id":6},{"text":",","start":29,"end":30,"id":7},{"text":"and","start":31,"end":34,"id":8},{"text":"NIST","start":35,"end":39,"id":9},{"text":"Framework","start":40,"end":49,"id":10},{"text":"expertise","start":50,"end":59,"id":11},{"text":".","start":59,"end":60,"id":12}]} {"text":"Mentored junior engineers in Mobile Security.","spans":[{"start":29,"end":44,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1427029396,"_task_hash":-1208952021,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Mobile","start":29,"end":35,"id":4},{"text":"Security","start":36,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Join our team as Technical Support Specialist!","spans":[{"start":17,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1648986883,"_task_hash":345219952,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Specialist","start":35,"end":45,"id":6},{"text":"!","start":45,"end":46,"id":7}]} {"text":"Must know QRadar, Wireshark, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-938554939,"_task_hash":-1824185037,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Wireshark","start":18,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"NIST","start":33,"end":37,"id":7},{"text":"Framework","start":38,"end":47,"id":8},{"text":".","start":47,"end":48,"id":9}]} {"text":"SOC 2 certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":764903615,"_task_hash":317988584,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"certification","start":6,"end":19,"id":2},{"text":"a","start":20,"end":21,"id":3},{"text":"plus","start":22,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Insider Risk Analyst with 5+ years experience in Post-Incident Review, Zero Trust Architecture, and Multi-Cloud.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":12},{"start":71,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":16},{"start":100,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":19,"token_end":21}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1086643873,"_task_hash":-206759121,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"5","start":26,"end":27,"id":4},{"text":"+","start":27,"end":28,"id":5},{"text":"years","start":29,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Post","start":49,"end":53,"id":9},{"text":"-","start":53,"end":54,"id":10},{"text":"Incident","start":54,"end":62,"id":11},{"text":"Review","start":63,"end":69,"id":12},{"text":",","start":69,"end":70,"id":13},{"text":"Zero","start":71,"end":75,"id":14},{"text":"Trust","start":76,"end":81,"id":15},{"text":"Architecture","start":82,"end":94,"id":16},{"text":",","start":94,"end":95,"id":17},{"text":"and","start":96,"end":99,"id":18},{"text":"Multi","start":100,"end":105,"id":19},{"text":"-","start":105,"end":106,"id":20},{"text":"Cloud","start":106,"end":111,"id":21},{"text":".","start":111,"end":112,"id":22}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Join our team as Penetration Tester!","spans":[{"start":17,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2061733957,"_task_hash":942483020,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Penetration","start":17,"end":28,"id":4},{"text":"Tester","start":29,"end":35,"id":5},{"text":"!","start":35,"end":36,"id":6}]} {"text":"Must know Burp Suite, Metasploit, and NIST Framework.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1585024134,"_task_hash":2037856303,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":",","start":20,"end":21,"id":4},{"text":"Metasploit","start":22,"end":32,"id":5},{"text":",","start":32,"end":33,"id":6},{"text":"and","start":34,"end":37,"id":7},{"text":"NIST","start":38,"end":42,"id":8},{"text":"Framework","start":43,"end":52,"id":9},{"text":".","start":52,"end":53,"id":10}]} {"text":"GCP certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1241195216,"_task_hash":1934077859,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"We need a AppSec Engineer skilled in Remote Code Execution prevention and rootkit analysis using Burp Suite.","spans":[{"start":10,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":37,"end":58,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":9},{"start":74,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":97,"end":107,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1037088770,"_task_hash":369241225,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"AppSec","start":10,"end":16,"id":3},{"text":"Engineer","start":17,"end":25,"id":4},{"text":"skilled","start":26,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"Remote","start":37,"end":43,"id":7},{"text":"Code","start":44,"end":48,"id":8},{"text":"Execution","start":49,"end":58,"id":9},{"text":"prevention","start":59,"end":69,"id":10},{"text":"and","start":70,"end":73,"id":11},{"text":"rootkit","start":74,"end":81,"id":12},{"text":"analysis","start":82,"end":90,"id":13},{"text":"using","start":91,"end":96,"id":14},{"text":"Burp","start":97,"end":101,"id":15},{"text":"Suite","start":102,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} {"text":"Network Security Specialist with 5+ years experience in API Design, Firmware Analysis, and Embedded Systems.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":68,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":91,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-861137221,"_task_hash":-1498007845,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"5","start":33,"end":34,"id":4},{"text":"+","start":34,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"API","start":56,"end":59,"id":9},{"text":"Design","start":60,"end":66,"id":10},{"text":",","start":66,"end":67,"id":11},{"text":"Firmware","start":68,"end":76,"id":12},{"text":"Analysis","start":77,"end":85,"id":13},{"text":",","start":85,"end":86,"id":14},{"text":"and","start":87,"end":90,"id":15},{"text":"Embedded","start":91,"end":99,"id":16},{"text":"Systems","start":100,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Application Security Engineer with 7 years experience in Research Ethics, Threat Assessment, and Windows/Mac Support.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":97,"end":116,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1232973767,"_task_hash":1938608157,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"7","start":35,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Research","start":57,"end":65,"id":8},{"text":"Ethics","start":66,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Threat","start":74,"end":80,"id":11},{"text":"Assessment","start":81,"end":91,"id":12},{"text":",","start":91,"end":92,"id":13},{"text":"and","start":93,"end":96,"id":14},{"text":"Windows","start":97,"end":104,"id":15},{"text":"/","start":104,"end":105,"id":16},{"text":"Mac","start":105,"end":108,"id":17},{"text":"Support","start":109,"end":116,"id":18},{"text":".","start":116,"end":117,"id":19}]} {"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Server-Side Developer professional with 10++ years implementing Splunk and managing AI Red Teaming programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":84,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1987930789,"_task_hash":925744311,"tokens":[{"text":"Server","start":0,"end":6,"id":0},{"text":"-","start":6,"end":7,"id":1},{"text":"Side","start":7,"end":11,"id":2},{"text":"Developer","start":12,"end":21,"id":3},{"text":"professional","start":22,"end":34,"id":4},{"text":"with","start":35,"end":39,"id":5},{"text":"10++","start":40,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"implementing","start":51,"end":63,"id":8},{"text":"Splunk","start":64,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"managing","start":75,"end":83,"id":11},{"text":"AI","start":84,"end":86,"id":12},{"text":"Red","start":87,"end":90,"id":13},{"text":"Teaming","start":91,"end":98,"id":14},{"text":"programs","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"Implemented controls to prevent trojan attacks.","spans":[{"start":32,"end":38,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":38,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2012255244,"_task_hash":-370711691,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"trojan","start":32,"end":38,"id":4},{"text":"attacks","start":39,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Cyber Operations Manager with expertise in NIST Framework compliance and UX operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1371039119,"_task_hash":1461767823,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Operations","start":6,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"NIST","start":43,"end":47,"id":6},{"text":"Framework","start":48,"end":57,"id":7},{"text":"compliance","start":58,"end":68,"id":8},{"text":"and","start":69,"end":72,"id":9},{"text":"UX","start":73,"end":75,"id":10},{"text":"operations","start":76,"end":86,"id":11},{"text":".","start":86,"end":87,"id":12}]} {"text":"Published research on Risk Management trends.","spans":[{"start":22,"end":37,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1045878783,"_task_hash":906651529,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Risk","start":22,"end":26,"id":3},{"text":"Management","start":27,"end":37,"id":4},{"text":"trends","start":38,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Mentored junior engineers in GRC.","spans":[{"start":29,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4},{"start":29,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1302872541,"_task_hash":2147278594,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"GRC","start":29,"end":32,"id":4},{"text":".","start":32,"end":33,"id":5}]} {"text":"Managed Risk Assessment across multiple business units.","spans":[{"start":8,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":415587462,"_task_hash":392472273,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Assessment","start":13,"end":23,"id":2},{"text":"across","start":24,"end":30,"id":3},{"text":"multiple","start":31,"end":39,"id":4},{"text":"business","start":40,"end":48,"id":5},{"text":"units","start":49,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Ensured compliance with FedRAMP requirements.","spans":[{"start":24,"end":31,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":31,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-271239692,"_task_hash":-499046341,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"FedRAMP","start":24,"end":31,"id":3},{"text":"requirements","start":32,"end":44,"id":4},{"text":".","start":44,"end":45,"id":5}]} {"text":"UI Developer opportunity: Lead Model Security program, implement NIST Framework, manage Compliance Knowledge operations.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":79,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":11},{"start":88,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1298084215,"_task_hash":1781278755,"tokens":[{"text":"UI","start":0,"end":2,"id":0},{"text":"Developer","start":3,"end":12,"id":1},{"text":"opportunity","start":13,"end":24,"id":2},{"text":":","start":24,"end":25,"id":3},{"text":"Lead","start":26,"end":30,"id":4},{"text":"Model","start":31,"end":36,"id":5},{"text":"Security","start":37,"end":45,"id":6},{"text":"program","start":46,"end":53,"id":7},{"text":",","start":53,"end":54,"id":8},{"text":"implement","start":55,"end":64,"id":9},{"text":"NIST","start":65,"end":69,"id":10},{"text":"Framework","start":70,"end":79,"id":11},{"text":",","start":79,"end":80,"id":12},{"text":"manage","start":81,"end":87,"id":13},{"text":"Compliance","start":88,"end":98,"id":14},{"text":"Knowledge","start":99,"end":108,"id":15},{"text":"operations","start":109,"end":119,"id":16},{"text":".","start":119,"end":120,"id":17}]} {"text":"Tested effectiveness of ISO 27001 A.6.1 controls.","spans":[{"start":24,"end":39,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1720332587,"_task_hash":465963226,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"effectiveness","start":7,"end":20,"id":1},{"text":"of","start":21,"end":23,"id":2},{"text":"ISO","start":24,"end":27,"id":3},{"text":"27001","start":28,"end":33,"id":4},{"text":"A.6.1","start":34,"end":39,"id":5},{"text":"controls","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Red Team Operator with 3+ years experience in EnCase, Privacy Engineering, and Impact Assessment.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":54,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":79,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1856023887,"_task_hash":1089894271,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Operator","start":9,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"3","start":23,"end":24,"id":4},{"text":"+","start":24,"end":25,"id":5},{"text":"years","start":26,"end":31,"id":6},{"text":"experience","start":32,"end":42,"id":7},{"text":"in","start":43,"end":45,"id":8},{"text":"EnCase","start":46,"end":52,"id":9},{"text":",","start":52,"end":53,"id":10},{"text":"Privacy","start":54,"end":61,"id":11},{"text":"Engineering","start":62,"end":73,"id":12},{"text":",","start":73,"end":74,"id":13},{"text":"and","start":75,"end":78,"id":14},{"text":"Impact","start":79,"end":85,"id":15},{"text":"Assessment","start":86,"end":96,"id":16},{"text":".","start":96,"end":97,"id":17}]} {"text":"Holds TOGAF certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1058317034,"_task_hash":2099672658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Lead Digital Forensics Investigator managing E-Learning Development and Publication Experience initiatives.","spans":[{"start":5,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":45,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":72,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-356991092,"_task_hash":-802201269,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Digital","start":5,"end":12,"id":1},{"text":"Forensics","start":13,"end":22,"id":2},{"text":"Investigator","start":23,"end":35,"id":3},{"text":"managing","start":36,"end":44,"id":4},{"text":"E","start":45,"end":46,"id":5},{"text":"-","start":46,"end":47,"id":6},{"text":"Learning","start":47,"end":55,"id":7},{"text":"Development","start":56,"end":67,"id":8},{"text":"and","start":68,"end":71,"id":9},{"text":"Publication","start":72,"end":83,"id":10},{"text":"Experience","start":84,"end":94,"id":11},{"text":"initiatives","start":95,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Lead Technical Solutions Architect managing Hyperparameter Optimization and AI Governance initiatives.","spans":[{"start":5,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":44,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":76,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-147710371,"_task_hash":688292634,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Technical","start":5,"end":14,"id":1},{"text":"Solutions","start":15,"end":24,"id":2},{"text":"Architect","start":25,"end":34,"id":3},{"text":"managing","start":35,"end":43,"id":4},{"text":"Hyperparameter","start":44,"end":58,"id":5},{"text":"Optimization","start":59,"end":71,"id":6},{"text":"and","start":72,"end":75,"id":7},{"text":"AI","start":76,"end":78,"id":8},{"text":"Governance","start":79,"end":89,"id":9},{"text":"initiatives","start":90,"end":101,"id":10},{"text":".","start":101,"end":102,"id":11}]} {"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"We need a Machine Learning Product Manager skilled in XXE prevention and Supply Chain Attack analysis using CrowdStrike.","spans":[{"start":10,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":54,"end":57,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":9},{"start":73,"end":92,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":14},{"start":108,"end":119,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1801381321,"_task_hash":-607399080,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Machine","start":10,"end":17,"id":3},{"text":"Learning","start":18,"end":26,"id":4},{"text":"Product","start":27,"end":34,"id":5},{"text":"Manager","start":35,"end":42,"id":6},{"text":"skilled","start":43,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"XXE","start":54,"end":57,"id":9},{"text":"prevention","start":58,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Supply","start":73,"end":79,"id":12},{"text":"Chain","start":80,"end":85,"id":13},{"text":"Attack","start":86,"end":92,"id":14},{"text":"analysis","start":93,"end":101,"id":15},{"text":"using","start":102,"end":107,"id":16},{"text":"CrowdStrike","start":108,"end":119,"id":17},{"text":".","start":119,"end":120,"id":18}]} {"text":"Immediate opening for Cybersecurity Risk Analyst.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":279018486,"_task_hash":-1028091263,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cybersecurity","start":22,"end":35,"id":3},{"text":"Risk","start":36,"end":40,"id":4},{"text":"Analyst","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Required skills: Nessus, Content Management Systems, CI/CD certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":53,"end":58,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-954046890,"_task_hash":1061318086,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Content","start":25,"end":32,"id":5},{"text":"Management","start":33,"end":43,"id":6},{"text":"Systems","start":44,"end":51,"id":7},{"text":",","start":51,"end":52,"id":8},{"text":"CI","start":53,"end":55,"id":9},{"text":"/","start":55,"end":56,"id":10},{"text":"CD","start":56,"end":58,"id":11},{"text":"certification","start":59,"end":72,"id":12},{"text":".","start":72,"end":73,"id":13}]} {"text":"Developed Threat Intelligence strategy and roadmap.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-499934827,"_task_hash":757409479,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Threat","start":10,"end":16,"id":1},{"text":"Intelligence","start":17,"end":29,"id":2},{"text":"strategy","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"roadmap","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Implemented controls to prevent spear phishing attacks.","spans":[{"start":32,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":32517052,"_task_hash":1974899335,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"spear","start":32,"end":37,"id":4},{"text":"phishing","start":38,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Senior Forensic Examiner skilled in Elliptic Curve Cryptography, Log Analysis, and CI/CD Security.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":65,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":83,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2072756654,"_task_hash":-1196518591,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"skilled","start":25,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"Elliptic","start":36,"end":44,"id":5},{"text":"Curve","start":45,"end":50,"id":6},{"text":"Cryptography","start":51,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"Log","start":65,"end":68,"id":9},{"text":"Analysis","start":69,"end":77,"id":10},{"text":",","start":77,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"CI","start":83,"end":85,"id":13},{"text":"/","start":85,"end":86,"id":14},{"text":"CD","start":86,"end":88,"id":15},{"text":"Security","start":89,"end":97,"id":16},{"text":".","start":97,"end":98,"id":17}]} {"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Senior Front-End Developer position: 10+ years minimum, expert in Data Visualization, Agile Testing, and Security Culture Building.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":66,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":86,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18},{"start":105,"end":130,"label":"SECURITY_DOMAIN","answer":"accept","token_start":21,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":897170461,"_task_hash":1944662885,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Front","start":7,"end":12,"id":1},{"text":"-","start":12,"end":13,"id":2},{"text":"End","start":13,"end":16,"id":3},{"text":"Developer","start":17,"end":26,"id":4},{"text":"position","start":27,"end":35,"id":5},{"text":":","start":35,"end":36,"id":6},{"text":"10","start":37,"end":39,"id":7},{"text":"+","start":39,"end":40,"id":8},{"text":"years","start":41,"end":46,"id":9},{"text":"minimum","start":47,"end":54,"id":10},{"text":",","start":54,"end":55,"id":11},{"text":"expert","start":56,"end":62,"id":12},{"text":"in","start":63,"end":65,"id":13},{"text":"Data","start":66,"end":70,"id":14},{"text":"Visualization","start":71,"end":84,"id":15},{"text":",","start":84,"end":85,"id":16},{"text":"Agile","start":86,"end":91,"id":17},{"text":"Testing","start":92,"end":99,"id":18},{"text":",","start":99,"end":100,"id":19},{"text":"and","start":101,"end":104,"id":20},{"text":"Security","start":105,"end":113,"id":21},{"text":"Culture","start":114,"end":121,"id":22},{"text":"Building","start":122,"end":130,"id":23},{"text":".","start":130,"end":131,"id":24}]} {"text":"Accomplished Security Compliance Officer specializing in Control Mapping and Bluetooth Security.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1179755132,"_task_hash":1551877757,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Compliance","start":22,"end":32,"id":2},{"text":"Officer","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Control","start":57,"end":64,"id":6},{"text":"Mapping","start":65,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"Bluetooth","start":77,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Endpoint Protection Specialist role available: Bug Bounty Programs experience required, Security Patterns knowledge essential.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":88,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":903154708,"_task_hash":880452741,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Protection","start":9,"end":19,"id":1},{"text":"Specialist","start":20,"end":30,"id":2},{"text":"role","start":31,"end":35,"id":3},{"text":"available","start":36,"end":45,"id":4},{"text":":","start":45,"end":46,"id":5},{"text":"Bug","start":47,"end":50,"id":6},{"text":"Bounty","start":51,"end":57,"id":7},{"text":"Programs","start":58,"end":66,"id":8},{"text":"experience","start":67,"end":77,"id":9},{"text":"required","start":78,"end":86,"id":10},{"text":",","start":86,"end":87,"id":11},{"text":"Security","start":88,"end":96,"id":12},{"text":"Patterns","start":97,"end":105,"id":13},{"text":"knowledge","start":106,"end":115,"id":14},{"text":"essential","start":116,"end":125,"id":15},{"text":".","start":125,"end":126,"id":16}]} {"text":"HIPAA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-484932612,"_task_hash":-1879933100,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Tracked phishing group activities and TTPs.","spans":[{"start":8,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1844199501,"_task_hash":1236268072,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"phishing","start":8,"end":16,"id":1},{"text":"group","start":17,"end":22,"id":2},{"text":"activities","start":23,"end":33,"id":3},{"text":"and","start":34,"end":37,"id":4},{"text":"TTPs","start":38,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Responsible for EDR operations and maintenance.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-194740117,"_task_hash":1914215545,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"EDR","start":16,"end":19,"id":2},{"text":"operations","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"maintenance","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"SOC Analyst with GSEC certification, expert in YARA.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-45667420,"_task_hash":1231450688,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GSEC","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"YARA","start":47,"end":51,"id":8},{"text":".","start":51,"end":52,"id":9}]} {"text":"Developed detection for Heap Overflow attacks.","spans":[{"start":24,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1081972140,"_task_hash":1386714543,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Heap","start":24,"end":28,"id":3},{"text":"Overflow","start":29,"end":37,"id":4},{"text":"attacks","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"IAM Expert with hands-on experience in Splunk, Burp Suite, and BYOD Security.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":47,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":63,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":859163062,"_task_hash":1423883503,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"Expert","start":4,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"hands","start":16,"end":21,"id":3},{"text":"-","start":21,"end":22,"id":4},{"text":"on","start":22,"end":24,"id":5},{"text":"experience","start":25,"end":35,"id":6},{"text":"in","start":36,"end":38,"id":7},{"text":"Splunk","start":39,"end":45,"id":8},{"text":",","start":45,"end":46,"id":9},{"text":"Burp","start":47,"end":51,"id":10},{"text":"Suite","start":52,"end":57,"id":11},{"text":",","start":57,"end":58,"id":12},{"text":"and","start":59,"end":62,"id":13},{"text":"BYOD","start":63,"end":67,"id":14},{"text":"Security","start":68,"end":76,"id":15},{"text":".","start":76,"end":77,"id":16}]} {"text":"Holds PCI DSS.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-371988377,"_task_hash":931213278,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PCI","start":6,"end":9,"id":1},{"text":"DSS","start":10,"end":13,"id":2},{"text":".","start":13,"end":14,"id":3}]} {"text":"Network Security Specialist experienced in detecting malware attacks using SIEM.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":60,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":75,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-126860802,"_task_hash":1800590202,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"malware","start":53,"end":60,"id":6},{"text":"attacks","start":61,"end":68,"id":7},{"text":"using","start":69,"end":74,"id":8},{"text":"SIEM","start":75,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Web Developer opportunity: Lead Cloud Security program, implement OWASP Top 10, manage AI Policy operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":78,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":87,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1998085039,"_task_hash":-633650847,"tokens":[{"text":"Web","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"opportunity","start":14,"end":25,"id":2},{"text":":","start":25,"end":26,"id":3},{"text":"Lead","start":27,"end":31,"id":4},{"text":"Cloud","start":32,"end":37,"id":5},{"text":"Security","start":38,"end":46,"id":6},{"text":"program","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"implement","start":56,"end":65,"id":9},{"text":"OWASP","start":66,"end":71,"id":10},{"text":"Top","start":72,"end":75,"id":11},{"text":"10","start":76,"end":78,"id":12},{"text":",","start":78,"end":79,"id":13},{"text":"manage","start":80,"end":86,"id":14},{"text":"AI","start":87,"end":89,"id":15},{"text":"Policy","start":90,"end":96,"id":16},{"text":"operations","start":97,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} {"text":"Ensured GDPR compliance for EU customers.","spans":[{"start":8,"end":12,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1863521779,"_task_hash":-633223993,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"GDPR","start":8,"end":12,"id":1},{"text":"compliance","start":13,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"EU","start":28,"end":30,"id":4},{"text":"customers","start":31,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Looking for Insider Threat Analyst to lead Cloud Native Security initiatives.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":43,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-200148341,"_task_hash":-1066096023,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Insider","start":12,"end":19,"id":2},{"text":"Threat","start":20,"end":26,"id":3},{"text":"Analyst","start":27,"end":34,"id":4},{"text":"to","start":35,"end":37,"id":5},{"text":"lead","start":38,"end":42,"id":6},{"text":"Cloud","start":43,"end":48,"id":7},{"text":"Native","start":49,"end":55,"id":8},{"text":"Security","start":56,"end":64,"id":9},{"text":"initiatives","start":65,"end":76,"id":10},{"text":".","start":76,"end":77,"id":11}]} {"text":"Must have ELK Stack experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1719884670,"_task_hash":267623844,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"ELK","start":10,"end":13,"id":2},{"text":"Stack","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"NIST","start":35,"end":39,"id":6},{"text":"Framework","start":40,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Senior Data Intelligence Analyst position: 3 years minimum, expert in AI Integration, Technical Leadership, and Security Testing.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":70,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":112,"end":128,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1931830500,"_task_hash":2020016986,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Data","start":7,"end":11,"id":1},{"text":"Intelligence","start":12,"end":24,"id":2},{"text":"Analyst","start":25,"end":32,"id":3},{"text":"position","start":33,"end":41,"id":4},{"text":":","start":41,"end":42,"id":5},{"text":"3","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"minimum","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"expert","start":60,"end":66,"id":10},{"text":"in","start":67,"end":69,"id":11},{"text":"AI","start":70,"end":72,"id":12},{"text":"Integration","start":73,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"Technical","start":86,"end":95,"id":15},{"text":"Leadership","start":96,"end":106,"id":16},{"text":",","start":106,"end":107,"id":17},{"text":"and","start":108,"end":111,"id":18},{"text":"Security","start":112,"end":120,"id":19},{"text":"Testing","start":121,"end":128,"id":20},{"text":".","start":128,"end":129,"id":21}]} {"text":"ML Security Architect professional with 7+ years implementing QRadar and managing Endpoint Detection and Response programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":82,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1038733348,"_task_hash":710933685,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"7","start":40,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"implementing","start":49,"end":61,"id":8},{"text":"QRadar","start":62,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"managing","start":73,"end":81,"id":11},{"text":"Endpoint","start":82,"end":90,"id":12},{"text":"Detection","start":91,"end":100,"id":13},{"text":"and","start":101,"end":104,"id":14},{"text":"Response","start":105,"end":113,"id":15},{"text":"programs","start":114,"end":122,"id":16},{"text":".","start":122,"end":123,"id":17}]} {"text":"Accomplished Penetration Tester specializing in Neural Architectures and AI Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1158804273,"_task_hash":1090999807,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Penetration","start":13,"end":24,"id":1},{"text":"Tester","start":25,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Neural","start":48,"end":54,"id":5},{"text":"Architectures","start":55,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"AI","start":73,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":".","start":84,"end":85,"id":10}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Hiring Security Awareness Trainer for Quantitative Research and worm detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1558416451,"_task_hash":1157075119,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Trainer","start":26,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Quantitative","start":38,"end":50,"id":5},{"text":"Research","start":51,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"worm","start":64,"end":68,"id":8},{"text":"detection","start":69,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Senior Cyber Threat Intelligence Analyst skilled in Database Design, Performance Tools, and Docker Security.","spans":[{"start":7,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":52,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":69,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":983548201,"_task_hash":-1650372796,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Threat","start":13,"end":19,"id":2},{"text":"Intelligence","start":20,"end":32,"id":3},{"text":"Analyst","start":33,"end":40,"id":4},{"text":"skilled","start":41,"end":48,"id":5},{"text":"in","start":49,"end":51,"id":6},{"text":"Database","start":52,"end":60,"id":7},{"text":"Design","start":61,"end":67,"id":8},{"text":",","start":67,"end":68,"id":9},{"text":"Performance","start":69,"end":80,"id":10},{"text":"Tools","start":81,"end":86,"id":11},{"text":",","start":86,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Docker","start":92,"end":98,"id":14},{"text":"Security","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Ensured compliance with NIST requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-242873888,"_task_hash":-945831769,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"NIST","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Digital Forensics Investigator professional with 5++ years implementing SIEM and managing SOC Operations programs.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":90,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-922724083,"_task_hash":1944563458,"tokens":[{"text":"Digital","start":0,"end":7,"id":0},{"text":"Forensics","start":8,"end":17,"id":1},{"text":"Investigator","start":18,"end":30,"id":2},{"text":"professional","start":31,"end":43,"id":3},{"text":"with","start":44,"end":48,"id":4},{"text":"5++","start":49,"end":52,"id":5},{"text":"years","start":53,"end":58,"id":6},{"text":"implementing","start":59,"end":71,"id":7},{"text":"SIEM","start":72,"end":76,"id":8},{"text":"and","start":77,"end":80,"id":9},{"text":"managing","start":81,"end":89,"id":10},{"text":"SOC","start":90,"end":93,"id":11},{"text":"Operations","start":94,"end":104,"id":12},{"text":"programs","start":105,"end":113,"id":13},{"text":".","start":113,"end":114,"id":14}]} {"text":"Senior Cloud Security Engineer skilled in Critical Thinking, Gantt Charts, and Docker Security.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1916726611,"_task_hash":-1982334766,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"skilled","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"Critical","start":42,"end":50,"id":6},{"text":"Thinking","start":51,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Gantt","start":61,"end":66,"id":9},{"text":"Charts","start":67,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Docker","start":79,"end":85,"id":13},{"text":"Security","start":86,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} {"text":"HIPAA certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-709067852,"_task_hash":1892356067,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} {"text":"Experienced Governance Risk Compliance Specialist specializing in Cloud Security Architecture.","spans":[{"start":12,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":66,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":126522113,"_task_hash":-416086117,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Governance","start":12,"end":22,"id":1},{"text":"Risk","start":23,"end":27,"id":2},{"text":"Compliance","start":28,"end":38,"id":3},{"text":"Specialist","start":39,"end":49,"id":4},{"text":"specializing","start":50,"end":62,"id":5},{"text":"in","start":63,"end":65,"id":6},{"text":"Cloud","start":66,"end":71,"id":7},{"text":"Security","start":72,"end":80,"id":8},{"text":"Architecture","start":81,"end":93,"id":9},{"text":".","start":93,"end":94,"id":10}]} {"text":"Proficient in EDR Tools and ELK Stack.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-471465511,"_task_hash":-1399664345,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"ELK","start":28,"end":31,"id":5},{"text":"Stack","start":32,"end":37,"id":6},{"text":".","start":37,"end":38,"id":7}]} {"text":"Briefed executives on watering hole risks.","spans":[{"start":22,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":537212393,"_task_hash":-620442867,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"watering","start":22,"end":30,"id":3},{"text":"hole","start":31,"end":35,"id":4},{"text":"risks","start":36,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"Certified SAML working as Machine Learning Operations Engineer, focused on Application Security Architecture and Command Injection prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":62,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7},{"start":75,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":113,"end":130,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-908552705,"_task_hash":226970429,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SAML","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Machine","start":26,"end":33,"id":4},{"text":"Learning","start":34,"end":42,"id":5},{"text":"Operations","start":43,"end":53,"id":6},{"text":"Engineer","start":54,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"focused","start":64,"end":71,"id":9},{"text":"on","start":72,"end":74,"id":10},{"text":"Application","start":75,"end":86,"id":11},{"text":"Security","start":87,"end":95,"id":12},{"text":"Architecture","start":96,"end":108,"id":13},{"text":"and","start":109,"end":112,"id":14},{"text":"Command","start":113,"end":120,"id":15},{"text":"Injection","start":121,"end":130,"id":16},{"text":"prevention","start":131,"end":141,"id":17},{"text":".","start":141,"end":142,"id":18}]} {"text":"Senior Cyber Forensics Analyst skilled in Software Installation, Training Metrics, and Security Hardening.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":65,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":87,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1764265621,"_task_hash":1315502090,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Forensics","start":13,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"skilled","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"Software","start":42,"end":50,"id":6},{"text":"Installation","start":51,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"Training","start":65,"end":73,"id":9},{"text":"Metrics","start":74,"end":81,"id":10},{"text":",","start":81,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"Security","start":87,"end":95,"id":13},{"text":"Hardening","start":96,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} {"text":"RBAC certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1173080966,"_task_hash":15292339,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Built Security Operations team from ground up.","spans":[{"start":6,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-465520618,"_task_hash":1403893913,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Operations","start":15,"end":25,"id":2},{"text":"team","start":26,"end":30,"id":3},{"text":"from","start":31,"end":35,"id":4},{"text":"ground","start":36,"end":42,"id":5},{"text":"up","start":43,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Senior Security Vulnerability Analyst skilled in ETL, Investigations, and Security Awareness.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":49,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":54,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":74,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1641033163,"_task_hash":559122202,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Vulnerability","start":16,"end":29,"id":2},{"text":"Analyst","start":30,"end":37,"id":3},{"text":"skilled","start":38,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"ETL","start":49,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"Investigations","start":54,"end":68,"id":8},{"text":",","start":68,"end":69,"id":9},{"text":"and","start":70,"end":73,"id":10},{"text":"Security","start":74,"end":82,"id":11},{"text":"Awareness","start":83,"end":92,"id":12},{"text":".","start":92,"end":93,"id":13}]} {"text":"NLP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1598323033,"_task_hash":-155365979,"tokens":[{"text":"NLP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Red Team Lead with GPEN certification, expert in Suricata.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2055274650,"_task_hash":-295086822,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Lead","start":9,"end":13,"id":2},{"text":"with","start":14,"end":18,"id":3},{"text":"GPEN","start":19,"end":23,"id":4},{"text":"certification","start":24,"end":37,"id":5},{"text":",","start":37,"end":38,"id":6},{"text":"expert","start":39,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"Suricata","start":49,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Senior Security Awareness Consultant skilled in Statistical Analysis, Mobile Debugging, and Security Culture.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":92,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1955760280,"_task_hash":856952950,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Consultant","start":26,"end":36,"id":3},{"text":"skilled","start":37,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Statistical","start":48,"end":59,"id":6},{"text":"Analysis","start":60,"end":68,"id":7},{"text":",","start":68,"end":69,"id":8},{"text":"Mobile","start":70,"end":76,"id":9},{"text":"Debugging","start":77,"end":86,"id":10},{"text":",","start":86,"end":87,"id":11},{"text":"and","start":88,"end":91,"id":12},{"text":"Security","start":92,"end":100,"id":13},{"text":"Culture","start":101,"end":108,"id":14},{"text":".","start":108,"end":109,"id":15}]} {"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Mitigated Session Hijacking through code remediation.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1477654235,"_task_hash":1643308753,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Session","start":10,"end":17,"id":1},{"text":"Hijacking","start":18,"end":27,"id":2},{"text":"through","start":28,"end":35,"id":3},{"text":"code","start":36,"end":40,"id":4},{"text":"remediation","start":41,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Experienced Server-Side Developer specializing in GCP Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":50,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-407726127,"_task_hash":1958966565,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Server","start":12,"end":18,"id":1},{"text":"-","start":18,"end":19,"id":2},{"text":"Side","start":19,"end":23,"id":3},{"text":"Developer","start":24,"end":33,"id":4},{"text":"specializing","start":34,"end":46,"id":5},{"text":"in","start":47,"end":49,"id":6},{"text":"GCP","start":50,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Proficient in EDR Tools and SIEM Operations.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1382976328,"_task_hash":1898479004,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"SIEM","start":28,"end":32,"id":5},{"text":"Operations","start":33,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} {"text":"Expert in Risk Management best practices.","spans":[{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1837593425,"_task_hash":-244347856,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Risk","start":10,"end":14,"id":2},{"text":"Management","start":15,"end":25,"id":3},{"text":"best","start":26,"end":30,"id":4},{"text":"practices","start":31,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Application Security Engineer with GCP Security certification, expert in Splunk.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":47,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":73,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2002321678,"_task_hash":-805227689,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"GCP","start":35,"end":38,"id":4},{"text":"Security","start":39,"end":47,"id":5},{"text":"certification","start":48,"end":61,"id":6},{"text":",","start":61,"end":62,"id":7},{"text":"expert","start":63,"end":69,"id":8},{"text":"in","start":70,"end":72,"id":9},{"text":"Splunk","start":73,"end":79,"id":10},{"text":".","start":79,"end":80,"id":11}]} {"text":"Managed IDS infrastructure for Fortune 500 client.","spans":[{"start":8,"end":11,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":787237806,"_task_hash":-796720163,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"IDS","start":8,"end":11,"id":1},{"text":"infrastructure","start":12,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"Fortune","start":31,"end":38,"id":4},{"text":"500","start":39,"end":42,"id":5},{"text":"client","start":43,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Experienced Security Assessor specializing in AWS Security.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":46,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":104640891,"_task_hash":1047363618,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Assessor","start":21,"end":29,"id":2},{"text":"specializing","start":30,"end":42,"id":3},{"text":"in","start":43,"end":45,"id":4},{"text":"AWS","start":46,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Proficient in SIEM Operations and SIEM.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1572595690,"_task_hash":1138698751,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Looking for Interface Designer to lead Cloud Native Security initiatives.","spans":[{"start":12,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-576128403,"_task_hash":-1206714201,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Interface","start":12,"end":21,"id":2},{"text":"Designer","start":22,"end":30,"id":3},{"text":"to","start":31,"end":33,"id":4},{"text":"lead","start":34,"end":38,"id":5},{"text":"Cloud","start":39,"end":44,"id":6},{"text":"Native","start":45,"end":51,"id":7},{"text":"Security","start":52,"end":60,"id":8},{"text":"initiatives","start":61,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} {"text":"Must have SIEM experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":42,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-2001643755,"_task_hash":1229096089,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"OWASP","start":30,"end":35,"id":5},{"text":"Top","start":36,"end":39,"id":6},{"text":"10","start":40,"end":42,"id":7},{"text":"knowledge","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} {"text":"Published threat intel report on rootkit trends.","spans":[{"start":33,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-157696595,"_task_hash":1622176157,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"rootkit","start":33,"end":40,"id":5},{"text":"trends","start":41,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Led incident response for CVE-2020-1472 exploitation.","spans":[{"start":26,"end":39,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":115126800,"_task_hash":267573877,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2020","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"1472","start":35,"end":39,"id":6},{"text":"exploitation","start":40,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Implemented Infrastructure Security controls and monitoring.","spans":[{"start":12,"end":35,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":682056907,"_task_hash":-1111954273,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Infrastructure","start":12,"end":26,"id":1},{"text":"Security","start":27,"end":35,"id":2},{"text":"controls","start":36,"end":44,"id":3},{"text":"and","start":45,"end":48,"id":4},{"text":"monitoring","start":49,"end":59,"id":5},{"text":".","start":59,"end":60,"id":6}]} {"text":"Information Security Architect professional with 7+ years implementing EDR Platforms and managing AI Governance programs.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":71,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":98,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2043957280,"_task_hash":2134600058,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Architect","start":21,"end":30,"id":2},{"text":"professional","start":31,"end":43,"id":3},{"text":"with","start":44,"end":48,"id":4},{"text":"7","start":49,"end":50,"id":5},{"text":"+","start":50,"end":51,"id":6},{"text":"years","start":52,"end":57,"id":7},{"text":"implementing","start":58,"end":70,"id":8},{"text":"EDR","start":71,"end":74,"id":9},{"text":"Platforms","start":75,"end":84,"id":10},{"text":"and","start":85,"end":88,"id":11},{"text":"managing","start":89,"end":97,"id":12},{"text":"AI","start":98,"end":100,"id":13},{"text":"Governance","start":101,"end":111,"id":14},{"text":"programs","start":112,"end":120,"id":15},{"text":".","start":120,"end":121,"id":16}]} {"text":"Senior IT GRC Specialist position: 7 years minimum, expert in Reporting, Cisco, and Hardware Security Modules.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":73,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":84,"end":109,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1650064380,"_task_hash":-1572858091,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"GRC","start":10,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"position","start":25,"end":33,"id":4},{"text":":","start":33,"end":34,"id":5},{"text":"7","start":35,"end":36,"id":6},{"text":"years","start":37,"end":42,"id":7},{"text":"minimum","start":43,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"expert","start":52,"end":58,"id":10},{"text":"in","start":59,"end":61,"id":11},{"text":"Reporting","start":62,"end":71,"id":12},{"text":",","start":71,"end":72,"id":13},{"text":"Cisco","start":73,"end":78,"id":14},{"text":",","start":78,"end":79,"id":15},{"text":"and","start":80,"end":83,"id":16},{"text":"Hardware","start":84,"end":92,"id":17},{"text":"Security","start":93,"end":101,"id":18},{"text":"Modules","start":102,"end":109,"id":19},{"text":".","start":109,"end":110,"id":20}]} {"text":"Certified ISO 22301 working as IT Compliance Specialist, focused on Security Automation and XXE prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":55,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":68,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":92,"end":95,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-673550678,"_task_hash":-1394653908,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"22301","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"IT","start":31,"end":33,"id":5},{"text":"Compliance","start":34,"end":44,"id":6},{"text":"Specialist","start":45,"end":55,"id":7},{"text":",","start":55,"end":56,"id":8},{"text":"focused","start":57,"end":64,"id":9},{"text":"on","start":65,"end":67,"id":10},{"text":"Security","start":68,"end":76,"id":11},{"text":"Automation","start":77,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"XXE","start":92,"end":95,"id":14},{"text":"prevention","start":96,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Threat Hunter role available: Frameworks experience required, Mobile Security knowledge essential.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":62,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":923256876,"_task_hash":859469832,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"role","start":14,"end":18,"id":2},{"text":"available","start":19,"end":28,"id":3},{"text":":","start":28,"end":29,"id":4},{"text":"Frameworks","start":30,"end":40,"id":5},{"text":"experience","start":41,"end":51,"id":6},{"text":"required","start":52,"end":60,"id":7},{"text":",","start":60,"end":61,"id":8},{"text":"Mobile","start":62,"end":68,"id":9},{"text":"Security","start":69,"end":77,"id":10},{"text":"knowledge","start":78,"end":87,"id":11},{"text":"essential","start":88,"end":97,"id":12},{"text":".","start":97,"end":98,"id":13}]} {"text":"GLBA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1328244680,"_task_hash":-1510078390,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Managed UEBA infrastructure for Fortune 500 client.","spans":[{"start":8,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2004405427,"_task_hash":-1151147415,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"UEBA","start":8,"end":12,"id":1},{"text":"infrastructure","start":13,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"Fortune","start":32,"end":39,"id":4},{"text":"500","start":40,"end":43,"id":5},{"text":"client","start":44,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Data Analyst with 10 years experience in SOC Management, Network Segmentation, and Style Guides.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":57,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":83,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1836163708,"_task_hash":1134648246,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"10","start":18,"end":20,"id":3},{"text":"years","start":21,"end":26,"id":4},{"text":"experience","start":27,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"SOC","start":41,"end":44,"id":7},{"text":"Management","start":45,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"Network","start":57,"end":64,"id":10},{"text":"Segmentation","start":65,"end":77,"id":11},{"text":",","start":77,"end":78,"id":12},{"text":"and","start":79,"end":82,"id":13},{"text":"Style","start":83,"end":88,"id":14},{"text":"Guides","start":89,"end":95,"id":15},{"text":".","start":95,"end":96,"id":16}]} {"text":"Holds DNS/DHCP certification.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1789880151,"_task_hash":690454037,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"DNS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DHCP","start":10,"end":14,"id":3},{"text":"certification","start":15,"end":28,"id":4},{"text":".","start":28,"end":29,"id":5}]} {"text":"Remediated SOC 2 audit findings.","spans":[{"start":11,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":11,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-302515583,"_task_hash":1419157810,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"SOC","start":11,"end":14,"id":1},{"text":"2","start":15,"end":16,"id":2},{"text":"audit","start":17,"end":22,"id":3},{"text":"findings","start":23,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Experienced AI/ML Product Manager specializing in Kubernetes Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":50,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1260162301,"_task_hash":1049345361,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"AI","start":12,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"ML","start":15,"end":17,"id":3},{"text":"Product","start":18,"end":25,"id":4},{"text":"Manager","start":26,"end":33,"id":5},{"text":"specializing","start":34,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Kubernetes","start":50,"end":60,"id":8},{"text":"Security","start":61,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Proficient in Wireshark and ELK Stack.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1223315681,"_task_hash":-815345432,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"ELK","start":28,"end":31,"id":4},{"text":"Stack","start":32,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"Penetration Tester opportunity: Lead Security Scanning program, implement OWASP Top 10, manage FPGA operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":74,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1469490418,"_task_hash":-1302941441,"tokens":[{"text":"Penetration","start":0,"end":11,"id":0},{"text":"Tester","start":12,"end":18,"id":1},{"text":"opportunity","start":19,"end":30,"id":2},{"text":":","start":30,"end":31,"id":3},{"text":"Lead","start":32,"end":36,"id":4},{"text":"Security","start":37,"end":45,"id":5},{"text":"Scanning","start":46,"end":54,"id":6},{"text":"program","start":55,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"implement","start":64,"end":73,"id":9},{"text":"OWASP","start":74,"end":79,"id":10},{"text":"Top","start":80,"end":83,"id":11},{"text":"10","start":84,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"FPGA","start":95,"end":99,"id":15},{"text":"operations","start":100,"end":110,"id":16},{"text":".","start":110,"end":111,"id":17}]} {"text":"Join our team as IT Administrator!","spans":[{"start":17,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1777250452,"_task_hash":1561158960,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"IT","start":17,"end":19,"id":4},{"text":"Administrator","start":20,"end":33,"id":5},{"text":"!","start":33,"end":34,"id":6}]} {"text":"Must know SIEM, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":719446362,"_task_hash":-664578954,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"CrowdStrike","start":16,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"NIST","start":33,"end":37,"id":7},{"text":"Framework","start":38,"end":47,"id":8},{"text":".","start":47,"end":48,"id":9}]} {"text":"PMP Certification certification a plus.","spans":[{"start":0,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1450494660,"_task_hash":-506043020,"tokens":[{"text":"PMP","start":0,"end":3,"id":0},{"text":"Certification","start":4,"end":17,"id":1},{"text":"certification","start":18,"end":31,"id":2},{"text":"a","start":32,"end":33,"id":3},{"text":"plus","start":34,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Analyzed Remote Code Execution samples in malware lab.","spans":[{"start":9,"end":30,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":618739053,"_task_hash":-379651529,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Remote","start":9,"end":15,"id":1},{"text":"Code","start":16,"end":20,"id":2},{"text":"Execution","start":21,"end":30,"id":3},{"text":"samples","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"malware","start":42,"end":49,"id":6},{"text":"lab","start":50,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Cloud Security Engineer role available: Windows/Mac Support experience required, Kubernetes Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":9},{"start":81,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-469523842,"_task_hash":1447673184,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Windows","start":40,"end":47,"id":6},{"text":"/","start":47,"end":48,"id":7},{"text":"Mac","start":48,"end":51,"id":8},{"text":"Support","start":52,"end":59,"id":9},{"text":"experience","start":60,"end":70,"id":10},{"text":"required","start":71,"end":79,"id":11},{"text":",","start":79,"end":80,"id":12},{"text":"Kubernetes","start":81,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":"knowledge","start":101,"end":110,"id":15},{"text":"essential","start":111,"end":120,"id":16},{"text":".","start":120,"end":121,"id":17}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Immediate opening for Security Awareness Trainer.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1845258642,"_task_hash":1630037966,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Awareness","start":31,"end":40,"id":4},{"text":"Trainer","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Required skills: Metasploit, Data Pipelines, DNS/DHCP certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":53,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-397976751,"_task_hash":-1461479939,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"Data","start":29,"end":33,"id":5},{"text":"Pipelines","start":34,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"DNS","start":45,"end":48,"id":8},{"text":"/","start":48,"end":49,"id":9},{"text":"DHCP","start":49,"end":53,"id":10},{"text":"certification","start":54,"end":67,"id":11},{"text":".","start":67,"end":68,"id":12}]} {"text":"Led annual Preventive Action program.","spans":[{"start":11,"end":28,"label":"AUDIT_TERM","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-313144904,"_task_hash":457891249,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"annual","start":4,"end":10,"id":1},{"text":"Preventive","start":11,"end":21,"id":2},{"text":"Action","start":22,"end":28,"id":3},{"text":"program","start":29,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Simulated Remote Code Execution during red team exercise.","spans":[{"start":10,"end":31,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":355265769,"_task_hash":1116386124,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Remote","start":10,"end":16,"id":1},{"text":"Code","start":17,"end":21,"id":2},{"text":"Execution","start":22,"end":31,"id":3},{"text":"during","start":32,"end":38,"id":4},{"text":"red","start":39,"end":42,"id":5},{"text":"team","start":43,"end":47,"id":6},{"text":"exercise","start":48,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Exploited Living off the Land vulnerability in web application.","spans":[{"start":10,"end":29,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1422232982,"_task_hash":1975689281,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Living","start":10,"end":16,"id":1},{"text":"off","start":17,"end":20,"id":2},{"text":"the","start":21,"end":24,"id":3},{"text":"Land","start":25,"end":29,"id":4},{"text":"vulnerability","start":30,"end":43,"id":5},{"text":"in","start":44,"end":46,"id":6},{"text":"web","start":47,"end":50,"id":7},{"text":"application","start":51,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Discovered and reported CVE-2024-1234 affecting critical infrastructure.","spans":[{"start":24,"end":37,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1989801917,"_task_hash":-2095252770,"tokens":[{"text":"Discovered","start":0,"end":10,"id":0},{"text":"and","start":11,"end":14,"id":1},{"text":"reported","start":15,"end":23,"id":2},{"text":"CVE-2024","start":24,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"1234","start":33,"end":37,"id":5},{"text":"affecting","start":38,"end":47,"id":6},{"text":"critical","start":48,"end":56,"id":7},{"text":"infrastructure","start":57,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"CISO with CySA+ certification, expert in Wireshark.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":41,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1649980632,"_task_hash":-527941118,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"with","start":5,"end":9,"id":1},{"text":"CySA+","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":",","start":29,"end":30,"id":4},{"text":"expert","start":31,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"Wireshark","start":41,"end":50,"id":7},{"text":".","start":50,"end":51,"id":8}]} {"text":"Coordinated disclosure of CVE-2019-11510 with vendor.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":976576997,"_task_hash":-1234639145,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2019","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"11510","start":35,"end":40,"id":5},{"text":"with","start":41,"end":45,"id":6},{"text":"vendor","start":46,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Seeking Malware Researcher with 3++ years experience in Insurance Frameworks and Feature Prioritization.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":81,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1884486082,"_task_hash":1627153437,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Malware","start":8,"end":15,"id":1},{"text":"Researcher","start":16,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"3++","start":32,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Insurance","start":56,"end":65,"id":8},{"text":"Frameworks","start":66,"end":76,"id":9},{"text":"and","start":77,"end":80,"id":10},{"text":"Feature","start":81,"end":88,"id":11},{"text":"Prioritization","start":89,"end":103,"id":12},{"text":".","start":103,"end":104,"id":13}]} {"text":"OSCP Certification required.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1225465137,"_task_hash":997524556,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"required","start":19,"end":27,"id":2},{"text":".","start":27,"end":28,"id":3}]} {"text":"Certified CI/CD working as Social Engineering Tester, focused on Security Tools and Buffer Overflow prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":65,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":99,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1782210465,"_task_hash":1694329419,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CI","start":10,"end":12,"id":1},{"text":"/","start":12,"end":13,"id":2},{"text":"CD","start":13,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Social","start":27,"end":33,"id":6},{"text":"Engineering","start":34,"end":45,"id":7},{"text":"Tester","start":46,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"focused","start":54,"end":61,"id":10},{"text":"on","start":62,"end":64,"id":11},{"text":"Security","start":65,"end":73,"id":12},{"text":"Tools","start":74,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"Buffer","start":84,"end":90,"id":15},{"text":"Overflow","start":91,"end":99,"id":16},{"text":"prevention","start":100,"end":110,"id":17},{"text":".","start":110,"end":111,"id":18}]} {"text":"AI/Robotics Engineer experienced in detecting malware attacks using Wireshark.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":46,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1794414067,"_task_hash":-1725650267,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"Robotics","start":3,"end":11,"id":2},{"text":"Engineer","start":12,"end":20,"id":3},{"text":"experienced","start":21,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"detecting","start":36,"end":45,"id":6},{"text":"malware","start":46,"end":53,"id":7},{"text":"attacks","start":54,"end":61,"id":8},{"text":"using","start":62,"end":67,"id":9},{"text":"Wireshark","start":68,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Security Analyst with GIAC certification, expert in Autopsy.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1230249912,"_task_hash":-848431223,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"GIAC","start":22,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Autopsy","start":52,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Seeking AI Ethics Specialist with 10+ years experience in Hardware Troubleshooting and EnCase.","spans":[{"start":8,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":87,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1788333870,"_task_hash":348604532,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Ethics","start":11,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"with","start":29,"end":33,"id":4},{"text":"10","start":34,"end":36,"id":5},{"text":"+","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"experience","start":44,"end":54,"id":8},{"text":"in","start":55,"end":57,"id":9},{"text":"Hardware","start":58,"end":66,"id":10},{"text":"Troubleshooting","start":67,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"EnCase","start":87,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} {"text":"GCP required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-724780022,"_task_hash":-1733528560,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Cloud Security Engineer with CASP+ certification, expert in Wireshark.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":34,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":60,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1615544001,"_task_hash":1038091401,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"CASP+","start":29,"end":34,"id":4},{"text":"certification","start":35,"end":48,"id":5},{"text":",","start":48,"end":49,"id":6},{"text":"expert","start":50,"end":56,"id":7},{"text":"in","start":57,"end":59,"id":8},{"text":"Wireshark","start":60,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Responsible for SAML operations and maintenance.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-716743704,"_task_hash":1787153156,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"SAML","start":16,"end":20,"id":2},{"text":"operations","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"maintenance","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"DevSecOps Engineer needed for enterprise security team.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1867819265,"_task_hash":-81217904,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"needed","start":19,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"team","start":50,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Required: STIX/TAXII, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1492126283,"_task_hash":-836102027,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"STIX","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"TAXII","start":15,"end":20,"id":4},{"text":",","start":20,"end":21,"id":5},{"text":"Metasploit","start":22,"end":32,"id":6},{"text":",","start":32,"end":33,"id":7},{"text":"and","start":34,"end":37,"id":8},{"text":"OWASP","start":38,"end":43,"id":9},{"text":"Top","start":44,"end":47,"id":10},{"text":"10","start":48,"end":50,"id":11},{"text":"expertise","start":51,"end":60,"id":12},{"text":".","start":60,"end":61,"id":13}]} {"text":"Developed playbooks for cryptominer response.","spans":[{"start":24,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-562202339,"_task_hash":1130460438,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"cryptominer","start":24,"end":35,"id":3},{"text":"response","start":36,"end":44,"id":4},{"text":".","start":44,"end":45,"id":5}]} {"text":"Compliance Manager with expertise in NIST Framework compliance and Zero Trust operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":820663561,"_task_hash":913147242,"tokens":[{"text":"Compliance","start":0,"end":10,"id":0},{"text":"Manager","start":11,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"expertise","start":24,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"compliance","start":52,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"Zero","start":67,"end":71,"id":9},{"text":"Trust","start":72,"end":77,"id":10},{"text":"operations","start":78,"end":88,"id":11},{"text":".","start":88,"end":89,"id":12}]} {"text":"Accomplished IT Network Administrator specializing in Privacy by Design and Security Strategy.","spans":[{"start":13,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":54,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":76,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1595560218,"_task_hash":76904998,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Network","start":16,"end":23,"id":2},{"text":"Administrator","start":24,"end":37,"id":3},{"text":"specializing","start":38,"end":50,"id":4},{"text":"in","start":51,"end":53,"id":5},{"text":"Privacy","start":54,"end":61,"id":6},{"text":"by","start":62,"end":64,"id":7},{"text":"Design","start":65,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Security","start":76,"end":84,"id":10},{"text":"Strategy","start":85,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Cybersecurity Insurance Expert with expertise in OWASP Top 10 compliance and YARA Rules operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-427303837,"_task_hash":1336087293,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Insurance","start":14,"end":23,"id":1},{"text":"Expert","start":24,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"expertise","start":36,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"OWASP","start":49,"end":54,"id":6},{"text":"Top","start":55,"end":58,"id":7},{"text":"10","start":59,"end":61,"id":8},{"text":"compliance","start":62,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"YARA","start":77,"end":81,"id":11},{"text":"Rules","start":82,"end":87,"id":12},{"text":"operations","start":88,"end":98,"id":13},{"text":".","start":98,"end":99,"id":14}]} {"text":"Immediate opening for Cryptography Expert.","spans":[{"start":22,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1653557384,"_task_hash":144541370,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cryptography","start":22,"end":34,"id":3},{"text":"Expert","start":35,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Required skills: SIEM Operations, Terraform, GDPR certification.","spans":[{"start":17,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":34,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":366393888,"_task_hash":-423753474,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":"Operations","start":22,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"Terraform","start":34,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"GDPR","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"Mentored junior engineers in Malware Analysis.","spans":[{"start":29,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":797334056,"_task_hash":255173589,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Malware","start":29,"end":36,"id":4},{"text":"Analysis","start":37,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Immediate opening for Application Security Specialist.","spans":[{"start":22,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":593446392,"_task_hash":-220382910,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Application","start":22,"end":33,"id":3},{"text":"Security","start":34,"end":42,"id":4},{"text":"Specialist","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Required skills: Splunk, User Behavior Analysis, SOC 2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":49,"end":54,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1463325865,"_task_hash":-1898347654,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"User","start":25,"end":29,"id":5},{"text":"Behavior","start":30,"end":38,"id":6},{"text":"Analysis","start":39,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"SOC","start":49,"end":52,"id":9},{"text":"2","start":53,"end":54,"id":10},{"text":"certification","start":55,"end":68,"id":11},{"text":".","start":68,"end":69,"id":12}]} {"text":"Join our team as Program Manager!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-300991477,"_task_hash":319892983,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Program","start":17,"end":24,"id":4},{"text":"Manager","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} {"text":"Must know CrowdStrike, Splunk, and NIST Framework.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1557234610,"_task_hash":-1728313749,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"NIST","start":35,"end":39,"id":7},{"text":"Framework","start":40,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} {"text":"DNS/DHCP certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-554524723,"_task_hash":1346368627,"tokens":[{"text":"DNS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DHCP","start":4,"end":8,"id":2},{"text":"certification","start":9,"end":22,"id":3},{"text":"a","start":23,"end":24,"id":4},{"text":"plus","start":25,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} {"text":"Hiring AI/ML Product Manager for Psychology and adware detection.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":33,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":48,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":31090923,"_task_hash":1121998727,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Product","start":13,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"for","start":29,"end":32,"id":6},{"text":"Psychology","start":33,"end":43,"id":7},{"text":"and","start":44,"end":47,"id":8},{"text":"adware","start":48,"end":54,"id":9},{"text":"detection","start":55,"end":64,"id":10},{"text":".","start":64,"end":65,"id":11}]} {"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"DevOps Architect professional with 3++ years implementing Metasploit and managing Remote Support Tools programs.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":58,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1675601226,"_task_hash":992584991,"tokens":[{"text":"DevOps","start":0,"end":6,"id":0},{"text":"Architect","start":7,"end":16,"id":1},{"text":"professional","start":17,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"3++","start":35,"end":38,"id":4},{"text":"years","start":39,"end":44,"id":5},{"text":"implementing","start":45,"end":57,"id":6},{"text":"Metasploit","start":58,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Remote","start":82,"end":88,"id":10},{"text":"Support","start":89,"end":96,"id":11},{"text":"Tools","start":97,"end":102,"id":12},{"text":"programs","start":103,"end":111,"id":13},{"text":".","start":111,"end":112,"id":14}]} {"text":"Senior Technology Manager skilled in Business Analysis, Secret Management, and Security Tools.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2099725091,"_task_hash":-1102378120,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technology","start":7,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Business","start":37,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"Secret","start":56,"end":62,"id":8},{"text":"Management","start":63,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"Security","start":79,"end":87,"id":12},{"text":"Tools","start":88,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} {"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} {"text":"Experienced Cyber Operations Manager specializing in Supply Chain Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-914607811,"_task_hash":-40199543,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Operations","start":18,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Supply","start":53,"end":59,"id":6},{"text":"Chain","start":60,"end":65,"id":7},{"text":"Security","start":66,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} {"text":"Proficient in EDR Tools and EDR Platforms.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":41,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1306359697,"_task_hash":1092743285,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"EDR","start":28,"end":31,"id":5},{"text":"Platforms","start":32,"end":41,"id":6},{"text":".","start":41,"end":42,"id":7}]} {"text":"Looking for Network Security Architect to lead Container Registry Security initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":595270547,"_task_hash":1795433237,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Architect","start":29,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Container","start":47,"end":56,"id":7},{"text":"Registry","start":57,"end":65,"id":8},{"text":"Security","start":66,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} {"text":"Must have EDR Platforms experience and NIST Framework knowledge.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1390606848,"_task_hash":1171752415,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":"experience","start":24,"end":34,"id":4},{"text":"and","start":35,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"knowledge","start":54,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Release Manager with hands-on experience in SIEM, EDR Tools, and Cloud Security Architecture.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":48,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":50,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":65,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1136955115,"_task_hash":-451709780,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"SIEM","start":44,"end":48,"id":8},{"text":",","start":48,"end":49,"id":9},{"text":"EDR","start":50,"end":53,"id":10},{"text":"Tools","start":54,"end":59,"id":11},{"text":",","start":59,"end":60,"id":12},{"text":"and","start":61,"end":64,"id":13},{"text":"Cloud","start":65,"end":70,"id":14},{"text":"Security","start":71,"end":79,"id":15},{"text":"Architecture","start":80,"end":92,"id":16},{"text":".","start":92,"end":93,"id":17}]} {"text":"Holds C++.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":526977190,"_task_hash":-1557661950,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Immediate opening for Firmware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1376834588,"_task_hash":-102165587,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Firmware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Required skills: Nessus, Governance, ROS certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1591218166,"_task_hash":586434627,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Governance","start":25,"end":35,"id":5},{"text":",","start":35,"end":36,"id":6},{"text":"ROS","start":37,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Assessed compliance with PCI DSS 1.1.","spans":[{"start":25,"end":36,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1628150606,"_task_hash":1357999455,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"compliance","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"PCI","start":25,"end":28,"id":3},{"text":"DSS","start":29,"end":32,"id":4},{"text":"1.1","start":33,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Remediated gaps identified in ISO 27001 A.12.1 assessment.","spans":[{"start":30,"end":46,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1455018914,"_task_hash":-1917523200,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"ISO","start":30,"end":33,"id":4},{"text":"27001","start":34,"end":39,"id":5},{"text":"A.12.1","start":40,"end":46,"id":6},{"text":"assessment","start":47,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} {"text":"Immediate opening for Cyber Defense Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-690759821,"_task_hash":774450881,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cyber","start":22,"end":27,"id":3},{"text":"Defense","start":28,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Required skills: ELK Stack, Audit Management, GCP certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":496713111,"_task_hash":-1906825591,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Audit","start":28,"end":33,"id":6},{"text":"Management","start":34,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"GCP","start":46,"end":49,"id":9},{"text":"certification","start":50,"end":63,"id":10},{"text":".","start":63,"end":64,"id":11}]} {"text":"Immediate opening for Machine Learning Operations Engineer.","spans":[{"start":22,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1592255475,"_task_hash":-1234553566,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Machine","start":22,"end":29,"id":3},{"text":"Learning","start":30,"end":38,"id":4},{"text":"Operations","start":39,"end":49,"id":5},{"text":"Engineer","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Required skills: QRadar, Playbook Development, GDPR certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":51,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":983515082,"_task_hash":246061336,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"QRadar","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Playbook","start":25,"end":33,"id":5},{"text":"Development","start":34,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"GDPR","start":47,"end":51,"id":8},{"text":"certification","start":52,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Expert in Purple Team best practices.","spans":[{"start":10,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-731413627,"_task_hash":1544798388,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Purple","start":10,"end":16,"id":2},{"text":"Team","start":17,"end":21,"id":3},{"text":"best","start":22,"end":26,"id":4},{"text":"practices","start":27,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Looking for Threat Analyst to lead Network Security Architecture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1963810898,"_task_hash":243527044,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Threat","start":12,"end":18,"id":2},{"text":"Analyst","start":19,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Network","start":35,"end":42,"id":6},{"text":"Security","start":43,"end":51,"id":7},{"text":"Architecture","start":52,"end":64,"id":8},{"text":"initiatives","start":65,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Implemented workaround for CVE-2024-0001 until patch available.","spans":[{"start":27,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1575485835,"_task_hash":-1856949250,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2024","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"0001","start":36,"end":40,"id":5},{"text":"until","start":41,"end":46,"id":6},{"text":"patch","start":47,"end":52,"id":7},{"text":"available","start":53,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Reverse engineered CVE-2022-41040 exploit for threat intelligence.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-627144712,"_task_hash":387807061,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"engineered","start":8,"end":18,"id":1},{"text":"CVE-2022","start":19,"end":27,"id":2},{"text":"-","start":27,"end":28,"id":3},{"text":"41040","start":28,"end":33,"id":4},{"text":"exploit","start":34,"end":41,"id":5},{"text":"for","start":42,"end":45,"id":6},{"text":"threat","start":46,"end":52,"id":7},{"text":"intelligence","start":53,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Presented Endpoint Security updates to leadership.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-328651494,"_task_hash":-141511980,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Endpoint","start":10,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"updates","start":28,"end":35,"id":3},{"text":"to","start":36,"end":38,"id":4},{"text":"leadership","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Content Marketing Specialist with 3+ years experience in Pipeline Automation, Secret Management, and Communication Skills.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":101,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1460147610,"_task_hash":-274277710,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"Pipeline","start":57,"end":65,"id":9},{"text":"Automation","start":66,"end":76,"id":10},{"text":",","start":76,"end":77,"id":11},{"text":"Secret","start":78,"end":84,"id":12},{"text":"Management","start":85,"end":95,"id":13},{"text":",","start":95,"end":96,"id":14},{"text":"and","start":97,"end":100,"id":15},{"text":"Communication","start":101,"end":114,"id":16},{"text":"Skills","start":115,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Senior IT Manager skilled in Compliance Standards, Server-Side Development, and Email Gateway Security.","spans":[{"start":7,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-616689712,"_task_hash":350562290,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"Manager","start":10,"end":17,"id":2},{"text":"skilled","start":18,"end":25,"id":3},{"text":"in","start":26,"end":28,"id":4},{"text":"Compliance","start":29,"end":39,"id":5},{"text":"Standards","start":40,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Server","start":51,"end":57,"id":8},{"text":"-","start":57,"end":58,"id":9},{"text":"Side","start":58,"end":62,"id":10},{"text":"Development","start":63,"end":74,"id":11},{"text":",","start":74,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"Email","start":80,"end":85,"id":14},{"text":"Gateway","start":86,"end":93,"id":15},{"text":"Security","start":94,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} {"text":"TOGAF certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1190593017,"_task_hash":-644184999,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} {"text":"We need a Full Stack Software Engineer skilled in Remote Code Execution prevention and APT analysis using Metasploit.","spans":[{"start":10,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":50,"end":71,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":11},{"start":87,"end":90,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":106,"end":116,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":548695799,"_task_hash":486792931,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Full","start":10,"end":14,"id":3},{"text":"Stack","start":15,"end":20,"id":4},{"text":"Software","start":21,"end":29,"id":5},{"text":"Engineer","start":30,"end":38,"id":6},{"text":"skilled","start":39,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Remote","start":50,"end":56,"id":9},{"text":"Code","start":57,"end":61,"id":10},{"text":"Execution","start":62,"end":71,"id":11},{"text":"prevention","start":72,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"APT","start":87,"end":90,"id":14},{"text":"analysis","start":91,"end":99,"id":15},{"text":"using","start":100,"end":105,"id":16},{"text":"Metasploit","start":106,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} {"text":"Automated FISMA compliance monitoring.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":736121821,"_task_hash":-945665113,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"FISMA","start":10,"end":15,"id":1},{"text":"compliance","start":16,"end":26,"id":2},{"text":"monitoring","start":27,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"API Developer role available: RPO/RTO Planning experience required, Cybersecurity knowledge essential.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":68,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":272987220,"_task_hash":-1541044332,"tokens":[{"text":"API","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"role","start":14,"end":18,"id":2},{"text":"available","start":19,"end":28,"id":3},{"text":":","start":28,"end":29,"id":4},{"text":"RPO","start":30,"end":33,"id":5},{"text":"/","start":33,"end":34,"id":6},{"text":"RTO","start":34,"end":37,"id":7},{"text":"Planning","start":38,"end":46,"id":8},{"text":"experience","start":47,"end":57,"id":9},{"text":"required","start":58,"end":66,"id":10},{"text":",","start":66,"end":67,"id":11},{"text":"Cybersecurity","start":68,"end":81,"id":12},{"text":"knowledge","start":82,"end":91,"id":13},{"text":"essential","start":92,"end":101,"id":14},{"text":".","start":101,"end":102,"id":15}]} {"text":"NIS2 familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-202128334,"_task_hash":-1609255822,"tokens":[{"text":"NIS2","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Presented Zero Trust updates to leadership.","spans":[{"start":10,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":677321852,"_task_hash":-1920601183,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Zero","start":10,"end":14,"id":1},{"text":"Trust","start":15,"end":20,"id":2},{"text":"updates","start":21,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"leadership","start":32,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Certified NLP working as Project Manager, focused on Security Frameworks and Clickjacking prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1880065528,"_task_hash":-1366109314,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Project","start":25,"end":32,"id":4},{"text":"Manager","start":33,"end":40,"id":5},{"text":",","start":40,"end":41,"id":6},{"text":"focused","start":42,"end":49,"id":7},{"text":"on","start":50,"end":52,"id":8},{"text":"Security","start":53,"end":61,"id":9},{"text":"Frameworks","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Clickjacking","start":77,"end":89,"id":12},{"text":"prevention","start":90,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} {"text":"Coordinated disclosure of CVE-2024-1234 with vendor.","spans":[{"start":26,"end":39,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1983476551,"_task_hash":-1461660378,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2024","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"1234","start":35,"end":39,"id":5},{"text":"with","start":40,"end":44,"id":6},{"text":"vendor","start":45,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"ML Platform Engineer opportunity: Lead Security Systems program, implement NIST Framework, manage Audit Management operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":75,"end":89,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":114,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-489124247,"_task_hash":-465791874,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Platform","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"Security","start":39,"end":47,"id":6},{"text":"Systems","start":48,"end":55,"id":7},{"text":"program","start":56,"end":63,"id":8},{"text":",","start":63,"end":64,"id":9},{"text":"implement","start":65,"end":74,"id":10},{"text":"NIST","start":75,"end":79,"id":11},{"text":"Framework","start":80,"end":89,"id":12},{"text":",","start":89,"end":90,"id":13},{"text":"manage","start":91,"end":97,"id":14},{"text":"Audit","start":98,"end":103,"id":15},{"text":"Management","start":104,"end":114,"id":16},{"text":"operations","start":115,"end":125,"id":17},{"text":".","start":125,"end":126,"id":18}]} {"text":"DevSecOps Engineer with hands-on experience in ELK Stack, EDR Platforms, and Security Architecture.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":58,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":77,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":573732927,"_task_hash":-1498385821,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"ELK","start":47,"end":50,"id":8},{"text":"Stack","start":51,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"EDR","start":58,"end":61,"id":11},{"text":"Platforms","start":62,"end":71,"id":12},{"text":",","start":71,"end":72,"id":13},{"text":"and","start":73,"end":76,"id":14},{"text":"Security","start":77,"end":85,"id":15},{"text":"Architecture","start":86,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"Holds PRINCE2.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1460297396,"_task_hash":-885041091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PRINCE2","start":6,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Developed playbooks for hacktivist response.","spans":[{"start":24,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-820973283,"_task_hash":796582308,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"hacktivist","start":24,"end":34,"id":3},{"text":"response","start":35,"end":43,"id":4},{"text":".","start":43,"end":44,"id":5}]} {"text":"Malware Researcher with 7 years experience in AI Market Trends, Switching, and Assessment Methodologies.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-40551218,"_task_hash":1028210847,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Researcher","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"7","start":24,"end":25,"id":3},{"text":"years","start":26,"end":31,"id":4},{"text":"experience","start":32,"end":42,"id":5},{"text":"in","start":43,"end":45,"id":6},{"text":"AI","start":46,"end":48,"id":7},{"text":"Market","start":49,"end":55,"id":8},{"text":"Trends","start":56,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"Switching","start":64,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Assessment","start":79,"end":89,"id":14},{"text":"Methodologies","start":90,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} {"text":"Holds SLAM certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1691756040,"_task_hash":-1592429569,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SLAM","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Immediate opening for Front End Engineer.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":687271832,"_task_hash":-1109236410,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Front","start":22,"end":27,"id":3},{"text":"End","start":28,"end":31,"id":4},{"text":"Engineer","start":32,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Required skills: CrowdStrike, Budget Planning, AWS certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1942064953,"_task_hash":1480341155,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Budget","start":30,"end":36,"id":5},{"text":"Planning","start":37,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"AWS","start":47,"end":50,"id":8},{"text":"certification","start":51,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} {"text":"ML Research Scientist experienced in detecting ransomware attacks using CrowdStrike.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":44203192,"_task_hash":-464813632,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Research","start":3,"end":11,"id":1},{"text":"Scientist","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"CrowdStrike","start":72,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Looking for Network Security Engineer to lead Security Scanning initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-78234140,"_task_hash":1697654637,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"to","start":38,"end":40,"id":5},{"text":"lead","start":41,"end":45,"id":6},{"text":"Security","start":46,"end":54,"id":7},{"text":"Scanning","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} {"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"QA Engineer professional with 7+ years implementing Burp Suite and managing Brand Communication programs.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":52,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-2138000124,"_task_hash":-584374959,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Engineer","start":3,"end":11,"id":1},{"text":"professional","start":12,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"7","start":30,"end":31,"id":4},{"text":"+","start":31,"end":32,"id":5},{"text":"years","start":33,"end":38,"id":6},{"text":"implementing","start":39,"end":51,"id":7},{"text":"Burp","start":52,"end":56,"id":8},{"text":"Suite","start":57,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"managing","start":67,"end":75,"id":11},{"text":"Brand","start":76,"end":81,"id":12},{"text":"Communication","start":82,"end":95,"id":13},{"text":"programs","start":96,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} {"text":"Created YARA rules for Race Condition detection.","spans":[{"start":23,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-379445487,"_task_hash":-852151367,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Race","start":23,"end":27,"id":4},{"text":"Condition","start":28,"end":37,"id":5},{"text":"detection","start":38,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Cyber Operations Manager with hands-on experience in QRadar, Metasploit, and Network Security Architecture.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":61,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":77,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1059300965,"_task_hash":-286348287,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Operations","start":6,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"hands","start":30,"end":35,"id":4},{"text":"-","start":35,"end":36,"id":5},{"text":"on","start":36,"end":38,"id":6},{"text":"experience","start":39,"end":49,"id":7},{"text":"in","start":50,"end":52,"id":8},{"text":"QRadar","start":53,"end":59,"id":9},{"text":",","start":59,"end":60,"id":10},{"text":"Metasploit","start":61,"end":71,"id":11},{"text":",","start":71,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"Network","start":77,"end":84,"id":14},{"text":"Security","start":85,"end":93,"id":15},{"text":"Architecture","start":94,"end":106,"id":16},{"text":".","start":106,"end":107,"id":17}]} {"text":"Holds C/C++.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-840917921,"_task_hash":-1037521268,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":".","start":11,"end":12,"id":4}]} {"text":"Service Desk Analyst opportunity: Lead Cloud Security Architecture program, implement NIST Framework, manage Creative Writing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":86,"end":100,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":109,"end":125,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-918484941,"_task_hash":1273400116,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Desk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"Cloud","start":39,"end":44,"id":6},{"text":"Security","start":45,"end":53,"id":7},{"text":"Architecture","start":54,"end":66,"id":8},{"text":"program","start":67,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"implement","start":76,"end":85,"id":11},{"text":"NIST","start":86,"end":90,"id":12},{"text":"Framework","start":91,"end":100,"id":13},{"text":",","start":100,"end":101,"id":14},{"text":"manage","start":102,"end":108,"id":15},{"text":"Creative","start":109,"end":117,"id":16},{"text":"Writing","start":118,"end":125,"id":17},{"text":"operations","start":126,"end":136,"id":18},{"text":".","start":136,"end":137,"id":19}]} {"text":"Infrastructure Security Engineer experienced in detecting APT attacks using EDR Platforms.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":58,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":530715541,"_task_hash":-1313114088,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"experienced","start":33,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"detecting","start":48,"end":57,"id":5},{"text":"APT","start":58,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"EDR","start":76,"end":79,"id":9},{"text":"Platforms","start":80,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Security Awareness Specialist role available: Test Planning experience required, Perimeter Security knowledge essential.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":332876590,"_task_hash":948593926,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"role","start":30,"end":34,"id":3},{"text":"available","start":35,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"Test","start":46,"end":50,"id":6},{"text":"Planning","start":51,"end":59,"id":7},{"text":"experience","start":60,"end":70,"id":8},{"text":"required","start":71,"end":79,"id":9},{"text":",","start":79,"end":80,"id":10},{"text":"Perimeter","start":81,"end":90,"id":11},{"text":"Security","start":91,"end":99,"id":12},{"text":"knowledge","start":100,"end":109,"id":13},{"text":"essential","start":110,"end":119,"id":14},{"text":".","start":119,"end":120,"id":15}]} {"text":"DORA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":757810043,"_task_hash":-723281915,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Cryptography Expert role available: UX Design experience required, Security Culture Building knowledge essential.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":2112523608,"_task_hash":-1322970219,"tokens":[{"text":"Cryptography","start":0,"end":12,"id":0},{"text":"Expert","start":13,"end":19,"id":1},{"text":"role","start":20,"end":24,"id":2},{"text":"available","start":25,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"UX","start":36,"end":38,"id":5},{"text":"Design","start":39,"end":45,"id":6},{"text":"experience","start":46,"end":56,"id":7},{"text":"required","start":57,"end":65,"id":8},{"text":",","start":65,"end":66,"id":9},{"text":"Security","start":67,"end":75,"id":10},{"text":"Culture","start":76,"end":83,"id":11},{"text":"Building","start":84,"end":92,"id":12},{"text":"knowledge","start":93,"end":102,"id":13},{"text":"essential","start":103,"end":112,"id":14},{"text":".","start":112,"end":113,"id":15}]} {"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Led Digital Forensics initiatives across organization.","spans":[{"start":4,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1818388656,"_task_hash":-1529713153,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Digital","start":4,"end":11,"id":1},{"text":"Forensics","start":12,"end":21,"id":2},{"text":"initiatives","start":22,"end":33,"id":3},{"text":"across","start":34,"end":40,"id":4},{"text":"organization","start":41,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Tested systems for CVE-2023-4863 vulnerability.","spans":[{"start":19,"end":32,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-664542716,"_task_hash":1287393594,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"systems","start":7,"end":14,"id":1},{"text":"for","start":15,"end":18,"id":2},{"text":"CVE-2023","start":19,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"4863","start":28,"end":32,"id":5},{"text":"vulnerability","start":33,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Immediate opening for Threat Detection Specialist.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":544574104,"_task_hash":2010994894,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Detection","start":29,"end":38,"id":4},{"text":"Specialist","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Required skills: CrowdStrike, Control Systems, OPA certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1601978786,"_task_hash":-1392282474,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Control","start":30,"end":37,"id":5},{"text":"Systems","start":38,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"OPA","start":47,"end":50,"id":8},{"text":"certification","start":51,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} {"text":"Automated Privacy Act compliance monitoring.","spans":[{"start":10,"end":21,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-426399294,"_task_hash":2082919255,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Privacy","start":10,"end":17,"id":1},{"text":"Act","start":18,"end":21,"id":2},{"text":"compliance","start":22,"end":32,"id":3},{"text":"monitoring","start":33,"end":43,"id":4},{"text":".","start":43,"end":44,"id":5}]} {"text":"Senior Identity Management Engineer skilled in Cryptanalysis, Threat Actor Analysis, and Mobile Security.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":89,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-934677378,"_task_hash":-2136000353,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Identity","start":7,"end":15,"id":1},{"text":"Management","start":16,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"skilled","start":36,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"Cryptanalysis","start":47,"end":60,"id":6},{"text":",","start":60,"end":61,"id":7},{"text":"Threat","start":62,"end":68,"id":8},{"text":"Actor","start":69,"end":74,"id":9},{"text":"Analysis","start":75,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Mobile","start":89,"end":95,"id":13},{"text":"Security","start":96,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} {"text":"AI UX certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":488350115,"_task_hash":-1406348696,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certified","start":6,"end":15,"id":2},{"text":".","start":15,"end":16,"id":3}]} {"text":"Accomplished Game Developer specializing in Claims Management and Email Security.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-932981647,"_task_hash":-1443373030,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Game","start":13,"end":17,"id":1},{"text":"Developer","start":18,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Claims","start":44,"end":50,"id":5},{"text":"Management","start":51,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"Email","start":66,"end":71,"id":8},{"text":"Security","start":72,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Experienced Network Engineer specializing in Security Hardening.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-655368386,"_task_hash":-806281702,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Network","start":12,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Security","start":45,"end":53,"id":5},{"text":"Hardening","start":54,"end":63,"id":6},{"text":".","start":63,"end":64,"id":7}]} {"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Security Compliance Officer opportunity: Lead Security Scanning Tools program, implement NIST Framework, manage Privacy-Preserving ML operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":237325066,"_task_hash":-1992424386,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Compliance","start":9,"end":19,"id":1},{"text":"Officer","start":20,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Scanning","start":55,"end":63,"id":7},{"text":"Tools","start":64,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"Privacy","start":112,"end":119,"id":16},{"text":"-","start":119,"end":120,"id":17},{"text":"Preserving","start":120,"end":130,"id":18},{"text":"ML","start":131,"end":133,"id":19},{"text":"operations","start":134,"end":144,"id":20},{"text":".","start":144,"end":145,"id":21}]} {"text":"Join our team as Technical Support Analyst!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-573217798,"_task_hash":1767487203,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Analyst","start":35,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} {"text":"Must know Wireshark, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-112823401,"_task_hash":-2093315552,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Wireshark","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"and","start":32,"end":35,"id":6},{"text":"OWASP","start":36,"end":41,"id":7},{"text":"Top","start":42,"end":45,"id":8},{"text":"10","start":46,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} {"text":"AWS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":411302902,"_task_hash":-651527579,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Analyzed Heap Overflow samples in malware lab.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1831032827,"_task_hash":1904785688,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Heap","start":9,"end":13,"id":1},{"text":"Overflow","start":14,"end":22,"id":2},{"text":"samples","start":23,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"malware","start":34,"end":41,"id":5},{"text":"lab","start":42,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Specialized in IoT Security for enterprise environments.","spans":[{"start":15,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2014488931,"_task_hash":-1191400475,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"IoT","start":15,"end":18,"id":2},{"text":"Security","start":19,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"environments","start":43,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Hiring Test Automation Specialist for AI Market Trends and Zero-Day detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":59,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1426683164,"_task_hash":1321380994,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Automation","start":12,"end":22,"id":2},{"text":"Specialist","start":23,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"AI","start":38,"end":40,"id":5},{"text":"Market","start":41,"end":47,"id":6},{"text":"Trends","start":48,"end":54,"id":7},{"text":"and","start":55,"end":58,"id":8},{"text":"Zero","start":59,"end":63,"id":9},{"text":"-","start":63,"end":64,"id":10},{"text":"Day","start":64,"end":67,"id":11},{"text":"detection","start":68,"end":77,"id":12},{"text":".","start":77,"end":78,"id":13}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Looking for Ethical Hacker to lead Security Culture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":51,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1333134731,"_task_hash":506412747,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Ethical","start":12,"end":19,"id":2},{"text":"Hacker","start":20,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Security","start":35,"end":43,"id":6},{"text":"Culture","start":44,"end":51,"id":7},{"text":"initiatives","start":52,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} {"text":"Analyzed botnet campaign targeting financial sector.","spans":[{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1342292590,"_task_hash":1743081100,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"botnet","start":9,"end":15,"id":1},{"text":"campaign","start":16,"end":24,"id":2},{"text":"targeting","start":25,"end":34,"id":3},{"text":"financial","start":35,"end":44,"id":4},{"text":"sector","start":45,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Led Cryptography initiatives across organization.","spans":[{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1273649871,"_task_hash":1198296430,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Cryptography","start":4,"end":16,"id":1},{"text":"initiatives","start":17,"end":28,"id":2},{"text":"across","start":29,"end":35,"id":3},{"text":"organization","start":36,"end":48,"id":4},{"text":".","start":48,"end":49,"id":5}]} {"text":"We need a Lead Software Engineer skilled in Cross-Site Scripting prevention and malware analysis using SIEM Operations.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":44,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":87,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":103,"end":118,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-62018750,"_task_hash":360614429,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Lead","start":10,"end":14,"id":3},{"text":"Software","start":15,"end":23,"id":4},{"text":"Engineer","start":24,"end":32,"id":5},{"text":"skilled","start":33,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Cross","start":44,"end":49,"id":8},{"text":"-","start":49,"end":50,"id":9},{"text":"Site","start":50,"end":54,"id":10},{"text":"Scripting","start":55,"end":64,"id":11},{"text":"prevention","start":65,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"malware","start":80,"end":87,"id":14},{"text":"analysis","start":88,"end":96,"id":15},{"text":"using","start":97,"end":102,"id":16},{"text":"SIEM","start":103,"end":107,"id":17},{"text":"Operations","start":108,"end":118,"id":18},{"text":".","start":118,"end":119,"id":19}]} {"text":"Threat Hunter with GIAC certification, expert in Snort.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":19,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":49,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1809001771,"_task_hash":971513800,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"GIAC","start":19,"end":23,"id":3},{"text":"certification","start":24,"end":37,"id":4},{"text":",","start":37,"end":38,"id":5},{"text":"expert","start":39,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"Snort","start":49,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Penetration Tester exploited CVE-2021-44228 during assessment.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":29,"end":43,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-766177368,"_task_hash":-1585271199,"tokens":[{"text":"Penetration","start":0,"end":11,"id":0},{"text":"Tester","start":12,"end":18,"id":1},{"text":"exploited","start":19,"end":28,"id":2},{"text":"CVE-2021","start":29,"end":37,"id":3},{"text":"-","start":37,"end":38,"id":4},{"text":"44228","start":38,"end":43,"id":5},{"text":"during","start":44,"end":50,"id":6},{"text":"assessment","start":51,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} {"text":"Join our team as Director of Security!","spans":[{"start":17,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1230822913,"_task_hash":-1815001244,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Director","start":17,"end":25,"id":4},{"text":"of","start":26,"end":28,"id":5},{"text":"Security","start":29,"end":37,"id":6},{"text":"!","start":37,"end":38,"id":7}]} {"text":"Must know Nessus, Metasploit, and OWASP Top 10.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":34,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1441019918,"_task_hash":-605240810,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Metasploit","start":18,"end":28,"id":4},{"text":",","start":28,"end":29,"id":5},{"text":"and","start":30,"end":33,"id":6},{"text":"OWASP","start":34,"end":39,"id":7},{"text":"Top","start":40,"end":43,"id":8},{"text":"10","start":44,"end":46,"id":9},{"text":".","start":46,"end":47,"id":10}]} {"text":"ITIL certification a plus.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1265801176,"_task_hash":1926694503,"tokens":[{"text":"ITIL","start":0,"end":4,"id":0},{"text":"certification","start":5,"end":18,"id":1},{"text":"a","start":19,"end":20,"id":2},{"text":"plus","start":21,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Vulnerability Analyst needed for enterprise security team.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-814514146,"_task_hash":1320032525,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Analyst","start":14,"end":21,"id":1},{"text":"needed","start":22,"end":28,"id":2},{"text":"for","start":29,"end":32,"id":3},{"text":"enterprise","start":33,"end":43,"id":4},{"text":"security","start":44,"end":52,"id":5},{"text":"team","start":53,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} {"text":"Senior IT Incident Manager skilled in Firewall Management, Graphics, and Cloud Security Posture Management.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":59,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":73,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1110904482,"_task_hash":-439651632,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"Incident","start":10,"end":18,"id":2},{"text":"Manager","start":19,"end":26,"id":3},{"text":"skilled","start":27,"end":34,"id":4},{"text":"in","start":35,"end":37,"id":5},{"text":"Firewall","start":38,"end":46,"id":6},{"text":"Management","start":47,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"Graphics","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Cloud","start":73,"end":78,"id":12},{"text":"Security","start":79,"end":87,"id":13},{"text":"Posture","start":88,"end":95,"id":14},{"text":"Management","start":96,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"NLP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1598323033,"_task_hash":-155365979,"tokens":[{"text":"NLP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Certified CISSP working on GDPR compliance using Splunk.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":31,"label":"REGULATION","answer":"accept","token_start":4,"token_end":4},{"start":49,"end":55,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-879423670,"_task_hash":-544447195,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CISSP","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"on","start":24,"end":26,"id":3},{"text":"GDPR","start":27,"end":31,"id":4},{"text":"compliance","start":32,"end":42,"id":5},{"text":"using","start":43,"end":48,"id":6},{"text":"Splunk","start":49,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"Reported DORA compliance status to board.","spans":[{"start":9,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1739208919,"_task_hash":-220778146,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"DORA","start":9,"end":13,"id":1},{"text":"compliance","start":14,"end":24,"id":2},{"text":"status","start":25,"end":31,"id":3},{"text":"to","start":32,"end":34,"id":4},{"text":"board","start":35,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Trained developers on Privilege Escalation prevention.","spans":[{"start":22,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1486530812,"_task_hash":-287536255,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Privilege","start":22,"end":31,"id":3},{"text":"Escalation","start":32,"end":42,"id":4},{"text":"prevention","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Software Development Engineer in Test professional with 5++ years implementing SIEM Operations and managing Awareness Programs programs.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":79,"end":94,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1512058564,"_task_hash":1122793132,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Development","start":9,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Test","start":33,"end":37,"id":4},{"text":"professional","start":38,"end":50,"id":5},{"text":"with","start":51,"end":55,"id":6},{"text":"5++","start":56,"end":59,"id":7},{"text":"years","start":60,"end":65,"id":8},{"text":"implementing","start":66,"end":78,"id":9},{"text":"SIEM","start":79,"end":83,"id":10},{"text":"Operations","start":84,"end":94,"id":11},{"text":"and","start":95,"end":98,"id":12},{"text":"managing","start":99,"end":107,"id":13},{"text":"Awareness","start":108,"end":117,"id":14},{"text":"Programs","start":118,"end":126,"id":15},{"text":"programs","start":127,"end":135,"id":16},{"text":".","start":135,"end":136,"id":17}]} {"text":"Experienced Test Automation Engineer specializing in Pod Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-234572808,"_task_hash":-722647711,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Test","start":12,"end":16,"id":1},{"text":"Automation","start":17,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Pod","start":53,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} {"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Mentored junior engineers in Incident Response.","spans":[{"start":29,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1092597003,"_task_hash":-180941308,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Incident","start":29,"end":37,"id":4},{"text":"Response","start":38,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Application Security Specialist with hands-on experience in EDR Tools, Splunk, and Bluetooth Security.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":60,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":944522749,"_task_hash":1213786730,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Specialist","start":21,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"hands","start":37,"end":42,"id":4},{"text":"-","start":42,"end":43,"id":5},{"text":"on","start":43,"end":45,"id":6},{"text":"experience","start":46,"end":56,"id":7},{"text":"in","start":57,"end":59,"id":8},{"text":"EDR","start":60,"end":63,"id":9},{"text":"Tools","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Bluetooth","start":83,"end":92,"id":15},{"text":"Security","start":93,"end":101,"id":16},{"text":".","start":101,"end":102,"id":17}]} {"text":"Holds MFA & SSO.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-292355214,"_task_hash":-664029969,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"MFA","start":6,"end":9,"id":1},{"text":"&","start":10,"end":11,"id":2},{"text":"SSO","start":12,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Database Manager opportunity: Lead Security Design program, implement OWASP Top 10, manage Mobile Testing operations.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":35,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":82,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":91,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":403544498,"_task_hash":-1380006178,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"opportunity","start":17,"end":28,"id":2},{"text":":","start":28,"end":29,"id":3},{"text":"Lead","start":30,"end":34,"id":4},{"text":"Security","start":35,"end":43,"id":5},{"text":"Design","start":44,"end":50,"id":6},{"text":"program","start":51,"end":58,"id":7},{"text":",","start":58,"end":59,"id":8},{"text":"implement","start":60,"end":69,"id":9},{"text":"OWASP","start":70,"end":75,"id":10},{"text":"Top","start":76,"end":79,"id":11},{"text":"10","start":80,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"manage","start":84,"end":90,"id":14},{"text":"Mobile","start":91,"end":97,"id":15},{"text":"Testing","start":98,"end":105,"id":16},{"text":"operations","start":106,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} {"text":"Developed COPPA policies and procedures.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-909608945,"_task_hash":1830570793,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"COPPA","start":10,"end":15,"id":1},{"text":"policies","start":16,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"procedures","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Experienced UI Designer specializing in IoT Security.","spans":[{"start":12,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":40,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":803800254,"_task_hash":1009363017,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"UI","start":12,"end":14,"id":1},{"text":"Designer","start":15,"end":23,"id":2},{"text":"specializing","start":24,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"IoT","start":40,"end":43,"id":5},{"text":"Security","start":44,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Proficient in Wireshark and SIEM Operations.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1905473231,"_task_hash":-1012059498,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"SIEM","start":28,"end":32,"id":4},{"text":"Operations","start":33,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Seeking Penetration Tester with 7+ years experience in Stakeholder Engagement and GraphQL.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":55,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1571132459,"_task_hash":-1204559901,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Penetration","start":8,"end":19,"id":1},{"text":"Tester","start":20,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"7","start":32,"end":33,"id":4},{"text":"+","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"Stakeholder","start":55,"end":66,"id":9},{"text":"Engagement","start":67,"end":77,"id":10},{"text":"and","start":78,"end":81,"id":11},{"text":"GraphQL","start":82,"end":89,"id":12},{"text":".","start":89,"end":90,"id":13}]} {"text":"ETL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":962383227,"_task_hash":1488707885,"tokens":[{"text":"ETL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"SOC Analyst with GWAPT certification, expert in Carbon Black.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":22,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":48,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":416830488,"_task_hash":-649939691,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GWAPT","start":17,"end":22,"id":3},{"text":"certification","start":23,"end":36,"id":4},{"text":",","start":36,"end":37,"id":5},{"text":"expert","start":38,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Carbon","start":48,"end":54,"id":8},{"text":"Black","start":55,"end":60,"id":9},{"text":".","start":60,"end":61,"id":10}]} {"text":"Hiring Copywriter for Front End and spyware detection.","spans":[{"start":7,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":22,"end":31,"label":"TECHNICAL_SKILL","answer":"accept","token_start":3,"token_end":4},{"start":36,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1567672656,"_task_hash":2051083649,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Copywriter","start":7,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Front","start":22,"end":27,"id":3},{"text":"End","start":28,"end":31,"id":4},{"text":"and","start":32,"end":35,"id":5},{"text":"spyware","start":36,"end":43,"id":6},{"text":"detection","start":44,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"DORA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1261348331,"_task_hash":-1599854490,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Front\u2011End Developer with expertise in OWASP Top 10 compliance and Secure Coding operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":66,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1912389602,"_task_hash":1969169953,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"OWASP","start":38,"end":43,"id":5},{"text":"Top","start":44,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Secure","start":66,"end":72,"id":10},{"text":"Coding","start":73,"end":79,"id":11},{"text":"operations","start":80,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Assessed GRC maturity using industry frameworks.","spans":[{"start":9,"end":12,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":12,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1435863221,"_task_hash":-600871614,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"GRC","start":9,"end":12,"id":1},{"text":"maturity","start":13,"end":21,"id":2},{"text":"using","start":22,"end":27,"id":3},{"text":"industry","start":28,"end":36,"id":4},{"text":"frameworks","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Expert in OT Security best practices.","spans":[{"start":10,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":432220059,"_task_hash":1165306167,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"OT","start":10,"end":12,"id":2},{"text":"Security","start":13,"end":21,"id":3},{"text":"best","start":22,"end":26,"id":4},{"text":"practices","start":27,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Accomplished Crisis Manager specializing in Secure Multi-Party Computation and Security Automation.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":9},{"start":79,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1920450796,"_task_hash":10576172,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Crisis","start":13,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Secure","start":44,"end":50,"id":5},{"text":"Multi","start":51,"end":56,"id":6},{"text":"-","start":56,"end":57,"id":7},{"text":"Party","start":57,"end":62,"id":8},{"text":"Computation","start":63,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"Security","start":79,"end":87,"id":11},{"text":"Automation","start":88,"end":98,"id":12},{"text":".","start":98,"end":99,"id":13}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"We need a IoT Solutions Architect skilled in Credential Stuffing prevention and Man-in-the-Middle analysis using Nessus.","spans":[{"start":10,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":45,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":80,"end":97,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":18},{"start":113,"end":119,"label":"SECURITY_TOOL","answer":"accept","token_start":21,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":995067720,"_task_hash":-662391656,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"IoT","start":10,"end":13,"id":3},{"text":"Solutions","start":14,"end":23,"id":4},{"text":"Architect","start":24,"end":33,"id":5},{"text":"skilled","start":34,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Credential","start":45,"end":55,"id":8},{"text":"Stuffing","start":56,"end":64,"id":9},{"text":"prevention","start":65,"end":75,"id":10},{"text":"and","start":76,"end":79,"id":11},{"text":"Man","start":80,"end":83,"id":12},{"text":"-","start":83,"end":84,"id":13},{"text":"in","start":84,"end":86,"id":14},{"text":"-","start":86,"end":87,"id":15},{"text":"the","start":87,"end":90,"id":16},{"text":"-","start":90,"end":91,"id":17},{"text":"Middle","start":91,"end":97,"id":18},{"text":"analysis","start":98,"end":106,"id":19},{"text":"using","start":107,"end":112,"id":20},{"text":"Nessus","start":113,"end":119,"id":21},{"text":".","start":119,"end":120,"id":22}]} {"text":"Briefed executives on rootkit risks.","spans":[{"start":22,"end":29,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":29,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2015961743,"_task_hash":922725162,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"rootkit","start":22,"end":29,"id":3},{"text":"risks","start":30,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Discovered and reported CVE-2022-27518 affecting critical infrastructure.","spans":[{"start":24,"end":38,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1780412172,"_task_hash":-1355059011,"tokens":[{"text":"Discovered","start":0,"end":10,"id":0},{"text":"and","start":11,"end":14,"id":1},{"text":"reported","start":15,"end":23,"id":2},{"text":"CVE-2022","start":24,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"27518","start":33,"end":38,"id":5},{"text":"affecting","start":39,"end":48,"id":6},{"text":"critical","start":49,"end":57,"id":7},{"text":"infrastructure","start":58,"end":72,"id":8},{"text":".","start":72,"end":73,"id":9}]} {"text":"Published threat intel report on zero-day exploit trends.","spans":[{"start":33,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1444953499,"_task_hash":664691084,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"zero","start":33,"end":37,"id":5},{"text":"-","start":37,"end":38,"id":6},{"text":"day","start":38,"end":41,"id":7},{"text":"exploit","start":42,"end":49,"id":8},{"text":"trends","start":50,"end":56,"id":9},{"text":".","start":56,"end":57,"id":10}]} {"text":"Senior Mobile Developer skilled in Compliance Standards, Systematic Review, and Wireless Security.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":35,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":57,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":80,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1365644857,"_task_hash":969834046,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Mobile","start":7,"end":13,"id":1},{"text":"Developer","start":14,"end":23,"id":2},{"text":"skilled","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"Compliance","start":35,"end":45,"id":5},{"text":"Standards","start":46,"end":55,"id":6},{"text":",","start":55,"end":56,"id":7},{"text":"Systematic","start":57,"end":67,"id":8},{"text":"Review","start":68,"end":74,"id":9},{"text":",","start":74,"end":75,"id":10},{"text":"and","start":76,"end":79,"id":11},{"text":"Wireless","start":80,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":".","start":97,"end":98,"id":14}]} {"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"Quality Assurance Engineer experienced in detecting spyware attacks using SIEM Operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-239533717,"_task_hash":805514424,"tokens":[{"text":"Quality","start":0,"end":7,"id":0},{"text":"Assurance","start":8,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"experienced","start":27,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"detecting","start":42,"end":51,"id":5},{"text":"spyware","start":52,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"SIEM","start":74,"end":78,"id":9},{"text":"Operations","start":79,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Accomplished Big Data Engineer specializing in Project Management and Security Frameworks.","spans":[{"start":13,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1074750112,"_task_hash":-1427358056,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Big","start":13,"end":16,"id":1},{"text":"Data","start":17,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"specializing","start":31,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"Project","start":47,"end":54,"id":6},{"text":"Management","start":55,"end":65,"id":7},{"text":"and","start":66,"end":69,"id":8},{"text":"Security","start":70,"end":78,"id":9},{"text":"Frameworks","start":79,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"AI experienced in detecting Supply Chain Attack attacks using SIEM Operations.","spans":[{"start":0,"end":2,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":28,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1458539544,"_task_hash":-1676344936,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"experienced","start":3,"end":14,"id":1},{"text":"in","start":15,"end":17,"id":2},{"text":"detecting","start":18,"end":27,"id":3},{"text":"Supply","start":28,"end":34,"id":4},{"text":"Chain","start":35,"end":40,"id":5},{"text":"Attack","start":41,"end":47,"id":6},{"text":"attacks","start":48,"end":55,"id":7},{"text":"using","start":56,"end":61,"id":8},{"text":"SIEM","start":62,"end":66,"id":9},{"text":"Operations","start":67,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Looking for Red Team Operator to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":38,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1012923588,"_task_hash":-275250338,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Red","start":12,"end":15,"id":2},{"text":"Team","start":16,"end":20,"id":3},{"text":"Operator","start":21,"end":29,"id":4},{"text":"to","start":30,"end":32,"id":5},{"text":"lead","start":33,"end":37,"id":6},{"text":"Cloud","start":38,"end":43,"id":7},{"text":"Security","start":44,"end":52,"id":8},{"text":"Testing","start":53,"end":60,"id":9},{"text":"initiatives","start":61,"end":72,"id":10},{"text":".","start":72,"end":73,"id":11}]} {"text":"Must have CrowdStrike experience and NIST Framework knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-3577102,"_task_hash":1298442445,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"knowledge","start":52,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} {"text":"Coordinated disclosure of CVE-2022-22965 with vendor.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-461759303,"_task_hash":19704695,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2022","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"22965","start":35,"end":40,"id":5},{"text":"with","start":41,"end":45,"id":6},{"text":"vendor","start":46,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Hiring Risk Assessment Analyst for Blog Writing and botnet detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1489530019,"_task_hash":-832746498,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Assessment","start":12,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Blog","start":35,"end":39,"id":5},{"text":"Writing","start":40,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"botnet","start":52,"end":58,"id":8},{"text":"detection","start":59,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Recovered systems after Advanced Persistent Threat attack.","spans":[{"start":24,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1351127575,"_task_hash":1203085586,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"Advanced","start":24,"end":32,"id":3},{"text":"Persistent","start":33,"end":43,"id":4},{"text":"Threat","start":44,"end":50,"id":5},{"text":"attack","start":51,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Accomplished Data Privacy Analyst specializing in Game Mechanics and Aqua Security.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-16775992,"_task_hash":1700120250,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Data","start":13,"end":17,"id":1},{"text":"Privacy","start":18,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Game","start":50,"end":54,"id":6},{"text":"Mechanics","start":55,"end":64,"id":7},{"text":"and","start":65,"end":68,"id":8},{"text":"Aqua","start":69,"end":73,"id":9},{"text":"Security","start":74,"end":82,"id":10},{"text":".","start":82,"end":83,"id":11}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Lead Senior Developer managing Infrastructure Management and Troubleshooting initiatives.","spans":[{"start":5,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-161129108,"_task_hash":-472434969,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Senior","start":5,"end":11,"id":1},{"text":"Developer","start":12,"end":21,"id":2},{"text":"managing","start":22,"end":30,"id":3},{"text":"Infrastructure","start":31,"end":45,"id":4},{"text":"Management","start":46,"end":56,"id":5},{"text":"and","start":57,"end":60,"id":6},{"text":"Troubleshooting","start":61,"end":76,"id":7},{"text":"initiatives","start":77,"end":88,"id":8},{"text":".","start":88,"end":89,"id":9}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Detected rootkit activity using behavioral analytics.","spans":[{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-874283467,"_task_hash":-415450954,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"rootkit","start":9,"end":16,"id":1},{"text":"activity","start":17,"end":25,"id":2},{"text":"using","start":26,"end":31,"id":3},{"text":"behavioral","start":32,"end":42,"id":4},{"text":"analytics","start":43,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Accomplished Solutions Architect specializing in Evidence Analysis and Security Operations.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1863738642,"_task_hash":-618451188,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Solutions","start":13,"end":22,"id":1},{"text":"Architect","start":23,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Evidence","start":49,"end":57,"id":5},{"text":"Analysis","start":58,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"Security","start":71,"end":79,"id":8},{"text":"Operations","start":80,"end":90,"id":9},{"text":".","start":90,"end":91,"id":10}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Security Vulnerability Analyst with hands-on experience in Burp Suite, Splunk, and Security.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":726599488,"_task_hash":-2014331586,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"hands","start":36,"end":41,"id":4},{"text":"-","start":41,"end":42,"id":5},{"text":"on","start":42,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Burp","start":59,"end":63,"id":9},{"text":"Suite","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Security","start":83,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} {"text":"Holds RBAC.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1050074114,"_task_hash":896161982,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Mitigated Format String through code remediation.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1137982284,"_task_hash":-2105046841,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Format","start":10,"end":16,"id":1},{"text":"String","start":17,"end":23,"id":2},{"text":"through","start":24,"end":31,"id":3},{"text":"code","start":32,"end":36,"id":4},{"text":"remediation","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Senior IAM Engineer skilled in Crisis Response, Python, and Terraform Security.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":48,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":60,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2110622880,"_task_hash":-663088624,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"skilled","start":20,"end":27,"id":3},{"text":"in","start":28,"end":30,"id":4},{"text":"Crisis","start":31,"end":37,"id":5},{"text":"Response","start":38,"end":46,"id":6},{"text":",","start":46,"end":47,"id":7},{"text":"Python","start":48,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"and","start":56,"end":59,"id":10},{"text":"Terraform","start":60,"end":69,"id":11},{"text":"Security","start":70,"end":78,"id":12},{"text":".","start":78,"end":79,"id":13}]} {"text":"C++ certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1590806424,"_task_hash":1726592216,"tokens":[{"text":"C++","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"IT GRC Specialist with expertise in NIST Framework compliance and Solution Modeling operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":66,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":438739304,"_task_hash":599239579,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"GRC","start":3,"end":6,"id":1},{"text":"Specialist","start":7,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Solution","start":66,"end":74,"id":10},{"text":"Modeling","start":75,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} {"text":"Presented Digital Forensics updates to leadership.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-533005828,"_task_hash":691969539,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Digital","start":10,"end":17,"id":1},{"text":"Forensics","start":18,"end":27,"id":2},{"text":"updates","start":28,"end":35,"id":3},{"text":"to","start":36,"end":38,"id":4},{"text":"leadership","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Led Application Security initiatives across organization.","spans":[{"start":4,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":969619651,"_task_hash":272970286,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Application","start":4,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"initiatives","start":25,"end":36,"id":3},{"text":"across","start":37,"end":43,"id":4},{"text":"organization","start":44,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} {"text":"Data Privacy Analyst experienced in detecting rootkit attacks using CrowdStrike.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":68,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":745604020,"_task_hash":1195046385,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Privacy","start":5,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"experienced","start":21,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"detecting","start":36,"end":45,"id":5},{"text":"rootkit","start":46,"end":53,"id":6},{"text":"attacks","start":54,"end":61,"id":7},{"text":"using","start":62,"end":67,"id":8},{"text":"CrowdStrike","start":68,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]}