{"text":"Required skills: Splunk, AI Integration, PRINCE2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":41,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1196138937,"_task_hash":1721907466,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"AI","start":25,"end":27,"id":5},{"text":"Integration","start":28,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"PRINCE2","start":41,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} {"text":"Led Blue Team initiatives across organization.","spans":[{"start":4,"end":13,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1779852104,"_task_hash":-1505170454,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Blue","start":4,"end":8,"id":1},{"text":"Team","start":9,"end":13,"id":2},{"text":"initiatives","start":14,"end":25,"id":3},{"text":"across","start":26,"end":32,"id":4},{"text":"organization","start":33,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Hiring Industrial IoT Security Specialist for Wireframing and Supply Chain Attack detection.","spans":[{"start":7,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":46,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-163062240,"_task_hash":797017760,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Industrial","start":7,"end":17,"id":1},{"text":"IoT","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Specialist","start":31,"end":41,"id":4},{"text":"for","start":42,"end":45,"id":5},{"text":"Wireframing","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Supply","start":62,"end":68,"id":8},{"text":"Chain","start":69,"end":74,"id":9},{"text":"Attack","start":75,"end":81,"id":10},{"text":"detection","start":82,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} {"text":"OSINT certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1903586176,"_task_hash":1692638379,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Join our team as Cybersecurity Threat Hunter!","spans":[{"start":17,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":548661673,"_task_hash":1021867763,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Cybersecurity","start":17,"end":30,"id":4},{"text":"Threat","start":31,"end":37,"id":5},{"text":"Hunter","start":38,"end":44,"id":6},{"text":"!","start":44,"end":45,"id":7}]} {"text":"Must have SIEM experience and NIST Framework knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1703965436,"_task_hash":1407445997,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"knowledge","start":45,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Immediate opening for AWS Architect.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-839712001,"_task_hash":1600601917,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"AWS","start":22,"end":25,"id":3},{"text":"Architect","start":26,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Looking for Defensive Security Analyst to lead Security Integration initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1715764412,"_task_hash":1492680327,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Defensive","start":12,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Analyst","start":31,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"Integration","start":56,"end":67,"id":8},{"text":"initiatives","start":68,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Cloud Security Engineer with hands-on experience in SIEM, CrowdStrike, and Model Security.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":75,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":920743317,"_task_hash":531937127,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"hands","start":29,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"on","start":35,"end":37,"id":6},{"text":"experience","start":38,"end":48,"id":7},{"text":"in","start":49,"end":51,"id":8},{"text":"SIEM","start":52,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"CrowdStrike","start":58,"end":69,"id":11},{"text":",","start":69,"end":70,"id":12},{"text":"and","start":71,"end":74,"id":13},{"text":"Model","start":75,"end":80,"id":14},{"text":"Security","start":81,"end":89,"id":15},{"text":".","start":89,"end":90,"id":16}]} {"text":"Immediate opening for Reverse Engineering Analyst.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1587186105,"_task_hash":118661133,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Reverse","start":22,"end":29,"id":3},{"text":"Engineering","start":30,"end":41,"id":4},{"text":"Analyst","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Holds DNS/DHCP certification.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1789880151,"_task_hash":690454037,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"DNS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DHCP","start":10,"end":14,"id":3},{"text":"certification","start":15,"end":28,"id":4},{"text":".","start":28,"end":29,"id":5}]} {"text":"Coordinated with law enforcement on drive-by download case.","spans":[{"start":36,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":8},{"start":36,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-471295193,"_task_hash":389810600,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"drive","start":36,"end":41,"id":5},{"text":"-","start":41,"end":42,"id":6},{"text":"by","start":42,"end":44,"id":7},{"text":"download","start":45,"end":53,"id":8},{"text":"case","start":54,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"Malware Reverse Engineer opportunity: Lead Pod Security program, implement OWASP Top 10, manage Spark operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":75,"end":87,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":96,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":534212351,"_task_hash":-33304797,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Reverse","start":8,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"opportunity","start":25,"end":36,"id":3},{"text":":","start":36,"end":37,"id":4},{"text":"Lead","start":38,"end":42,"id":5},{"text":"Pod","start":43,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"program","start":56,"end":63,"id":8},{"text":",","start":63,"end":64,"id":9},{"text":"implement","start":65,"end":74,"id":10},{"text":"OWASP","start":75,"end":80,"id":11},{"text":"Top","start":81,"end":84,"id":12},{"text":"10","start":85,"end":87,"id":13},{"text":",","start":87,"end":88,"id":14},{"text":"manage","start":89,"end":95,"id":15},{"text":"Spark","start":96,"end":101,"id":16},{"text":"operations","start":102,"end":112,"id":17},{"text":".","start":112,"end":113,"id":18}]} {"text":"STIX/TAXII certified.","spans":[{"start":0,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1844797163,"_task_hash":-642556357,"tokens":[{"text":"STIX","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"TAXII","start":5,"end":10,"id":2},{"text":"certified","start":11,"end":20,"id":3},{"text":".","start":20,"end":21,"id":4}]} {"text":"ROS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1197145013,"_task_hash":295536482,"tokens":[{"text":"ROS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Business Data Analyst with hands-on experience in CrowdStrike, SIEM Operations, and Bluetooth Security.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":63,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1963612970,"_task_hash":-1525281708,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Data","start":9,"end":13,"id":1},{"text":"Analyst","start":14,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"hands","start":27,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"on","start":33,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"CrowdStrike","start":50,"end":61,"id":9},{"text":",","start":61,"end":62,"id":10},{"text":"SIEM","start":63,"end":67,"id":11},{"text":"Operations","start":68,"end":78,"id":12},{"text":",","start":78,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"Bluetooth","start":84,"end":93,"id":15},{"text":"Security","start":94,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} {"text":"Endpoint Security Specialist with 10 years experience in Version Control, User Activity Monitoring, and Protocols.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13},{"start":104,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1504376676,"_task_hash":1854625531,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"10","start":34,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Version","start":57,"end":64,"id":8},{"text":"Control","start":65,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"User","start":74,"end":78,"id":11},{"text":"Activity","start":79,"end":87,"id":12},{"text":"Monitoring","start":88,"end":98,"id":13},{"text":",","start":98,"end":99,"id":14},{"text":"and","start":100,"end":103,"id":15},{"text":"Protocols","start":104,"end":113,"id":16},{"text":".","start":113,"end":114,"id":17}]} {"text":"Senior Machine Learning Operations Engineer skilled in Cyber Kill Chain, Enterprise Architecture, and Security Frameworks.","spans":[{"start":7,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":55,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":73,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":102,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":79454240,"_task_hash":109449422,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Machine","start":7,"end":14,"id":1},{"text":"Learning","start":15,"end":23,"id":2},{"text":"Operations","start":24,"end":34,"id":3},{"text":"Engineer","start":35,"end":43,"id":4},{"text":"skilled","start":44,"end":51,"id":5},{"text":"in","start":52,"end":54,"id":6},{"text":"Cyber","start":55,"end":60,"id":7},{"text":"Kill","start":61,"end":65,"id":8},{"text":"Chain","start":66,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Enterprise","start":73,"end":83,"id":11},{"text":"Architecture","start":84,"end":96,"id":12},{"text":",","start":96,"end":97,"id":13},{"text":"and","start":98,"end":101,"id":14},{"text":"Security","start":102,"end":110,"id":15},{"text":"Frameworks","start":111,"end":121,"id":16},{"text":".","start":121,"end":122,"id":17}]} {"text":"Certified NIST RMF working as Technology Manager, focused on Security Culture and Clickjacking prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":82,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1978344870,"_task_hash":1176686237,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Technology","start":30,"end":40,"id":5},{"text":"Manager","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Security","start":61,"end":69,"id":10},{"text":"Culture","start":70,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Clickjacking","start":82,"end":94,"id":13},{"text":"prevention","start":95,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} {"text":"Front\u2011End Developer role available: Network Penetration Testing experience required, Security Scanning Tools knowledge essential.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":85,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1647571379,"_task_hash":1760088719,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"role","start":20,"end":24,"id":2},{"text":"available","start":25,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"Network","start":36,"end":43,"id":5},{"text":"Penetration","start":44,"end":55,"id":6},{"text":"Testing","start":56,"end":63,"id":7},{"text":"experience","start":64,"end":74,"id":8},{"text":"required","start":75,"end":83,"id":9},{"text":",","start":83,"end":84,"id":10},{"text":"Security","start":85,"end":93,"id":11},{"text":"Scanning","start":94,"end":102,"id":12},{"text":"Tools","start":103,"end":108,"id":13},{"text":"knowledge","start":109,"end":118,"id":14},{"text":"essential","start":119,"end":128,"id":15},{"text":".","start":128,"end":129,"id":16}]} {"text":"FERPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1817666216,"_task_hash":1295086938,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Immediate opening for Social Engineering Tester.","spans":[{"start":22,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1153568392,"_task_hash":830153958,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Social","start":22,"end":28,"id":3},{"text":"Engineering","start":29,"end":40,"id":4},{"text":"Tester","start":41,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Deployed CNAPP across 500+ endpoints.","spans":[{"start":9,"end":14,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-806762439,"_task_hash":-141465420,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"CNAPP","start":9,"end":14,"id":1},{"text":"across","start":15,"end":21,"id":2},{"text":"500","start":22,"end":25,"id":3},{"text":"+","start":25,"end":26,"id":4},{"text":"endpoints","start":27,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Lead DevSecOps Engineer managing PKI and Autonomous Navigation initiatives.","spans":[{"start":5,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":33,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-2010469057,"_task_hash":-1195419762,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"DevSecOps","start":5,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"managing","start":24,"end":32,"id":3},{"text":"PKI","start":33,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Autonomous","start":41,"end":51,"id":6},{"text":"Navigation","start":52,"end":62,"id":7},{"text":"initiatives","start":63,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} {"text":"Implemented OIDC solution for enterprise security monitoring.","spans":[{"start":12,"end":16,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1},{"start":12,"end":16,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1466702771,"_task_hash":-1474697628,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OIDC","start":12,"end":16,"id":1},{"text":"solution","start":17,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"monitoring","start":50,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Reverse Engineering Analyst with expertise in NIST Framework compliance and Behavioral Analysis operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":803771858,"_task_hash":1665194450,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"Engineering","start":8,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"expertise","start":33,"end":42,"id":4},{"text":"in","start":43,"end":45,"id":5},{"text":"NIST","start":46,"end":50,"id":6},{"text":"Framework","start":51,"end":60,"id":7},{"text":"compliance","start":61,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Behavioral","start":76,"end":86,"id":10},{"text":"Analysis","start":87,"end":95,"id":11},{"text":"operations","start":96,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} {"text":"Holds NLP.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1135871197,"_task_hash":-1710779549,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"NLP","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Created detection rules for CVE-2024-3400 exploitation attempts.","spans":[{"start":28,"end":41,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1033624923,"_task_hash":4081692,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"detection","start":8,"end":17,"id":1},{"text":"rules","start":18,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"CVE-2024","start":28,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"3400","start":37,"end":41,"id":6},{"text":"exploitation","start":42,"end":54,"id":7},{"text":"attempts","start":55,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Senior Secure DevOps Specialist position: 10+ years minimum, expert in Tableau, Solution Frameworks, and Security Assessment.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":71,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":80,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":105,"end":124,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1842707754,"_task_hash":1211446924,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Secure","start":7,"end":13,"id":1},{"text":"DevOps","start":14,"end":20,"id":2},{"text":"Specialist","start":21,"end":31,"id":3},{"text":"position","start":32,"end":40,"id":4},{"text":":","start":40,"end":41,"id":5},{"text":"10","start":42,"end":44,"id":6},{"text":"+","start":44,"end":45,"id":7},{"text":"years","start":46,"end":51,"id":8},{"text":"minimum","start":52,"end":59,"id":9},{"text":",","start":59,"end":60,"id":10},{"text":"expert","start":61,"end":67,"id":11},{"text":"in","start":68,"end":70,"id":12},{"text":"Tableau","start":71,"end":78,"id":13},{"text":",","start":78,"end":79,"id":14},{"text":"Solution","start":80,"end":88,"id":15},{"text":"Frameworks","start":89,"end":99,"id":16},{"text":",","start":99,"end":100,"id":17},{"text":"and","start":101,"end":104,"id":18},{"text":"Security","start":105,"end":113,"id":19},{"text":"Assessment","start":114,"end":124,"id":20},{"text":".","start":124,"end":125,"id":21}]} {"text":"Experienced GRC Specialist specializing in Application Security Architecture.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":43,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":66488447,"_task_hash":-956106018,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"GRC","start":12,"end":15,"id":1},{"text":"Specialist","start":16,"end":26,"id":2},{"text":"specializing","start":27,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"Application","start":43,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Architecture","start":64,"end":76,"id":7},{"text":".","start":76,"end":77,"id":8}]} {"text":"Red Team Lead with GWAPT certification, expert in YARA.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":19,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":50,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1936159666,"_task_hash":108277349,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Lead","start":9,"end":13,"id":2},{"text":"with","start":14,"end":18,"id":3},{"text":"GWAPT","start":19,"end":24,"id":4},{"text":"certification","start":25,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"expert","start":40,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"YARA","start":50,"end":54,"id":9},{"text":".","start":54,"end":55,"id":10}]} {"text":"Led GRC initiatives across organization.","spans":[{"start":4,"end":7,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1428718094,"_task_hash":-417605768,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"GRC","start":4,"end":7,"id":1},{"text":"initiatives","start":8,"end":19,"id":2},{"text":"across","start":20,"end":26,"id":3},{"text":"organization","start":27,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Security Awareness Consultant experienced in detecting worm attacks using SIEM Operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1498410423,"_task_hash":-848125818,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Consultant","start":19,"end":29,"id":2},{"text":"experienced","start":30,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"detecting","start":45,"end":54,"id":5},{"text":"worm","start":55,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"SIEM","start":74,"end":78,"id":9},{"text":"Operations","start":79,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Content Writer experienced in detecting adware attacks using Metasploit.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":40,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":61,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1365491188,"_task_hash":1418008272,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Writer","start":8,"end":14,"id":1},{"text":"experienced","start":15,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"detecting","start":30,"end":39,"id":4},{"text":"adware","start":40,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":"using","start":55,"end":60,"id":7},{"text":"Metasploit","start":61,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"Implemented controls to prevent zero-day exploit attacks.","spans":[{"start":32,"end":48,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1902198646,"_task_hash":-1903706848,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"zero","start":32,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"day","start":37,"end":40,"id":6},{"text":"exploit","start":41,"end":48,"id":7},{"text":"attacks","start":49,"end":56,"id":8},{"text":".","start":56,"end":57,"id":9}]} {"text":"Holds OPA.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1953373167,"_task_hash":625579373,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OPA","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Seeking AI Policy Specialist with 3++ years experience in Marketing Copy and Computer Vision.","spans":[{"start":8,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1604110314,"_task_hash":-44233962,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Policy","start":11,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"with","start":29,"end":33,"id":4},{"text":"3++","start":34,"end":37,"id":5},{"text":"years","start":38,"end":43,"id":6},{"text":"experience","start":44,"end":54,"id":7},{"text":"in","start":55,"end":57,"id":8},{"text":"Marketing","start":58,"end":67,"id":9},{"text":"Copy","start":68,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Computer","start":77,"end":85,"id":12},{"text":"Vision","start":86,"end":92,"id":13},{"text":".","start":92,"end":93,"id":14}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"ISO 22301 certification a plus.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":383366709,"_task_hash":-1001368111,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":"a","start":24,"end":25,"id":3},{"text":"plus","start":26,"end":30,"id":4},{"text":".","start":30,"end":31,"id":5}]} {"text":"Human Factor Security Specialist opportunity: Lead Azure Security program, implement NIST Framework, manage Performance Tuning operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":51,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8},{"start":85,"end":99,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1990025043,"_task_hash":-921854473,"tokens":[{"text":"Human","start":0,"end":5,"id":0},{"text":"Factor","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"opportunity","start":33,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"Lead","start":46,"end":50,"id":6},{"text":"Azure","start":51,"end":56,"id":7},{"text":"Security","start":57,"end":65,"id":8},{"text":"program","start":66,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"implement","start":75,"end":84,"id":11},{"text":"NIST","start":85,"end":89,"id":12},{"text":"Framework","start":90,"end":99,"id":13},{"text":",","start":99,"end":100,"id":14},{"text":"manage","start":101,"end":107,"id":15},{"text":"Performance","start":108,"end":119,"id":16},{"text":"Tuning","start":120,"end":126,"id":17},{"text":"operations","start":127,"end":137,"id":18},{"text":".","start":137,"end":138,"id":19}]} {"text":"Troubleshot ZTNA performance issues.","spans":[{"start":12,"end":16,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":865555862,"_task_hash":2057601155,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"ZTNA","start":12,"end":16,"id":1},{"text":"performance","start":17,"end":28,"id":2},{"text":"issues","start":29,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Implemented HSM solution for enterprise security monitoring.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1},{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-422159956,"_task_hash":-686717876,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"HSM","start":12,"end":15,"id":1},{"text":"solution","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"security","start":40,"end":48,"id":5},{"text":"monitoring","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"IT Network Administrator experienced in detecting DDoS attacks using Metasploit.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1587380385,"_task_hash":-485960657,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Network","start":3,"end":10,"id":1},{"text":"Administrator","start":11,"end":24,"id":2},{"text":"experienced","start":25,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"detecting","start":40,"end":49,"id":5},{"text":"DDoS","start":50,"end":54,"id":6},{"text":"attacks","start":55,"end":62,"id":7},{"text":"using","start":63,"end":68,"id":8},{"text":"Metasploit","start":69,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Hiring Digital Forensics Investigator for URL Analysis and Supply Chain Attack detection.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":78,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":56341108,"_task_hash":317276067,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Digital","start":7,"end":14,"id":1},{"text":"Forensics","start":15,"end":24,"id":2},{"text":"Investigator","start":25,"end":37,"id":3},{"text":"for","start":38,"end":41,"id":4},{"text":"URL","start":42,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":"and","start":55,"end":58,"id":7},{"text":"Supply","start":59,"end":65,"id":8},{"text":"Chain","start":66,"end":71,"id":9},{"text":"Attack","start":72,"end":78,"id":10},{"text":"detection","start":79,"end":88,"id":11},{"text":".","start":88,"end":89,"id":12}]} {"text":"Copywriter role available: Cloud Platforms experience required, AWS Security knowledge essential.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":27,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":64,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":928170609,"_task_hash":-1405287546,"tokens":[{"text":"Copywriter","start":0,"end":10,"id":0},{"text":"role","start":11,"end":15,"id":1},{"text":"available","start":16,"end":25,"id":2},{"text":":","start":25,"end":26,"id":3},{"text":"Cloud","start":27,"end":32,"id":4},{"text":"Platforms","start":33,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"required","start":54,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"AWS","start":64,"end":67,"id":9},{"text":"Security","start":68,"end":76,"id":10},{"text":"knowledge","start":77,"end":86,"id":11},{"text":"essential","start":87,"end":96,"id":12},{"text":".","start":96,"end":97,"id":13}]} {"text":"Developed SEC Cyber Rules policies and procedures.","spans":[{"start":10,"end":25,"label":"REGULATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":916232583,"_task_hash":749107552,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"SEC","start":10,"end":13,"id":1},{"text":"Cyber","start":14,"end":19,"id":2},{"text":"Rules","start":20,"end":25,"id":3},{"text":"policies","start":26,"end":34,"id":4},{"text":"and","start":35,"end":38,"id":5},{"text":"procedures","start":39,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"Reported PDPA compliance status to board.","spans":[{"start":9,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":939346826,"_task_hash":738846644,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"PDPA","start":9,"end":13,"id":1},{"text":"compliance","start":14,"end":24,"id":2},{"text":"status","start":25,"end":31,"id":3},{"text":"to","start":32,"end":34,"id":4},{"text":"board","start":35,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Join our team as Technical Solutions Architect!","spans":[{"start":17,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1084730923,"_task_hash":1157132193,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Solutions","start":27,"end":36,"id":5},{"text":"Architect","start":37,"end":46,"id":6},{"text":"!","start":46,"end":47,"id":7}]} {"text":"We need a AppSec Engineer skilled in Remote Code Execution prevention and Zero-Day analysis using CrowdStrike.","spans":[{"start":10,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":37,"end":58,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":9},{"start":74,"end":82,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":14},{"start":98,"end":109,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1687475797,"_task_hash":-2105215001,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"AppSec","start":10,"end":16,"id":3},{"text":"Engineer","start":17,"end":25,"id":4},{"text":"skilled","start":26,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"Remote","start":37,"end":43,"id":7},{"text":"Code","start":44,"end":48,"id":8},{"text":"Execution","start":49,"end":58,"id":9},{"text":"prevention","start":59,"end":69,"id":10},{"text":"and","start":70,"end":73,"id":11},{"text":"Zero","start":74,"end":78,"id":12},{"text":"-","start":78,"end":79,"id":13},{"text":"Day","start":79,"end":82,"id":14},{"text":"analysis","start":83,"end":91,"id":15},{"text":"using","start":92,"end":97,"id":16},{"text":"CrowdStrike","start":98,"end":109,"id":17},{"text":".","start":109,"end":110,"id":18}]} {"text":"Ensured compliance with ECPA requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2067051738,"_task_hash":1797847242,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"ECPA","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Tested WAF rules against Heap Overflow payloads.","spans":[{"start":25,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1665202506,"_task_hash":-569363582,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Heap","start":25,"end":29,"id":4},{"text":"Overflow","start":30,"end":38,"id":5},{"text":"payloads","start":39,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Briefed executives on phishing risks.","spans":[{"start":22,"end":30,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":186935084,"_task_hash":1176672201,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"phishing","start":22,"end":30,"id":3},{"text":"risks","start":31,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Senior VP Security skilled in Device Management, Unreal, and Cloud Security Testing.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":49,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":61,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":849986476,"_task_hash":-1104901216,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"VP","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"skilled","start":19,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"Device","start":30,"end":36,"id":5},{"text":"Management","start":37,"end":47,"id":6},{"text":",","start":47,"end":48,"id":7},{"text":"Unreal","start":49,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"and","start":57,"end":60,"id":10},{"text":"Cloud","start":61,"end":66,"id":11},{"text":"Security","start":67,"end":75,"id":12},{"text":"Testing","start":76,"end":83,"id":13},{"text":".","start":83,"end":84,"id":14}]} {"text":"Experienced User specializing in Perimeter Security.","spans":[{"start":12,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":33,"end":51,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":755694396,"_task_hash":-1959638335,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"User","start":12,"end":16,"id":1},{"text":"specializing","start":17,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Perimeter","start":33,"end":42,"id":4},{"text":"Security","start":43,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Experienced Vulnerability Manager specializing in Network Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-727157287,"_task_hash":235981214,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Vulnerability","start":12,"end":25,"id":1},{"text":"Manager","start":26,"end":33,"id":2},{"text":"specializing","start":34,"end":46,"id":3},{"text":"in","start":47,"end":49,"id":4},{"text":"Network","start":50,"end":57,"id":5},{"text":"Security","start":58,"end":66,"id":6},{"text":".","start":66,"end":67,"id":7}]} {"text":"Conducted Threat Assessment for enterprise systems.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":588798689,"_task_hash":-1161660688,"tokens":[{"text":"Conducted","start":0,"end":9,"id":0},{"text":"Threat","start":10,"end":16,"id":1},{"text":"Assessment","start":17,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"enterprise","start":32,"end":42,"id":4},{"text":"systems","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"IAM required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1453201640,"_task_hash":-526125081,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Holds HIPAA.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-196748497,"_task_hash":1970209682,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"HIPAA","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"SDET experienced in detecting botnet attacks using CrowdStrike.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":30,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":212762714,"_task_hash":983142618,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"experienced","start":5,"end":16,"id":1},{"text":"in","start":17,"end":19,"id":2},{"text":"detecting","start":20,"end":29,"id":3},{"text":"botnet","start":30,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":"using","start":45,"end":50,"id":6},{"text":"CrowdStrike","start":51,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"Seeking Cloud Security Architect with 10++ years experience in Data Visualization and Anonymization.","spans":[{"start":8,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":63,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":86,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1478801800,"_task_hash":-1934937046,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Cloud","start":8,"end":13,"id":1},{"text":"Security","start":14,"end":22,"id":2},{"text":"Architect","start":23,"end":32,"id":3},{"text":"with","start":33,"end":37,"id":4},{"text":"10++","start":38,"end":42,"id":5},{"text":"years","start":43,"end":48,"id":6},{"text":"experience","start":49,"end":59,"id":7},{"text":"in","start":60,"end":62,"id":8},{"text":"Data","start":63,"end":67,"id":9},{"text":"Visualization","start":68,"end":81,"id":10},{"text":"and","start":82,"end":85,"id":11},{"text":"Anonymization","start":86,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Proficient in SIEM Operations and Metasploit.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":44,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":15469440,"_task_hash":-932701550,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"Metasploit","start":34,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Holds OSCP Certification certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1573263500,"_task_hash":-395275790,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":"certification","start":25,"end":38,"id":3},{"text":".","start":38,"end":39,"id":4}]} {"text":"We need a Application Security Engineer skilled in Cross-Site Scripting prevention and spyware analysis using Metasploit.","spans":[{"start":10,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":51,"end":71,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":11},{"start":87,"end":94,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":110,"end":120,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1452165398,"_task_hash":-1901539640,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Application","start":10,"end":21,"id":3},{"text":"Security","start":22,"end":30,"id":4},{"text":"Engineer","start":31,"end":39,"id":5},{"text":"skilled","start":40,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"Cross","start":51,"end":56,"id":8},{"text":"-","start":56,"end":57,"id":9},{"text":"Site","start":57,"end":61,"id":10},{"text":"Scripting","start":62,"end":71,"id":11},{"text":"prevention","start":72,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"spyware","start":87,"end":94,"id":14},{"text":"analysis","start":95,"end":103,"id":15},{"text":"using","start":104,"end":109,"id":16},{"text":"Metasploit","start":110,"end":120,"id":17},{"text":".","start":120,"end":121,"id":18}]} {"text":"Certified NIST RMF working as Information Security Analyst, focused on Mobile Security and Session Hijacking prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":71,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":91,"end":108,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-667208024,"_task_hash":-556488338,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Information","start":30,"end":41,"id":5},{"text":"Security","start":42,"end":50,"id":6},{"text":"Analyst","start":51,"end":58,"id":7},{"text":",","start":58,"end":59,"id":8},{"text":"focused","start":60,"end":67,"id":9},{"text":"on","start":68,"end":70,"id":10},{"text":"Mobile","start":71,"end":77,"id":11},{"text":"Security","start":78,"end":86,"id":12},{"text":"and","start":87,"end":90,"id":13},{"text":"Session","start":91,"end":98,"id":14},{"text":"Hijacking","start":99,"end":108,"id":15},{"text":"prevention","start":109,"end":119,"id":16},{"text":".","start":119,"end":120,"id":17}]} {"text":"Documented Remote Code Execution attack chain for threat intel.","spans":[{"start":11,"end":32,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3},{"start":11,"end":32,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":387928952,"_task_hash":1014886291,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"Remote","start":11,"end":17,"id":1},{"text":"Code","start":18,"end":22,"id":2},{"text":"Execution","start":23,"end":32,"id":3},{"text":"attack","start":33,"end":39,"id":4},{"text":"chain","start":40,"end":45,"id":5},{"text":"for","start":46,"end":49,"id":6},{"text":"threat","start":50,"end":56,"id":7},{"text":"intel","start":57,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Certified SQL working as Cybersecurity Analyst, focused on Aqua Security and SSRF prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":59,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":81,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1462441315,"_task_hash":1827370675,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SQL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Cybersecurity","start":25,"end":38,"id":4},{"text":"Analyst","start":39,"end":46,"id":5},{"text":",","start":46,"end":47,"id":6},{"text":"focused","start":48,"end":55,"id":7},{"text":"on","start":56,"end":58,"id":8},{"text":"Aqua","start":59,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"SSRF","start":77,"end":81,"id":12},{"text":"prevention","start":82,"end":92,"id":13},{"text":".","start":92,"end":93,"id":14}]} {"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Expert in COPPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":849420153,"_task_hash":-371286602,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"COPPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Kubernetes Security Engineer experienced in detecting APT attacks using Burp Suite.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1062047743,"_task_hash":745632840,"tokens":[{"text":"Kubernetes","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"experienced","start":29,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"detecting","start":44,"end":53,"id":5},{"text":"APT","start":54,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Burp","start":72,"end":76,"id":9},{"text":"Suite","start":77,"end":82,"id":10},{"text":".","start":82,"end":83,"id":11}]} {"text":"Expert in GLBA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1495699365,"_task_hash":435438006,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GLBA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"IAM required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1453201640,"_task_hash":-526125081,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"SOC 2 familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1961669889,"_task_hash":1161548298,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"familiarity","start":6,"end":17,"id":2},{"text":"needed","start":18,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Security Architect needed for enterprise security team.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-732058886,"_task_hash":-282495989,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"needed","start":19,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"team","start":50,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Security Engineer with CASP+ certification, expert in Snort.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":23,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":891755310,"_task_hash":-1307852992,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"CASP+","start":23,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Snort","start":54,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"TLS/SSL certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":67921767,"_task_hash":-1335688723,"tokens":[{"text":"TLS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"SSL","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Experienced DB Administrator specializing in Security Tools.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":59,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-709451780,"_task_hash":-1304829032,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"DB","start":12,"end":14,"id":1},{"text":"Administrator","start":15,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Security","start":45,"end":53,"id":5},{"text":"Tools","start":54,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Presented Security Engineering updates to leadership.","spans":[{"start":10,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-747927778,"_task_hash":-1894652492,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Engineering","start":19,"end":30,"id":2},{"text":"updates","start":31,"end":38,"id":3},{"text":"to","start":39,"end":41,"id":4},{"text":"leadership","start":42,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Must have ELK Stack experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-777214823,"_task_hash":-161639805,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"ELK","start":10,"end":13,"id":2},{"text":"Stack","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Back-End Developer with expertise in OWASP Top 10 compliance and Federated Learning operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":65,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2112428,"_task_hash":952479706,"tokens":[{"text":"Back","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"End","start":5,"end":8,"id":2},{"text":"Developer","start":9,"end":18,"id":3},{"text":"with","start":19,"end":23,"id":4},{"text":"expertise","start":24,"end":33,"id":5},{"text":"in","start":34,"end":36,"id":6},{"text":"OWASP","start":37,"end":42,"id":7},{"text":"Top","start":43,"end":46,"id":8},{"text":"10","start":47,"end":49,"id":9},{"text":"compliance","start":50,"end":60,"id":10},{"text":"and","start":61,"end":64,"id":11},{"text":"Federated","start":65,"end":74,"id":12},{"text":"Learning","start":75,"end":83,"id":13},{"text":"operations","start":84,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} {"text":"Accomplished Technical Support Analyst specializing in Business Intelligence and Cloud Security Testing.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":103,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1265612346,"_task_hash":2086590764,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Technical","start":13,"end":22,"id":1},{"text":"Support","start":23,"end":30,"id":2},{"text":"Analyst","start":31,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Business","start":55,"end":63,"id":6},{"text":"Intelligence","start":64,"end":76,"id":7},{"text":"and","start":77,"end":80,"id":8},{"text":"Cloud","start":81,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":"Testing","start":96,"end":103,"id":11},{"text":".","start":103,"end":104,"id":12}]} {"text":"SPF/DKIM/DMARC certified.","spans":[{"start":0,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1109510584,"_task_hash":-1427205232,"tokens":[{"text":"SPF","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DKIM","start":4,"end":8,"id":2},{"text":"/","start":8,"end":9,"id":3},{"text":"DMARC","start":9,"end":14,"id":4},{"text":"certified","start":15,"end":24,"id":5},{"text":".","start":24,"end":25,"id":6}]} {"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Immediate opening for DevOps Specialist.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1016738327,"_task_hash":-1715349065,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"DevOps","start":22,"end":28,"id":3},{"text":"Specialist","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Proficient in ELK Stack and CrowdStrike.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":39,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":886075644,"_task_hash":-1948094863,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"ELK","start":14,"end":17,"id":2},{"text":"Stack","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"CrowdStrike","start":28,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Implemented Security Operations controls and monitoring.","spans":[{"start":12,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":12,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":128210197,"_task_hash":-709874033,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Operations","start":21,"end":31,"id":2},{"text":"controls","start":32,"end":40,"id":3},{"text":"and","start":41,"end":44,"id":4},{"text":"monitoring","start":45,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"Presented PKI Management updates to leadership.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-62437014,"_task_hash":-864264530,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"PKI","start":10,"end":13,"id":1},{"text":"Management","start":14,"end":24,"id":2},{"text":"updates","start":25,"end":32,"id":3},{"text":"to","start":33,"end":35,"id":4},{"text":"leadership","start":36,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Proficient in Nessus and QRadar.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-736595406,"_task_hash":52991550,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"QRadar","start":25,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Required skills: EDR Tools, Crisis Communication, SAML certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":50,"end":54,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":2059751387,"_task_hash":-1390561162,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Tools","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Crisis","start":28,"end":34,"id":6},{"text":"Communication","start":35,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"SAML","start":50,"end":54,"id":9},{"text":"certification","start":55,"end":68,"id":10},{"text":".","start":68,"end":69,"id":11}]} {"text":"Implemented controls to prevent drive-by download attacks.","spans":[{"start":32,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":247177577,"_task_hash":1589450506,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"drive","start":32,"end":37,"id":4},{"text":"-","start":37,"end":38,"id":5},{"text":"by","start":38,"end":40,"id":6},{"text":"download","start":41,"end":49,"id":7},{"text":"attacks","start":50,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} {"text":"Delivered Vulnerability Assessment findings to executive team.","spans":[{"start":10,"end":34,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-90113289,"_task_hash":-1997241087,"tokens":[{"text":"Delivered","start":0,"end":9,"id":0},{"text":"Vulnerability","start":10,"end":23,"id":1},{"text":"Assessment","start":24,"end":34,"id":2},{"text":"findings","start":35,"end":43,"id":3},{"text":"to","start":44,"end":46,"id":4},{"text":"executive","start":47,"end":56,"id":5},{"text":"team","start":57,"end":61,"id":6},{"text":".","start":61,"end":62,"id":7}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Machine Learning Researcher role available: Procurement experience required, Security Culture Building knowledge essential.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":77,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-368844898,"_task_hash":-449494646,"tokens":[{"text":"Machine","start":0,"end":7,"id":0},{"text":"Learning","start":8,"end":16,"id":1},{"text":"Researcher","start":17,"end":27,"id":2},{"text":"role","start":28,"end":32,"id":3},{"text":"available","start":33,"end":42,"id":4},{"text":":","start":42,"end":43,"id":5},{"text":"Procurement","start":44,"end":55,"id":6},{"text":"experience","start":56,"end":66,"id":7},{"text":"required","start":67,"end":75,"id":8},{"text":",","start":75,"end":76,"id":9},{"text":"Security","start":77,"end":85,"id":10},{"text":"Culture","start":86,"end":93,"id":11},{"text":"Building","start":94,"end":102,"id":12},{"text":"knowledge","start":103,"end":112,"id":13},{"text":"essential","start":113,"end":122,"id":14},{"text":".","start":122,"end":123,"id":15}]} {"text":"Hiring Container Security Expert for AI Regulation and Man-in-the-Middle detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":72,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1024865759,"_task_hash":110508288,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Container","start":7,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Expert","start":26,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"AI","start":37,"end":39,"id":5},{"text":"Regulation","start":40,"end":50,"id":6},{"text":"and","start":51,"end":54,"id":7},{"text":"Man","start":55,"end":58,"id":8},{"text":"-","start":58,"end":59,"id":9},{"text":"in","start":59,"end":61,"id":10},{"text":"-","start":61,"end":62,"id":11},{"text":"the","start":62,"end":65,"id":12},{"text":"-","start":65,"end":66,"id":13},{"text":"Middle","start":66,"end":72,"id":14},{"text":"detection","start":73,"end":82,"id":15},{"text":".","start":82,"end":83,"id":16}]} {"text":"Front\u2011End Developer opportunity: Lead Security program, implement OWASP Top 10, manage Data Mining operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":5},{"start":66,"end":78,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11},{"start":87,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1384019292,"_task_hash":-1998779103,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"opportunity","start":20,"end":31,"id":2},{"text":":","start":31,"end":32,"id":3},{"text":"Lead","start":33,"end":37,"id":4},{"text":"Security","start":38,"end":46,"id":5},{"text":"program","start":47,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"implement","start":56,"end":65,"id":8},{"text":"OWASP","start":66,"end":71,"id":9},{"text":"Top","start":72,"end":75,"id":10},{"text":"10","start":76,"end":78,"id":11},{"text":",","start":78,"end":79,"id":12},{"text":"manage","start":80,"end":86,"id":13},{"text":"Data","start":87,"end":91,"id":14},{"text":"Mining","start":92,"end":98,"id":15},{"text":"operations","start":99,"end":109,"id":16},{"text":".","start":109,"end":110,"id":17}]} {"text":"Application Security Specialist professional with 3++ years implementing Metasploit and managing Red Teaming programs.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":73,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":97,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-322219084,"_task_hash":-617190100,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Specialist","start":21,"end":31,"id":2},{"text":"professional","start":32,"end":44,"id":3},{"text":"with","start":45,"end":49,"id":4},{"text":"3++","start":50,"end":53,"id":5},{"text":"years","start":54,"end":59,"id":6},{"text":"implementing","start":60,"end":72,"id":7},{"text":"Metasploit","start":73,"end":83,"id":8},{"text":"and","start":84,"end":87,"id":9},{"text":"managing","start":88,"end":96,"id":10},{"text":"Red","start":97,"end":100,"id":11},{"text":"Teaming","start":101,"end":108,"id":12},{"text":"programs","start":109,"end":117,"id":13},{"text":".","start":117,"end":118,"id":14}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Briefed executives on brute force risks.","spans":[{"start":22,"end":33,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":33,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1805641853,"_task_hash":-1321453156,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"brute","start":22,"end":27,"id":3},{"text":"force","start":28,"end":33,"id":4},{"text":"risks","start":34,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Documented XSS attack chain for threat intel.","spans":[{"start":11,"end":14,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1616515018,"_task_hash":1189199093,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"XSS","start":11,"end":14,"id":1},{"text":"attack","start":15,"end":21,"id":2},{"text":"chain","start":22,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"threat","start":32,"end":38,"id":5},{"text":"intel","start":39,"end":44,"id":6},{"text":".","start":44,"end":45,"id":7}]} {"text":"Technical Solutions Architect needed for enterprise security team.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-848380258,"_task_hash":-1007982442,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Solutions","start":10,"end":19,"id":1},{"text":"Architect","start":20,"end":29,"id":2},{"text":"needed","start":30,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"enterprise","start":41,"end":51,"id":5},{"text":"security","start":52,"end":60,"id":6},{"text":"team","start":61,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} {"text":"Front\u2011End Developer with expertise in NIST Framework compliance and Compliance Auditing operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":68,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1977940895,"_task_hash":-1501817275,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"NIST","start":38,"end":42,"id":5},{"text":"Framework","start":43,"end":52,"id":6},{"text":"compliance","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Compliance","start":68,"end":78,"id":9},{"text":"Auditing","start":79,"end":87,"id":10},{"text":"operations","start":88,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} {"text":"Must know Wireshark, Wireshark, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":857081426,"_task_hash":-949901357,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Wireshark","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"and","start":32,"end":35,"id":6},{"text":"NIST","start":36,"end":40,"id":7},{"text":"Framework","start":41,"end":50,"id":8},{"text":".","start":50,"end":51,"id":9}]} {"text":"Experienced IT Department Manager specializing in Security Scanning.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":312317294,"_task_hash":1659375320,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Scanning","start":59,"end":67,"id":7},{"text":".","start":67,"end":68,"id":8}]} {"text":"Required skills: Burp Suite, Offline Storage, PMP Certification certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":63,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":284157875,"_task_hash":300311886,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Offline","start":29,"end":36,"id":6},{"text":"Storage","start":37,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"PMP","start":46,"end":49,"id":9},{"text":"Certification","start":50,"end":63,"id":10},{"text":"certification","start":64,"end":77,"id":11},{"text":".","start":77,"end":78,"id":12}]} {"text":"SQL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":206140740,"_task_hash":-284236833,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Kubernetes Security Engineer with hands-on experience in SIEM, ELK Stack, and Database Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":78,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1108347559,"_task_hash":-1684648622,"tokens":[{"text":"Kubernetes","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"SIEM","start":57,"end":61,"id":9},{"text":",","start":61,"end":62,"id":10},{"text":"ELK","start":63,"end":66,"id":11},{"text":"Stack","start":67,"end":72,"id":12},{"text":",","start":72,"end":73,"id":13},{"text":"and","start":74,"end":77,"id":14},{"text":"Database","start":78,"end":86,"id":15},{"text":"Security","start":87,"end":95,"id":16},{"text":".","start":95,"end":96,"id":17}]} {"text":"Back-End Developer opportunity: Lead Cybersecurity program, implement OWASP Top 10, manage Risk Metrics operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":37,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":7},{"start":70,"end":82,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":91,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-251937051,"_task_hash":-875234203,"tokens":[{"text":"Back","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"End","start":5,"end":8,"id":2},{"text":"Developer","start":9,"end":18,"id":3},{"text":"opportunity","start":19,"end":30,"id":4},{"text":":","start":30,"end":31,"id":5},{"text":"Lead","start":32,"end":36,"id":6},{"text":"Cybersecurity","start":37,"end":50,"id":7},{"text":"program","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"implement","start":60,"end":69,"id":10},{"text":"OWASP","start":70,"end":75,"id":11},{"text":"Top","start":76,"end":79,"id":12},{"text":"10","start":80,"end":82,"id":13},{"text":",","start":82,"end":83,"id":14},{"text":"manage","start":84,"end":90,"id":15},{"text":"Risk","start":91,"end":95,"id":16},{"text":"Metrics","start":96,"end":103,"id":17},{"text":"operations","start":104,"end":114,"id":18},{"text":".","start":114,"end":115,"id":19}]} {"text":"ISO 27001 certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1479210475,"_task_hash":994637734,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"27001","start":4,"end":9,"id":1},{"text":"certified","start":10,"end":19,"id":2},{"text":".","start":19,"end":20,"id":3}]} {"text":"Seeking Defensive Security Analyst with 5++ years experience in Model Deployment and Network Traffic Analysis.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-444322514,"_task_hash":642474622,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Defensive","start":8,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Model","start":64,"end":69,"id":9},{"text":"Deployment","start":70,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Network","start":85,"end":92,"id":12},{"text":"Traffic","start":93,"end":100,"id":13},{"text":"Analysis","start":101,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} {"text":"Holds GCP.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":491008461,"_task_hash":874544795,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GCP","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"PRINCE2 certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":439813503,"_task_hash":1835233461,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certification","start":8,"end":21,"id":1},{"text":"a","start":22,"end":23,"id":2},{"text":"plus","start":24,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Published research on Application Security trends.","spans":[{"start":22,"end":42,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-637009525,"_task_hash":95984202,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Application","start":22,"end":33,"id":3},{"text":"Security","start":34,"end":42,"id":4},{"text":"trends","start":43,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Accomplished Facility Security Consultant specializing in Adobe XD and Cisco Security.","spans":[{"start":13,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1771249617,"_task_hash":1916052409,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Facility","start":13,"end":21,"id":1},{"text":"Security","start":22,"end":30,"id":2},{"text":"Consultant","start":31,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Adobe","start":58,"end":63,"id":6},{"text":"XD","start":64,"end":66,"id":7},{"text":"and","start":67,"end":70,"id":8},{"text":"Cisco","start":71,"end":76,"id":9},{"text":"Security","start":77,"end":85,"id":10},{"text":".","start":85,"end":86,"id":11}]} {"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Incident Response Manager experienced in detecting trojan attacks using SIEM Operations.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":87,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":790755731,"_task_hash":-160768232,"tokens":[{"text":"Incident","start":0,"end":8,"id":0},{"text":"Response","start":9,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"trojan","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"SIEM","start":72,"end":76,"id":9},{"text":"Operations","start":77,"end":87,"id":10},{"text":".","start":87,"end":88,"id":11}]} {"text":"Senior Cyber Defense Analyst skilled in Active Directory, Architecture Standards, and Security Protocols.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":58,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":86,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2002458632,"_task_hash":-999554446,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Defense","start":13,"end":20,"id":2},{"text":"Analyst","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"Active","start":40,"end":46,"id":6},{"text":"Directory","start":47,"end":56,"id":7},{"text":",","start":56,"end":57,"id":8},{"text":"Architecture","start":58,"end":70,"id":9},{"text":"Standards","start":71,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"and","start":82,"end":85,"id":12},{"text":"Security","start":86,"end":94,"id":13},{"text":"Protocols","start":95,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} {"text":"CISO with CEH certification, expert in Ghidra.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":39,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-471355866,"_task_hash":-611086858,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"with","start":5,"end":9,"id":1},{"text":"CEH","start":10,"end":13,"id":2},{"text":"certification","start":14,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"expert","start":29,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"Ghidra","start":39,"end":45,"id":7},{"text":".","start":45,"end":46,"id":8}]} {"text":"Holds DNS/DHCP.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1604084161,"_task_hash":194271772,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"DNS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DHCP","start":10,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} {"text":"Trained staff on SOX obligations.","spans":[{"start":17,"end":20,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-37226810,"_task_hash":1603433915,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"SOX","start":17,"end":20,"id":3},{"text":"obligations","start":21,"end":32,"id":4},{"text":".","start":32,"end":33,"id":5}]} {"text":"Phishing Defense Expert with expertise in NIST Framework compliance and Risk Assessment operations.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":56,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":72,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1634506172,"_task_hash":1895945092,"tokens":[{"text":"Phishing","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Expert","start":17,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"expertise","start":29,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"NIST","start":42,"end":46,"id":6},{"text":"Framework","start":47,"end":56,"id":7},{"text":"compliance","start":57,"end":67,"id":8},{"text":"and","start":68,"end":71,"id":9},{"text":"Risk","start":72,"end":76,"id":10},{"text":"Assessment","start":77,"end":87,"id":11},{"text":"operations","start":88,"end":98,"id":12},{"text":".","start":98,"end":99,"id":13}]} {"text":"Physical Security Consultant with 3 years experience in Psychology, Bug Bounty Experience, and Issue Resolution.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":68,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1697309519,"_task_hash":-407619855,"tokens":[{"text":"Physical","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Consultant","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3","start":34,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Psychology","start":56,"end":66,"id":8},{"text":",","start":66,"end":67,"id":9},{"text":"Bug","start":68,"end":71,"id":10},{"text":"Bounty","start":72,"end":78,"id":11},{"text":"Experience","start":79,"end":89,"id":12},{"text":",","start":89,"end":90,"id":13},{"text":"and","start":91,"end":94,"id":14},{"text":"Issue","start":95,"end":100,"id":15},{"text":"Resolution","start":101,"end":111,"id":16},{"text":".","start":111,"end":112,"id":17}]} {"text":"Insider Threat Analyst opportunity: Lead Cybersecurity program, implement OWASP Top 10, manage Mathematics operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":41,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1487542894,"_task_hash":-1931596651,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Analyst","start":15,"end":22,"id":2},{"text":"opportunity","start":23,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"Lead","start":36,"end":40,"id":5},{"text":"Cybersecurity","start":41,"end":54,"id":6},{"text":"program","start":55,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"implement","start":64,"end":73,"id":9},{"text":"OWASP","start":74,"end":79,"id":10},{"text":"Top","start":80,"end":83,"id":11},{"text":"10","start":84,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"Mathematics","start":95,"end":106,"id":15},{"text":"operations","start":107,"end":117,"id":16},{"text":".","start":117,"end":118,"id":17}]} {"text":"Data Analyst professional with 3+ years implementing ELK Stack and managing MS Project programs.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":53,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":76,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1286267365,"_task_hash":-561452756,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"professional","start":13,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"3","start":31,"end":32,"id":4},{"text":"+","start":32,"end":33,"id":5},{"text":"years","start":34,"end":39,"id":6},{"text":"implementing","start":40,"end":52,"id":7},{"text":"ELK","start":53,"end":56,"id":8},{"text":"Stack","start":57,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"managing","start":67,"end":75,"id":11},{"text":"MS","start":76,"end":78,"id":12},{"text":"Project","start":79,"end":86,"id":13},{"text":"programs","start":87,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} {"text":"Defensive Security Analyst needed for enterprise security team.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1478563180,"_task_hash":-1868634822,"tokens":[{"text":"Defensive","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Analyst","start":19,"end":26,"id":2},{"text":"needed","start":27,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"enterprise","start":38,"end":48,"id":5},{"text":"security","start":49,"end":57,"id":6},{"text":"team","start":58,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"GLBA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1561603999,"_task_hash":-1822236823,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Responded to phishing incident affecting 1000+ users.","spans":[{"start":13,"end":21,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2},{"start":13,"end":21,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1328591920,"_task_hash":1926212664,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"phishing","start":13,"end":21,"id":2},{"text":"incident","start":22,"end":30,"id":3},{"text":"affecting","start":31,"end":40,"id":4},{"text":"1000","start":41,"end":45,"id":5},{"text":"+","start":45,"end":46,"id":6},{"text":"users","start":47,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"PKI required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2132396321,"_task_hash":1739596969,"tokens":[{"text":"PKI","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"We need a QA Engineer skilled in Command Injection prevention and ransomware analysis using Splunk.","spans":[{"start":10,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":33,"end":50,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":66,"end":76,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":92,"end":98,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1246329902,"_task_hash":360578031,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"QA","start":10,"end":12,"id":3},{"text":"Engineer","start":13,"end":21,"id":4},{"text":"skilled","start":22,"end":29,"id":5},{"text":"in","start":30,"end":32,"id":6},{"text":"Command","start":33,"end":40,"id":7},{"text":"Injection","start":41,"end":50,"id":8},{"text":"prevention","start":51,"end":61,"id":9},{"text":"and","start":62,"end":65,"id":10},{"text":"ransomware","start":66,"end":76,"id":11},{"text":"analysis","start":77,"end":85,"id":12},{"text":"using","start":86,"end":91,"id":13},{"text":"Splunk","start":92,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Must have ELK Stack experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-777214823,"_task_hash":-161639805,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"ELK","start":10,"end":13,"id":2},{"text":"Stack","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Lead Chief Privacy Officer managing Quantitative Risk Analysis and Message Queues initiatives.","spans":[{"start":5,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":36,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1889069921,"_task_hash":521531560,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Chief","start":5,"end":10,"id":1},{"text":"Privacy","start":11,"end":18,"id":2},{"text":"Officer","start":19,"end":26,"id":3},{"text":"managing","start":27,"end":35,"id":4},{"text":"Quantitative","start":36,"end":48,"id":5},{"text":"Risk","start":49,"end":53,"id":6},{"text":"Analysis","start":54,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"Message","start":67,"end":74,"id":9},{"text":"Queues","start":75,"end":81,"id":10},{"text":"initiatives","start":82,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} {"text":"Immediate opening for Azure Architect.","spans":[{"start":22,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1299370019,"_task_hash":1626066897,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Azure","start":22,"end":27,"id":3},{"text":"Architect","start":28,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} {"text":"Accomplished Social Engineering Consultant specializing in Distributed Training and Security Automation.","spans":[{"start":13,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":59,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":103,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-384865335,"_task_hash":-1616497371,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Social","start":13,"end":19,"id":1},{"text":"Engineering","start":20,"end":31,"id":2},{"text":"Consultant","start":32,"end":42,"id":3},{"text":"specializing","start":43,"end":55,"id":4},{"text":"in","start":56,"end":58,"id":5},{"text":"Distributed","start":59,"end":70,"id":6},{"text":"Training","start":71,"end":79,"id":7},{"text":"and","start":80,"end":83,"id":8},{"text":"Security","start":84,"end":92,"id":9},{"text":"Automation","start":93,"end":103,"id":10},{"text":".","start":103,"end":104,"id":11}]} {"text":"Must know Wireshark, CrowdStrike, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-278206795,"_task_hash":427314924,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"CrowdStrike","start":21,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"and","start":34,"end":37,"id":6},{"text":"OWASP","start":38,"end":43,"id":7},{"text":"Top","start":44,"end":47,"id":8},{"text":"10","start":48,"end":50,"id":9},{"text":".","start":50,"end":51,"id":10}]} {"text":"Managed BAS infrastructure for Fortune 500 client.","spans":[{"start":8,"end":11,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-429445046,"_task_hash":761587301,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"BAS","start":8,"end":11,"id":1},{"text":"infrastructure","start":12,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"Fortune","start":31,"end":38,"id":4},{"text":"500","start":39,"end":42,"id":5},{"text":"client","start":43,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Must have CrowdStrike experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1576336426,"_task_hash":1887255783,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Certified IDS/IPS working as Code Reviewer, focused on Email Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":55,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":74,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1117287645,"_task_hash":386808135,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Code","start":29,"end":33,"id":6},{"text":"Reviewer","start":34,"end":42,"id":7},{"text":",","start":42,"end":43,"id":8},{"text":"focused","start":44,"end":51,"id":9},{"text":"on","start":52,"end":54,"id":10},{"text":"Email","start":55,"end":60,"id":11},{"text":"Security","start":61,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Cross","start":74,"end":79,"id":14},{"text":"-","start":79,"end":80,"id":15},{"text":"Site","start":80,"end":84,"id":16},{"text":"Scripting","start":85,"end":94,"id":17},{"text":"prevention","start":95,"end":105,"id":18},{"text":".","start":105,"end":106,"id":19}]} {"text":"Holds SPF/DKIM/DMARC.","spans":[{"start":6,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1913135987,"_task_hash":1543218771,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SPF","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DKIM","start":10,"end":14,"id":3},{"text":"/","start":14,"end":15,"id":4},{"text":"DMARC","start":15,"end":20,"id":5},{"text":".","start":20,"end":21,"id":6}]} {"text":"Holds C++ certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-302962117,"_task_hash":-401299562,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Mentored junior engineers in Blue Team.","spans":[{"start":29,"end":38,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-438522422,"_task_hash":1017410502,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Blue","start":29,"end":33,"id":4},{"text":"Team","start":34,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Senior Security Defense Analyst skilled in Communication Skills, Media Relations, and Cloud Security.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":65,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":86,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1221975816,"_task_hash":-672164090,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Defense","start":16,"end":23,"id":2},{"text":"Analyst","start":24,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Communication","start":43,"end":56,"id":6},{"text":"Skills","start":57,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"Media","start":65,"end":70,"id":9},{"text":"Relations","start":71,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"and","start":82,"end":85,"id":12},{"text":"Cloud","start":86,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":".","start":100,"end":101,"id":15}]} {"text":"Published threat intel report on adware trends.","spans":[{"start":33,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1496005614,"_task_hash":-2123335353,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"adware","start":33,"end":39,"id":5},{"text":"trends","start":40,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Information Specialist professional with 7+ years implementing Wireshark and managing Threat Actor Analysis programs.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":86,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":837008782,"_task_hash":2084408930,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"professional","start":23,"end":35,"id":2},{"text":"with","start":36,"end":40,"id":3},{"text":"7","start":41,"end":42,"id":4},{"text":"+","start":42,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"implementing","start":50,"end":62,"id":7},{"text":"Wireshark","start":63,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"managing","start":77,"end":85,"id":10},{"text":"Threat","start":86,"end":92,"id":11},{"text":"Actor","start":93,"end":98,"id":12},{"text":"Analysis","start":99,"end":107,"id":13},{"text":"programs","start":108,"end":116,"id":14},{"text":".","start":116,"end":117,"id":15}]} {"text":"Mitigated Kerberoasting through code remediation.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2002810083,"_task_hash":-1005538414,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Kerberoasting","start":10,"end":23,"id":1},{"text":"through","start":24,"end":31,"id":2},{"text":"code","start":32,"end":36,"id":3},{"text":"remediation","start":37,"end":48,"id":4},{"text":".","start":48,"end":49,"id":5}]} {"text":"Physical Security Analyst with expertise in OWASP Top 10 compliance and Database operations.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":56,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":72,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1290683810,"_task_hash":977281766,"tokens":[{"text":"Physical","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"expertise","start":31,"end":40,"id":4},{"text":"in","start":41,"end":43,"id":5},{"text":"OWASP","start":44,"end":49,"id":6},{"text":"Top","start":50,"end":53,"id":7},{"text":"10","start":54,"end":56,"id":8},{"text":"compliance","start":57,"end":67,"id":9},{"text":"and","start":68,"end":71,"id":10},{"text":"Database","start":72,"end":80,"id":11},{"text":"operations","start":81,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Advanced Threat Hunter with 5 years experience in ML Lifecycle Management, RPO/RTO Planning, and SOC Operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":75,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15},{"start":97,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":754412916,"_task_hash":-1883286242,"tokens":[{"text":"Advanced","start":0,"end":8,"id":0},{"text":"Threat","start":9,"end":15,"id":1},{"text":"Hunter","start":16,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"5","start":28,"end":29,"id":4},{"text":"years","start":30,"end":35,"id":5},{"text":"experience","start":36,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"ML","start":50,"end":52,"id":8},{"text":"Lifecycle","start":53,"end":62,"id":9},{"text":"Management","start":63,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"RPO","start":75,"end":78,"id":12},{"text":"/","start":78,"end":79,"id":13},{"text":"RTO","start":79,"end":82,"id":14},{"text":"Planning","start":83,"end":91,"id":15},{"text":",","start":91,"end":92,"id":16},{"text":"and","start":93,"end":96,"id":17},{"text":"SOC","start":97,"end":100,"id":18},{"text":"Operations","start":101,"end":111,"id":19},{"text":".","start":111,"end":112,"id":20}]} {"text":"Vendor Manager with expertise in OWASP Top 10 compliance and X-Ways Forensics operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":61,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1527904936,"_task_hash":322365503,"tokens":[{"text":"Vendor","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"expertise","start":20,"end":29,"id":3},{"text":"in","start":30,"end":32,"id":4},{"text":"OWASP","start":33,"end":38,"id":5},{"text":"Top","start":39,"end":42,"id":6},{"text":"10","start":43,"end":45,"id":7},{"text":"compliance","start":46,"end":56,"id":8},{"text":"and","start":57,"end":60,"id":9},{"text":"X","start":61,"end":62,"id":10},{"text":"-","start":62,"end":63,"id":11},{"text":"Ways","start":63,"end":67,"id":12},{"text":"Forensics","start":68,"end":77,"id":13},{"text":"operations","start":78,"end":88,"id":14},{"text":".","start":88,"end":89,"id":15}]} {"text":"Remediated GDPR audit findings.","spans":[{"start":11,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1820885647,"_task_hash":1112448207,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"GDPR","start":11,"end":15,"id":1},{"text":"audit","start":16,"end":21,"id":2},{"text":"findings","start":22,"end":30,"id":3},{"text":".","start":30,"end":31,"id":4}]} {"text":"Senior Researcher with expertise in OWASP Top 10 compliance and Analytics operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":628909759,"_task_hash":1263107894,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Researcher","start":7,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"expertise","start":23,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"OWASP","start":36,"end":41,"id":5},{"text":"Top","start":42,"end":45,"id":6},{"text":"10","start":46,"end":48,"id":7},{"text":"compliance","start":49,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"Analytics","start":64,"end":73,"id":10},{"text":"operations","start":74,"end":84,"id":11},{"text":".","start":84,"end":85,"id":12}]} {"text":"Experienced Emergency Response Manager specializing in Terraform Security.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":73,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1081993993,"_task_hash":-1628452892,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Emergency","start":12,"end":21,"id":1},{"text":"Response","start":22,"end":30,"id":2},{"text":"Manager","start":31,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Terraform","start":55,"end":64,"id":6},{"text":"Security","start":65,"end":73,"id":7},{"text":".","start":73,"end":74,"id":8}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"DevSecOps Specialist with hands-on experience in QRadar, EDR Tools, and Security Design.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":49,"end":55,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":57,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":72,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1936503108,"_task_hash":-496216087,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Specialist","start":10,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"hands","start":26,"end":31,"id":3},{"text":"-","start":31,"end":32,"id":4},{"text":"on","start":32,"end":34,"id":5},{"text":"experience","start":35,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"QRadar","start":49,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"EDR","start":57,"end":60,"id":10},{"text":"Tools","start":61,"end":66,"id":11},{"text":",","start":66,"end":67,"id":12},{"text":"and","start":68,"end":71,"id":13},{"text":"Security","start":72,"end":80,"id":14},{"text":"Design","start":81,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"TLS/SSL certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":67921767,"_task_hash":-1335688723,"tokens":[{"text":"TLS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"SSL","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"Threat Intel Analyst professional with 10+ years implementing EDR Tools and managing Digital Forensics programs.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":62,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1314687515,"_task_hash":-1398162391,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Intel","start":7,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"professional","start":21,"end":33,"id":3},{"text":"with","start":34,"end":38,"id":4},{"text":"10","start":39,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"implementing","start":49,"end":61,"id":8},{"text":"EDR","start":62,"end":65,"id":9},{"text":"Tools","start":66,"end":71,"id":10},{"text":"and","start":72,"end":75,"id":11},{"text":"managing","start":76,"end":84,"id":12},{"text":"Digital","start":85,"end":92,"id":13},{"text":"Forensics","start":93,"end":102,"id":14},{"text":"programs","start":103,"end":111,"id":15},{"text":".","start":111,"end":112,"id":16}]} {"text":"Experienced DevOps Architect specializing in MQTT Security.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":651891005,"_task_hash":816126202,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"DevOps","start":12,"end":18,"id":1},{"text":"Architect","start":19,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"MQTT","start":45,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Looking for Robotic Systems Engineer to lead Hardware Security initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1265229985,"_task_hash":373716405,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Robotic","start":12,"end":19,"id":2},{"text":"Systems","start":20,"end":27,"id":3},{"text":"Engineer","start":28,"end":36,"id":4},{"text":"to","start":37,"end":39,"id":5},{"text":"lead","start":40,"end":44,"id":6},{"text":"Hardware","start":45,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"We need a Incident Manager skilled in Brute Force prevention and APT analysis using EDR Tools.","spans":[{"start":10,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":38,"end":49,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":65,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":84,"end":93,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":819010023,"_task_hash":1285044902,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Incident","start":10,"end":18,"id":3},{"text":"Manager","start":19,"end":26,"id":4},{"text":"skilled","start":27,"end":34,"id":5},{"text":"in","start":35,"end":37,"id":6},{"text":"Brute","start":38,"end":43,"id":7},{"text":"Force","start":44,"end":49,"id":8},{"text":"prevention","start":50,"end":60,"id":9},{"text":"and","start":61,"end":64,"id":10},{"text":"APT","start":65,"end":68,"id":11},{"text":"analysis","start":69,"end":77,"id":12},{"text":"using","start":78,"end":83,"id":13},{"text":"EDR","start":84,"end":87,"id":14},{"text":"Tools","start":88,"end":93,"id":15},{"text":".","start":93,"end":94,"id":16}]} {"text":"AI UX certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":651451037,"_task_hash":-1130344377,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certification","start":6,"end":19,"id":2},{"text":"a","start":20,"end":21,"id":3},{"text":"plus","start":22,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Certified STIX/TAXII working as DevOps Engineer, focused on Mobile App Security and CSRF prevention.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":60,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":84,"end":88,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1943301564,"_task_hash":-1240675153,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"STIX","start":10,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"TAXII","start":15,"end":20,"id":3},{"text":"working","start":21,"end":28,"id":4},{"text":"as","start":29,"end":31,"id":5},{"text":"DevOps","start":32,"end":38,"id":6},{"text":"Engineer","start":39,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"focused","start":49,"end":56,"id":9},{"text":"on","start":57,"end":59,"id":10},{"text":"Mobile","start":60,"end":66,"id":11},{"text":"App","start":67,"end":70,"id":12},{"text":"Security","start":71,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"CSRF","start":84,"end":88,"id":15},{"text":"prevention","start":89,"end":99,"id":16},{"text":".","start":99,"end":100,"id":17}]} {"text":"Automated ISO 27001 A.11.1 compliance monitoring.","spans":[{"start":10,"end":26,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-236893990,"_task_hash":1952287800,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"27001","start":14,"end":19,"id":2},{"text":"A.11.1","start":20,"end":26,"id":3},{"text":"compliance","start":27,"end":37,"id":4},{"text":"monitoring","start":38,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Senior Release Manager position: 7 years minimum, expert in Compliance Standards, CI/CD for ML, and Cybersecurity.","spans":[{"start":7,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":60,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":18},{"start":100,"end":113,"label":"SECURITY_DOMAIN","answer":"accept","token_start":21,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1061689111,"_task_hash":685515256,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Release","start":7,"end":14,"id":1},{"text":"Manager","start":15,"end":22,"id":2},{"text":"position","start":23,"end":31,"id":3},{"text":":","start":31,"end":32,"id":4},{"text":"7","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"minimum","start":41,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"expert","start":50,"end":56,"id":9},{"text":"in","start":57,"end":59,"id":10},{"text":"Compliance","start":60,"end":70,"id":11},{"text":"Standards","start":71,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"CI","start":82,"end":84,"id":14},{"text":"/","start":84,"end":85,"id":15},{"text":"CD","start":85,"end":87,"id":16},{"text":"for","start":88,"end":91,"id":17},{"text":"ML","start":92,"end":94,"id":18},{"text":",","start":94,"end":95,"id":19},{"text":"and","start":96,"end":99,"id":20},{"text":"Cybersecurity","start":100,"end":113,"id":21},{"text":".","start":113,"end":114,"id":22}]} {"text":"Cloud Security Engineer with CompTIA Security+ certification, expert in Hashcat.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":46,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":72,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1749366489,"_task_hash":408318208,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"CompTIA","start":29,"end":36,"id":4},{"text":"Security+","start":37,"end":46,"id":5},{"text":"certification","start":47,"end":60,"id":6},{"text":",","start":60,"end":61,"id":7},{"text":"expert","start":62,"end":68,"id":8},{"text":"in","start":69,"end":71,"id":9},{"text":"Hashcat","start":72,"end":79,"id":10},{"text":".","start":79,"end":80,"id":11}]} {"text":"Senior Robotic Systems Engineer skilled in Emergency Response, MFA & SSO, and API Security.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":63,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":78,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-379971754,"_task_hash":2081498080,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Robotic","start":7,"end":14,"id":1},{"text":"Systems","start":15,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Emergency","start":43,"end":52,"id":6},{"text":"Response","start":53,"end":61,"id":7},{"text":",","start":61,"end":62,"id":8},{"text":"MFA","start":63,"end":66,"id":9},{"text":"&","start":67,"end":68,"id":10},{"text":"SSO","start":69,"end":72,"id":11},{"text":",","start":72,"end":73,"id":12},{"text":"and","start":74,"end":77,"id":13},{"text":"API","start":78,"end":81,"id":14},{"text":"Security","start":82,"end":90,"id":15},{"text":".","start":90,"end":91,"id":16}]} {"text":"Accomplished Social Engineering Tester specializing in Sass/SCSS and Physical Security.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":69,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1350791736,"_task_hash":-356726879,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Social","start":13,"end":19,"id":1},{"text":"Engineering","start":20,"end":31,"id":2},{"text":"Tester","start":32,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Sass","start":55,"end":59,"id":6},{"text":"/","start":59,"end":60,"id":7},{"text":"SCSS","start":60,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"Physical","start":69,"end":77,"id":10},{"text":"Security","start":78,"end":86,"id":11},{"text":".","start":86,"end":87,"id":12}]} {"text":"Senior Web UI Developer position: 5 years minimum, expert in Knowledge Base, Root Cause Analysis, and CI/CD Security.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":77,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17},{"start":102,"end":116,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1687409423,"_task_hash":-129702346,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Web","start":7,"end":10,"id":1},{"text":"UI","start":11,"end":13,"id":2},{"text":"Developer","start":14,"end":23,"id":3},{"text":"position","start":24,"end":32,"id":4},{"text":":","start":32,"end":33,"id":5},{"text":"5","start":34,"end":35,"id":6},{"text":"years","start":36,"end":41,"id":7},{"text":"minimum","start":42,"end":49,"id":8},{"text":",","start":49,"end":50,"id":9},{"text":"expert","start":51,"end":57,"id":10},{"text":"in","start":58,"end":60,"id":11},{"text":"Knowledge","start":61,"end":70,"id":12},{"text":"Base","start":71,"end":75,"id":13},{"text":",","start":75,"end":76,"id":14},{"text":"Root","start":77,"end":81,"id":15},{"text":"Cause","start":82,"end":87,"id":16},{"text":"Analysis","start":88,"end":96,"id":17},{"text":",","start":96,"end":97,"id":18},{"text":"and","start":98,"end":101,"id":19},{"text":"CI","start":102,"end":104,"id":20},{"text":"/","start":104,"end":105,"id":21},{"text":"CD","start":105,"end":107,"id":22},{"text":"Security","start":108,"end":116,"id":23},{"text":".","start":116,"end":117,"id":24}]} {"text":"Experienced IT Department Manager specializing in Runtime Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-371951751,"_task_hash":1179138797,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Runtime","start":50,"end":57,"id":6},{"text":"Security","start":58,"end":66,"id":7},{"text":".","start":66,"end":67,"id":8}]} {"text":"Head of Security needed for enterprise security team.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1167411834,"_task_hash":693796810,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"needed","start":17,"end":23,"id":3},{"text":"for","start":24,"end":27,"id":4},{"text":"enterprise","start":28,"end":38,"id":5},{"text":"security","start":39,"end":47,"id":6},{"text":"team","start":48,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Proficient in SIEM Operations and EDR Tools.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-502458644,"_task_hash":-817667816,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"EDR","start":34,"end":37,"id":5},{"text":"Tools","start":38,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} {"text":"Accomplished Technical Support Specialist specializing in Risk Quantification and Security Champions Program.","spans":[{"start":13,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":487136536,"_task_hash":-1706649756,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Technical","start":13,"end":22,"id":1},{"text":"Support","start":23,"end":30,"id":2},{"text":"Specialist","start":31,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Risk","start":58,"end":62,"id":6},{"text":"Quantification","start":63,"end":77,"id":7},{"text":"and","start":78,"end":81,"id":8},{"text":"Security","start":82,"end":90,"id":9},{"text":"Champions","start":91,"end":100,"id":10},{"text":"Program","start":101,"end":108,"id":11},{"text":".","start":108,"end":109,"id":12}]} {"text":"Seeking Enterprise Security Architect with 3+ years experience in PowerShell and Compliance Auditing.","spans":[{"start":8,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":66,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-273019214,"_task_hash":34817592,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Enterprise","start":8,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Architect","start":28,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"3","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"in","start":63,"end":65,"id":9},{"text":"PowerShell","start":66,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"Compliance","start":81,"end":91,"id":12},{"text":"Auditing","start":92,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Holds SQL certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":483957320,"_task_hash":275164091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SQL","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"GRC Analyst with GPEN certification, expert in Qualys.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-867102819,"_task_hash":1679809828,"tokens":[{"text":"GRC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GPEN","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Qualys","start":47,"end":53,"id":8},{"text":".","start":53,"end":54,"id":9}]} {"text":"Acted as interim CISO during leadership transition.","spans":[{"start":17,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":551663132,"_task_hash":-1521945730,"tokens":[{"text":"Acted","start":0,"end":5,"id":0},{"text":"as","start":6,"end":8,"id":1},{"text":"interim","start":9,"end":16,"id":2},{"text":"CISO","start":17,"end":21,"id":3},{"text":"during","start":22,"end":28,"id":4},{"text":"leadership","start":29,"end":39,"id":5},{"text":"transition","start":40,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Certified OSINT working as MLOps Engineer, focused on Security Awareness Platforms and SSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":54,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11},{"start":87,"end":91,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-893777488,"_task_hash":-1508649625,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OSINT","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"MLOps","start":27,"end":32,"id":4},{"text":"Engineer","start":33,"end":41,"id":5},{"text":",","start":41,"end":42,"id":6},{"text":"focused","start":43,"end":50,"id":7},{"text":"on","start":51,"end":53,"id":8},{"text":"Security","start":54,"end":62,"id":9},{"text":"Awareness","start":63,"end":72,"id":10},{"text":"Platforms","start":73,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"SSRF","start":87,"end":91,"id":13},{"text":"prevention","start":92,"end":102,"id":14},{"text":".","start":102,"end":103,"id":15}]} {"text":"Cloud Security Engineer with OSED certification, expert in Cisco SecureX.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":33,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1161714179,"_task_hash":-456311043,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"OSED","start":29,"end":33,"id":4},{"text":"certification","start":34,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"expert","start":49,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Cisco","start":59,"end":64,"id":9},{"text":"SecureX.","start":65,"end":73,"id":10}]} {"text":"Join our team as Server-Side Developer!","spans":[{"start":17,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":417012530,"_task_hash":1714894963,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Server","start":17,"end":23,"id":4},{"text":"-","start":23,"end":24,"id":5},{"text":"Side","start":24,"end":28,"id":6},{"text":"Developer","start":29,"end":38,"id":7},{"text":"!","start":38,"end":39,"id":8}]} {"text":"Social Engineering Consultant professional with 3++ years implementing EDR Platforms and managing Hardware Integration programs.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":71,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":98,"end":118,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-167610652,"_task_hash":-343900664,"tokens":[{"text":"Social","start":0,"end":6,"id":0},{"text":"Engineering","start":7,"end":18,"id":1},{"text":"Consultant","start":19,"end":29,"id":2},{"text":"professional","start":30,"end":42,"id":3},{"text":"with","start":43,"end":47,"id":4},{"text":"3++","start":48,"end":51,"id":5},{"text":"years","start":52,"end":57,"id":6},{"text":"implementing","start":58,"end":70,"id":7},{"text":"EDR","start":71,"end":74,"id":8},{"text":"Platforms","start":75,"end":84,"id":9},{"text":"and","start":85,"end":88,"id":10},{"text":"managing","start":89,"end":97,"id":11},{"text":"Hardware","start":98,"end":106,"id":12},{"text":"Integration","start":107,"end":118,"id":13},{"text":"programs","start":119,"end":127,"id":14},{"text":".","start":127,"end":128,"id":15}]} {"text":"Certified LDAP working as Principal Engineer, focused on Security Integration and Command Injection prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":57,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":99,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":651715561,"_task_hash":-1965041953,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"LDAP","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Principal","start":26,"end":35,"id":4},{"text":"Engineer","start":36,"end":44,"id":5},{"text":",","start":44,"end":45,"id":6},{"text":"focused","start":46,"end":53,"id":7},{"text":"on","start":54,"end":56,"id":8},{"text":"Security","start":57,"end":65,"id":9},{"text":"Integration","start":66,"end":77,"id":10},{"text":"and","start":78,"end":81,"id":11},{"text":"Command","start":82,"end":89,"id":12},{"text":"Injection","start":90,"end":99,"id":13},{"text":"prevention","start":100,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} {"text":"Must have CrowdStrike experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1576336426,"_task_hash":1887255783,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Must have Metasploit experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1432922912,"_task_hash":873180234,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"OWASP","start":36,"end":41,"id":5},{"text":"Top","start":42,"end":45,"id":6},{"text":"10","start":46,"end":48,"id":7},{"text":"knowledge","start":49,"end":58,"id":8},{"text":".","start":58,"end":59,"id":9}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Certified CCPA working as Security Vulnerability Analyst, focused on Cloud Security Testing and Command Injection prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":56,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":69,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":96,"end":113,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":155772413,"_task_hash":-1574271549,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CCPA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Security","start":26,"end":34,"id":4},{"text":"Vulnerability","start":35,"end":48,"id":5},{"text":"Analyst","start":49,"end":56,"id":6},{"text":",","start":56,"end":57,"id":7},{"text":"focused","start":58,"end":65,"id":8},{"text":"on","start":66,"end":68,"id":9},{"text":"Cloud","start":69,"end":74,"id":10},{"text":"Security","start":75,"end":83,"id":11},{"text":"Testing","start":84,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"Command","start":96,"end":103,"id":14},{"text":"Injection","start":104,"end":113,"id":15},{"text":"prevention","start":114,"end":124,"id":16},{"text":".","start":124,"end":125,"id":17}]} {"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Looking for Reverse Engineering Analyst to lead Perimeter Security initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1957503683,"_task_hash":-336500854,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Reverse","start":12,"end":19,"id":2},{"text":"Engineering","start":20,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Perimeter","start":48,"end":57,"id":7},{"text":"Security","start":58,"end":66,"id":8},{"text":"initiatives","start":67,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Delivered Control Matrix findings to executive team.","spans":[{"start":10,"end":24,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1685107867,"_task_hash":1808414102,"tokens":[{"text":"Delivered","start":0,"end":9,"id":0},{"text":"Control","start":10,"end":17,"id":1},{"text":"Matrix","start":18,"end":24,"id":2},{"text":"findings","start":25,"end":33,"id":3},{"text":"to","start":34,"end":36,"id":4},{"text":"executive","start":37,"end":46,"id":5},{"text":"team","start":47,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Security Analyst with hands-on experience in Burp Suite, CrowdStrike, and Container Security.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":55,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":74,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1534548294,"_task_hash":-1650100248,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"hands","start":22,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"on","start":28,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Burp","start":45,"end":49,"id":8},{"text":"Suite","start":50,"end":55,"id":9},{"text":",","start":55,"end":56,"id":10},{"text":"CrowdStrike","start":57,"end":68,"id":11},{"text":",","start":68,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Container","start":74,"end":83,"id":14},{"text":"Security","start":84,"end":92,"id":15},{"text":".","start":92,"end":93,"id":16}]} {"text":"Join our team as Automation Engineer!","spans":[{"start":17,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1224563244,"_task_hash":-1088161172,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Automation","start":17,"end":27,"id":4},{"text":"Engineer","start":28,"end":36,"id":5},{"text":"!","start":36,"end":37,"id":6}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Must have QRadar experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1097696822,"_task_hash":-943825386,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Lead Defensive Security Analyst managing Sandbox Analysis and Regression Testing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-318402082,"_task_hash":1417241188,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Defensive","start":5,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Analyst","start":24,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Sandbox","start":41,"end":48,"id":5},{"text":"Analysis","start":49,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Regression","start":62,"end":72,"id":8},{"text":"Testing","start":73,"end":80,"id":9},{"text":"initiatives","start":81,"end":92,"id":10},{"text":".","start":92,"end":93,"id":11}]} {"text":"Machine Learning Security Architect opportunity: Lead Security Systems program, implement OWASP Top 10, manage Financial Analysis operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":54,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8},{"start":90,"end":102,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":14},{"start":111,"end":129,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-584406507,"_task_hash":2132106790,"tokens":[{"text":"Machine","start":0,"end":7,"id":0},{"text":"Learning","start":8,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"opportunity","start":36,"end":47,"id":4},{"text":":","start":47,"end":48,"id":5},{"text":"Lead","start":49,"end":53,"id":6},{"text":"Security","start":54,"end":62,"id":7},{"text":"Systems","start":63,"end":70,"id":8},{"text":"program","start":71,"end":78,"id":9},{"text":",","start":78,"end":79,"id":10},{"text":"implement","start":80,"end":89,"id":11},{"text":"OWASP","start":90,"end":95,"id":12},{"text":"Top","start":96,"end":99,"id":13},{"text":"10","start":100,"end":102,"id":14},{"text":",","start":102,"end":103,"id":15},{"text":"manage","start":104,"end":110,"id":16},{"text":"Financial","start":111,"end":120,"id":17},{"text":"Analysis","start":121,"end":129,"id":18},{"text":"operations","start":130,"end":140,"id":19},{"text":".","start":140,"end":141,"id":20}]} {"text":"Looking for Security Assessment Analyst to lead Embedded Systems Security initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":73,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1031654239,"_task_hash":297444268,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Assessment","start":21,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Embedded","start":48,"end":56,"id":7},{"text":"Systems","start":57,"end":64,"id":8},{"text":"Security","start":65,"end":73,"id":9},{"text":"initiatives","start":74,"end":85,"id":10},{"text":".","start":85,"end":86,"id":11}]} {"text":"Proficient in EDR Platforms and QRadar.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-281602726,"_task_hash":-1622516961,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"QRadar","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Senior AI Governance Specialist skilled in Governance, Network Penetration Testing, and Security Operations.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":55,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":88,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1893164035,"_task_hash":986540085,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"Governance","start":10,"end":20,"id":2},{"text":"Specialist","start":21,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Governance","start":43,"end":53,"id":6},{"text":",","start":53,"end":54,"id":7},{"text":"Network","start":55,"end":62,"id":8},{"text":"Penetration","start":63,"end":74,"id":9},{"text":"Testing","start":75,"end":82,"id":10},{"text":",","start":82,"end":83,"id":11},{"text":"and","start":84,"end":87,"id":12},{"text":"Security","start":88,"end":96,"id":13},{"text":"Operations","start":97,"end":107,"id":14},{"text":".","start":107,"end":108,"id":15}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Blue Team Analyst with expertise in OWASP Top 10 compliance and Quantitative Research operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":64,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1343562972,"_task_hash":-2041986804,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Analyst","start":10,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"OWASP","start":36,"end":41,"id":6},{"text":"Top","start":42,"end":45,"id":7},{"text":"10","start":46,"end":48,"id":8},{"text":"compliance","start":49,"end":59,"id":9},{"text":"and","start":60,"end":63,"id":10},{"text":"Quantitative","start":64,"end":76,"id":11},{"text":"Research","start":77,"end":85,"id":12},{"text":"operations","start":86,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"Required: ISO 22301, Metasploit, and NIST Framework expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2012226153,"_task_hash":-2036995397,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"22301","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"Metasploit","start":21,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"and","start":33,"end":36,"id":7},{"text":"NIST","start":37,"end":41,"id":8},{"text":"Framework","start":42,"end":51,"id":9},{"text":"expertise","start":52,"end":61,"id":10},{"text":".","start":61,"end":62,"id":11}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Built Security Engineering team from ground up.","spans":[{"start":6,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1423878832,"_task_hash":-1537482933,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineering","start":15,"end":26,"id":2},{"text":"team","start":27,"end":31,"id":3},{"text":"from","start":32,"end":36,"id":4},{"text":"ground","start":37,"end":43,"id":5},{"text":"up","start":44,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Published research on PKI Management trends.","spans":[{"start":22,"end":36,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1093062896,"_task_hash":1378479730,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"PKI","start":22,"end":25,"id":3},{"text":"Management","start":26,"end":36,"id":4},{"text":"trends","start":37,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Accomplished IAM Engineer specializing in RTOS and AWS Security.","spans":[{"start":13,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":42,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":51,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1320658318,"_task_hash":-767499732,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IAM","start":13,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"specializing","start":26,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"RTOS","start":42,"end":46,"id":5},{"text":"and","start":47,"end":50,"id":6},{"text":"AWS","start":51,"end":54,"id":7},{"text":"Security","start":55,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Must have SIEM experience and NIST Framework knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1703965436,"_task_hash":1407445997,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"knowledge","start":45,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Tracked cryptominer group activities and TTPs.","spans":[{"start":8,"end":19,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":8,"end":19,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-974296129,"_task_hash":-947305035,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"cryptominer","start":8,"end":19,"id":1},{"text":"group","start":20,"end":25,"id":2},{"text":"activities","start":26,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"TTPs","start":41,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Accomplished Computer Forensics Investigator specializing in Data Lakes and Perimeter Security.","spans":[{"start":13,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1394871688,"_task_hash":-2140636253,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Computer","start":13,"end":21,"id":1},{"text":"Forensics","start":22,"end":31,"id":2},{"text":"Investigator","start":32,"end":44,"id":3},{"text":"specializing","start":45,"end":57,"id":4},{"text":"in","start":58,"end":60,"id":5},{"text":"Data","start":61,"end":65,"id":6},{"text":"Lakes","start":66,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Perimeter","start":76,"end":85,"id":9},{"text":"Security","start":86,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} {"text":"Must have Splunk experience and NIST Framework knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":776830533,"_task_hash":-2017004742,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"knowledge","start":47,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Security Engineer with CompTIA Security+ certification, expert in Fortinet.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":23,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":66,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":81220262,"_task_hash":-448158406,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"CompTIA","start":23,"end":30,"id":3},{"text":"Security+","start":31,"end":40,"id":4},{"text":"certification","start":41,"end":54,"id":5},{"text":",","start":54,"end":55,"id":6},{"text":"expert","start":56,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Fortinet","start":66,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Implemented PKI Management controls and monitoring.","spans":[{"start":12,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1084975973,"_task_hash":-1331791434,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"PKI","start":12,"end":15,"id":1},{"text":"Management","start":16,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"monitoring","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"IT Manager with 10 years experience in HTML/CSS, Bash, and Endpoint Detection and Response.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":49,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":59,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":270561966,"_task_hash":-730834628,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"10","start":16,"end":18,"id":3},{"text":"years","start":19,"end":24,"id":4},{"text":"experience","start":25,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"HTML","start":39,"end":43,"id":7},{"text":"/","start":43,"end":44,"id":8},{"text":"CSS","start":44,"end":47,"id":9},{"text":",","start":47,"end":48,"id":10},{"text":"Bash","start":49,"end":53,"id":11},{"text":",","start":53,"end":54,"id":12},{"text":"and","start":55,"end":58,"id":13},{"text":"Endpoint","start":59,"end":67,"id":14},{"text":"Detection","start":68,"end":77,"id":15},{"text":"and","start":78,"end":81,"id":16},{"text":"Response","start":82,"end":90,"id":17},{"text":".","start":90,"end":91,"id":18}]} {"text":"Created YARA rules for Man in the Middle detection.","spans":[{"start":23,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2113704234,"_task_hash":1384599512,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Man","start":23,"end":26,"id":4},{"text":"in","start":27,"end":29,"id":5},{"text":"the","start":30,"end":33,"id":6},{"text":"Middle","start":34,"end":40,"id":7},{"text":"detection","start":41,"end":50,"id":8},{"text":".","start":50,"end":51,"id":9}]} {"text":"Security Operations Manager with GCIH certification, expert in Autopsy.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":37,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":63,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2111552333,"_task_hash":-1839429269,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"GCIH","start":33,"end":37,"id":4},{"text":"certification","start":38,"end":51,"id":5},{"text":",","start":51,"end":52,"id":6},{"text":"expert","start":53,"end":59,"id":7},{"text":"in","start":60,"end":62,"id":8},{"text":"Autopsy","start":63,"end":70,"id":9},{"text":".","start":70,"end":71,"id":10}]} {"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Experienced Security Vulnerability Analyst specializing in Security Architecture.","spans":[{"start":12,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":59,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2045057039,"_task_hash":1686245523,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Vulnerability","start":21,"end":34,"id":2},{"text":"Analyst","start":35,"end":42,"id":3},{"text":"specializing","start":43,"end":55,"id":4},{"text":"in","start":56,"end":58,"id":5},{"text":"Security","start":59,"end":67,"id":6},{"text":"Architecture","start":68,"end":80,"id":7},{"text":".","start":80,"end":81,"id":8}]} {"text":"Must have Burp Suite experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-556840815,"_task_hash":-1067785361,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":"experience","start":21,"end":31,"id":4},{"text":"and","start":32,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"knowledge","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"Proficient in EDR Platforms and Nessus.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":834658253,"_task_hash":-486266097,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"Nessus","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Must have CrowdStrike experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1576336426,"_task_hash":1887255783,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Implemented Incident Response controls and monitoring.","spans":[{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1086438357,"_task_hash":2021854856,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Incident","start":12,"end":20,"id":1},{"text":"Response","start":21,"end":29,"id":2},{"text":"controls","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"monitoring","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Immediate opening for API Developer.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1332043392,"_task_hash":821647175,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"API","start":22,"end":25,"id":3},{"text":"Developer","start":26,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Proficient in Wireshark and SIEM Operations.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1905473231,"_task_hash":-1012059498,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"SIEM","start":28,"end":32,"id":4},{"text":"Operations","start":33,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Holds IDS/IPS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-851111634,"_task_hash":1084501406,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Proficient in QRadar and Burp Suite.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":20521113,"_task_hash":1685999949,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"QRadar","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Burp","start":25,"end":29,"id":4},{"text":"Suite","start":30,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Deployed IDS across 500+ endpoints.","spans":[{"start":9,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1994911692,"_task_hash":410755222,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"IDS","start":9,"end":12,"id":1},{"text":"across","start":13,"end":19,"id":2},{"text":"500","start":20,"end":23,"id":3},{"text":"+","start":23,"end":24,"id":4},{"text":"endpoints","start":25,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"Join our team as Security Education Specialist!","spans":[{"start":17,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-163550740,"_task_hash":1442349731,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Security","start":17,"end":25,"id":4},{"text":"Education","start":26,"end":35,"id":5},{"text":"Specialist","start":36,"end":46,"id":6},{"text":"!","start":46,"end":47,"id":7}]} {"text":"Developed playbooks for brute force response.","spans":[{"start":24,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1814615835,"_task_hash":-342523831,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"brute","start":24,"end":29,"id":3},{"text":"force","start":30,"end":35,"id":4},{"text":"response","start":36,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Analyzed Kerberoasting samples in malware lab.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-371000759,"_task_hash":1992467351,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Kerberoasting","start":9,"end":22,"id":1},{"text":"samples","start":23,"end":30,"id":2},{"text":"in","start":31,"end":33,"id":3},{"text":"malware","start":34,"end":41,"id":4},{"text":"lab","start":42,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Looking for AppSec Engineer to lead Network Security initiatives.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":871528672,"_task_hash":1946140477,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"AppSec","start":12,"end":18,"id":2},{"text":"Engineer","start":19,"end":27,"id":3},{"text":"to","start":28,"end":30,"id":4},{"text":"lead","start":31,"end":35,"id":5},{"text":"Network","start":36,"end":43,"id":6},{"text":"Security","start":44,"end":52,"id":7},{"text":"initiatives","start":53,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Seeking Application Architect with 3++ years experience in Compliance Auditing and Phishing Simulation Tools.","spans":[{"start":8,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":59,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":83,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1311485645,"_task_hash":-25954154,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Application","start":8,"end":19,"id":1},{"text":"Architect","start":20,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"3++","start":35,"end":38,"id":4},{"text":"years","start":39,"end":44,"id":5},{"text":"experience","start":45,"end":55,"id":6},{"text":"in","start":56,"end":58,"id":7},{"text":"Compliance","start":59,"end":69,"id":8},{"text":"Auditing","start":70,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"Phishing","start":83,"end":91,"id":11},{"text":"Simulation","start":92,"end":102,"id":12},{"text":"Tools","start":103,"end":108,"id":13},{"text":".","start":108,"end":109,"id":14}]} {"text":"Senior IoT Security Engineer skilled in Debugging, Infrastructure Management, and Security Training.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":51,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":82,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1615316764,"_task_hash":-457437392,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IoT","start":7,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"Engineer","start":20,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"Debugging","start":40,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Infrastructure","start":51,"end":65,"id":8},{"text":"Management","start":66,"end":76,"id":9},{"text":",","start":76,"end":77,"id":10},{"text":"and","start":78,"end":81,"id":11},{"text":"Security","start":82,"end":90,"id":12},{"text":"Training","start":91,"end":99,"id":13},{"text":".","start":99,"end":100,"id":14}]} {"text":"Detected DDoS activity using behavioral analytics.","spans":[{"start":9,"end":13,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":709970034,"_task_hash":-1991769531,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"DDoS","start":9,"end":13,"id":1},{"text":"activity","start":14,"end":22,"id":2},{"text":"using","start":23,"end":28,"id":3},{"text":"behavioral","start":29,"end":39,"id":4},{"text":"analytics","start":40,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Threat Analyst role available: Vulnerability Scanning experience required, Cisco Security knowledge essential.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":75,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1058558585,"_task_hash":-1800360327,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Analyst","start":7,"end":14,"id":1},{"text":"role","start":15,"end":19,"id":2},{"text":"available","start":20,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"Vulnerability","start":31,"end":44,"id":5},{"text":"Scanning","start":45,"end":53,"id":6},{"text":"experience","start":54,"end":64,"id":7},{"text":"required","start":65,"end":73,"id":8},{"text":",","start":73,"end":74,"id":9},{"text":"Cisco","start":75,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":"knowledge","start":90,"end":99,"id":12},{"text":"essential","start":100,"end":109,"id":13},{"text":".","start":109,"end":110,"id":14}]} {"text":"UX Designer with expertise in NIST Framework compliance and Sensor Fusion operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-473935881,"_task_hash":1042614845,"tokens":[{"text":"UX","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"expertise","start":17,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"compliance","start":45,"end":55,"id":7},{"text":"and","start":56,"end":59,"id":8},{"text":"Sensor","start":60,"end":66,"id":9},{"text":"Fusion","start":67,"end":73,"id":10},{"text":"operations","start":74,"end":84,"id":11},{"text":".","start":84,"end":85,"id":12}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Simulated Session Hijacking during red team exercise.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2092041841,"_task_hash":-2105005063,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Session","start":10,"end":17,"id":1},{"text":"Hijacking","start":18,"end":27,"id":2},{"text":"during","start":28,"end":34,"id":3},{"text":"red","start":35,"end":38,"id":4},{"text":"team","start":39,"end":43,"id":5},{"text":"exercise","start":44,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Accomplished AI Product Manager specializing in Governance and Security Automation.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":63,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":989925616,"_task_hash":1847595968,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"AI","start":13,"end":15,"id":1},{"text":"Product","start":16,"end":23,"id":2},{"text":"Manager","start":24,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Governance","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Security","start":63,"end":71,"id":8},{"text":"Automation","start":72,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} {"text":"Holds SPF/DKIM/DMARC.","spans":[{"start":6,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1913135987,"_task_hash":1543218771,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SPF","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DKIM","start":10,"end":14,"id":3},{"text":"/","start":14,"end":15,"id":4},{"text":"DMARC","start":15,"end":20,"id":5},{"text":".","start":20,"end":21,"id":6}]} {"text":"ISO 22301 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":824458430,"_task_hash":1338890337,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} {"text":"Performed Risk Register for SOC 2 certification.","spans":[{"start":10,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":628083670,"_task_hash":-642880595,"tokens":[{"text":"Performed","start":0,"end":9,"id":0},{"text":"Risk","start":10,"end":14,"id":1},{"text":"Register","start":15,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"SOC","start":28,"end":31,"id":4},{"text":"2","start":32,"end":33,"id":5},{"text":"certification","start":34,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} {"text":"Simulated Heap Overflow during red team exercise.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-213442097,"_task_hash":-1726707532,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Heap","start":10,"end":14,"id":1},{"text":"Overflow","start":15,"end":23,"id":2},{"text":"during","start":24,"end":30,"id":3},{"text":"red","start":31,"end":34,"id":4},{"text":"team","start":35,"end":39,"id":5},{"text":"exercise","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Accomplished IAM Engineer specializing in Testing Methodologies and Security.","spans":[{"start":13,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":42,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":68,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":687527031,"_task_hash":278724533,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IAM","start":13,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"specializing","start":26,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"Testing","start":42,"end":49,"id":5},{"text":"Methodologies","start":50,"end":63,"id":6},{"text":"and","start":64,"end":67,"id":7},{"text":"Security","start":68,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} {"text":"Led IoT Security initiatives across organization.","spans":[{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":16,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2035587452,"_task_hash":-1410806949,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"IoT","start":4,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"initiatives","start":17,"end":28,"id":3},{"text":"across","start":29,"end":35,"id":4},{"text":"organization","start":36,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Incident Manager with hands-on experience in Wireshark, EDR Platforms, and CI/CD Security.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":56,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":75,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":324339612,"_task_hash":506792069,"tokens":[{"text":"Incident","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"hands","start":22,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"on","start":28,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Wireshark","start":45,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"EDR","start":56,"end":59,"id":10},{"text":"Platforms","start":60,"end":69,"id":11},{"text":",","start":69,"end":70,"id":12},{"text":"and","start":71,"end":74,"id":13},{"text":"CI","start":75,"end":77,"id":14},{"text":"/","start":77,"end":78,"id":15},{"text":"CD","start":78,"end":80,"id":16},{"text":"Security","start":81,"end":89,"id":17},{"text":".","start":89,"end":90,"id":18}]} {"text":"Lead Big Data Engineer managing Build Tools and Kotlin initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":48,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1785710429,"_task_hash":143546034,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Big","start":5,"end":8,"id":1},{"text":"Data","start":9,"end":13,"id":2},{"text":"Engineer","start":14,"end":22,"id":3},{"text":"managing","start":23,"end":31,"id":4},{"text":"Build","start":32,"end":37,"id":5},{"text":"Tools","start":38,"end":43,"id":6},{"text":"and","start":44,"end":47,"id":7},{"text":"Kotlin","start":48,"end":54,"id":8},{"text":"initiatives","start":55,"end":66,"id":9},{"text":".","start":66,"end":67,"id":10}]} {"text":"Built Data Security team from ground up.","spans":[{"start":6,"end":19,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-908283961,"_task_hash":-276719216,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Data","start":6,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"team","start":20,"end":24,"id":3},{"text":"from","start":25,"end":29,"id":4},{"text":"ground","start":30,"end":36,"id":5},{"text":"up","start":37,"end":39,"id":6},{"text":".","start":39,"end":40,"id":7}]} {"text":"Proficient in Nessus and EDR Platforms.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":581386151,"_task_hash":-724441266,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"EDR","start":25,"end":28,"id":4},{"text":"Platforms","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Tested WAF rules against Golden Ticket payloads.","spans":[{"start":25,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1241251286,"_task_hash":-117095331,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Golden","start":25,"end":31,"id":4},{"text":"Ticket","start":32,"end":38,"id":5},{"text":"payloads","start":39,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Cloud Security Engineer with SSCP certification, expert in BloodHound.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":33,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1487590119,"_task_hash":-163489855,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"SSCP","start":29,"end":33,"id":4},{"text":"certification","start":34,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"expert","start":49,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"BloodHound","start":59,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Required: GDPR, EDR Platforms, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1253981938,"_task_hash":1606258267,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Platforms","start":20,"end":29,"id":5},{"text":",","start":29,"end":30,"id":6},{"text":"and","start":31,"end":34,"id":7},{"text":"OWASP","start":35,"end":40,"id":8},{"text":"Top","start":41,"end":44,"id":9},{"text":"10","start":45,"end":47,"id":10},{"text":"expertise","start":48,"end":57,"id":11},{"text":".","start":57,"end":58,"id":12}]} {"text":"Lead Server Administrator managing Crisis Simulation and Network Penetration Testing initiatives.","spans":[{"start":5,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":35,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":57,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-479673532,"_task_hash":1714112567,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Server","start":5,"end":11,"id":1},{"text":"Administrator","start":12,"end":25,"id":2},{"text":"managing","start":26,"end":34,"id":3},{"text":"Crisis","start":35,"end":41,"id":4},{"text":"Simulation","start":42,"end":52,"id":5},{"text":"and","start":53,"end":56,"id":6},{"text":"Network","start":57,"end":64,"id":7},{"text":"Penetration","start":65,"end":76,"id":8},{"text":"Testing","start":77,"end":84,"id":9},{"text":"initiatives","start":85,"end":96,"id":10},{"text":".","start":96,"end":97,"id":11}]} {"text":"Senior Fullstack Engineer skilled in Pretexting, Reinforcement Learning, and Security Champions Program.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":49,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":77,"end":103,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1943263458,"_task_hash":1205116421,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Fullstack","start":7,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Pretexting","start":37,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"Reinforcement","start":49,"end":62,"id":7},{"text":"Learning","start":63,"end":71,"id":8},{"text":",","start":71,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"Champions","start":86,"end":95,"id":12},{"text":"Program","start":96,"end":103,"id":13},{"text":".","start":103,"end":104,"id":14}]} {"text":"Tech Support Specialist professional with 10+ years implementing Metasploit and managing Vendor Relations programs.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":65,"end":75,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":89,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":2137975022,"_task_hash":-494049619,"tokens":[{"text":"Tech","start":0,"end":4,"id":0},{"text":"Support","start":5,"end":12,"id":1},{"text":"Specialist","start":13,"end":23,"id":2},{"text":"professional","start":24,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"10","start":42,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"implementing","start":52,"end":64,"id":8},{"text":"Metasploit","start":65,"end":75,"id":9},{"text":"and","start":76,"end":79,"id":10},{"text":"managing","start":80,"end":88,"id":11},{"text":"Vendor","start":89,"end":95,"id":12},{"text":"Relations","start":96,"end":105,"id":13},{"text":"programs","start":106,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} {"text":"Developed GRC strategy and roadmap.","spans":[{"start":10,"end":13,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2109655194,"_task_hash":557619614,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"GRC","start":10,"end":13,"id":1},{"text":"strategy","start":14,"end":22,"id":2},{"text":"and","start":23,"end":26,"id":3},{"text":"roadmap","start":27,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Required: LDAP, Wireshark, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1026898499,"_task_hash":-415766240,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"LDAP","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Wireshark","start":16,"end":25,"id":4},{"text":",","start":25,"end":26,"id":5},{"text":"and","start":27,"end":30,"id":6},{"text":"NIST","start":31,"end":35,"id":7},{"text":"Framework","start":36,"end":45,"id":8},{"text":"expertise","start":46,"end":55,"id":9},{"text":".","start":55,"end":56,"id":10}]} {"text":"PCI-DSS familiarity needed.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1912092747,"_task_hash":981602091,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"familiarity","start":8,"end":19,"id":3},{"text":"needed","start":20,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"VPN certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-601528590,"_task_hash":1777401265,"tokens":[{"text":"VPN","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Front-End Developer professional with 3++ years implementing EDR Tools and managing Privacy-Preserving ML programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":84,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-946005144,"_task_hash":-1347406546,"tokens":[{"text":"Front","start":0,"end":5,"id":0},{"text":"-","start":5,"end":6,"id":1},{"text":"End","start":6,"end":9,"id":2},{"text":"Developer","start":10,"end":19,"id":3},{"text":"professional","start":20,"end":32,"id":4},{"text":"with","start":33,"end":37,"id":5},{"text":"3++","start":38,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"implementing","start":48,"end":60,"id":8},{"text":"EDR","start":61,"end":64,"id":9},{"text":"Tools","start":65,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"managing","start":75,"end":83,"id":12},{"text":"Privacy","start":84,"end":91,"id":13},{"text":"-","start":91,"end":92,"id":14},{"text":"Preserving","start":92,"end":102,"id":15},{"text":"ML","start":103,"end":105,"id":16},{"text":"programs","start":106,"end":114,"id":17},{"text":".","start":114,"end":115,"id":18}]} {"text":"Built Digital Forensics team from ground up.","spans":[{"start":6,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":6,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2068756702,"_task_hash":-1753817493,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Digital","start":6,"end":13,"id":1},{"text":"Forensics","start":14,"end":23,"id":2},{"text":"team","start":24,"end":28,"id":3},{"text":"from","start":29,"end":33,"id":4},{"text":"ground","start":34,"end":40,"id":5},{"text":"up","start":41,"end":43,"id":6},{"text":".","start":43,"end":44,"id":7}]} {"text":"Experienced Systems Integration Engineer specializing in Security Architecture.","spans":[{"start":12,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":449526798,"_task_hash":797466828,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Systems","start":12,"end":19,"id":1},{"text":"Integration","start":20,"end":31,"id":2},{"text":"Engineer","start":32,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Security","start":57,"end":65,"id":6},{"text":"Architecture","start":66,"end":78,"id":7},{"text":".","start":78,"end":79,"id":8}]} {"text":"Senior DevOps Specialist skilled in System Design, RTOS, and Aqua Security.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":61,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":839684557,"_task_hash":989883710,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"DevOps","start":7,"end":13,"id":1},{"text":"Specialist","start":14,"end":24,"id":2},{"text":"skilled","start":25,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"System","start":36,"end":42,"id":5},{"text":"Design","start":43,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"RTOS","start":51,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"and","start":57,"end":60,"id":10},{"text":"Aqua","start":61,"end":65,"id":11},{"text":"Security","start":66,"end":74,"id":12},{"text":".","start":74,"end":75,"id":13}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Required skills: Wireshark, Marketing Copy, VR/AR certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":28,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-2024345170,"_task_hash":9446648,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Wireshark","start":17,"end":26,"id":3},{"text":",","start":26,"end":27,"id":4},{"text":"Marketing","start":28,"end":37,"id":5},{"text":"Copy","start":38,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"VR","start":44,"end":46,"id":8},{"text":"/","start":46,"end":47,"id":9},{"text":"AR","start":47,"end":49,"id":10},{"text":"certification","start":50,"end":63,"id":11},{"text":".","start":63,"end":64,"id":12}]} {"text":"Join our team as SOC Manager!","spans":[{"start":17,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":519939898,"_task_hash":1951128600,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"SOC","start":17,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"!","start":28,"end":29,"id":6}]} {"text":"Trained staff on ISO 27001 A.8.1 requirements.","spans":[{"start":17,"end":32,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":55648157,"_task_hash":-781654075,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"ISO","start":17,"end":20,"id":3},{"text":"27001","start":21,"end":26,"id":4},{"text":"A.8.1","start":27,"end":32,"id":5},{"text":"requirements","start":33,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Led SCADA Security initiatives across organization.","spans":[{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-494273572,"_task_hash":122017704,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"SCADA","start":4,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"initiatives","start":19,"end":30,"id":3},{"text":"across","start":31,"end":37,"id":4},{"text":"organization","start":38,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Implemented controls to prevent BEC attacks.","spans":[{"start":32,"end":35,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1711565081,"_task_hash":1266414823,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"BEC","start":32,"end":35,"id":4},{"text":"attacks","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Experienced Technical Support Specialist specializing in Azure Security.","spans":[{"start":12,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1611822520,"_task_hash":-1090037788,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Technical","start":12,"end":21,"id":1},{"text":"Support","start":22,"end":29,"id":2},{"text":"Specialist","start":30,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Azure","start":57,"end":62,"id":6},{"text":"Security","start":63,"end":71,"id":7},{"text":".","start":71,"end":72,"id":8}]} {"text":"Immediate opening for Data Privacy Analyst.","spans":[{"start":22,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-2056177379,"_task_hash":201911581,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Data","start":22,"end":26,"id":3},{"text":"Privacy","start":27,"end":34,"id":4},{"text":"Analyst","start":35,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Lead AI/ML Security Specialist managing Model Deployment and Staff Development initiatives.","spans":[{"start":5,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":61,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1873643412,"_task_hash":-558886895,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"AI","start":5,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"ML","start":8,"end":10,"id":3},{"text":"Security","start":11,"end":19,"id":4},{"text":"Specialist","start":20,"end":30,"id":5},{"text":"managing","start":31,"end":39,"id":6},{"text":"Model","start":40,"end":45,"id":7},{"text":"Deployment","start":46,"end":56,"id":8},{"text":"and","start":57,"end":60,"id":9},{"text":"Staff","start":61,"end":66,"id":10},{"text":"Development","start":67,"end":78,"id":11},{"text":"initiatives","start":79,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Lead Cyber Insurance Consultant managing Project Coordination and Ticketing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":591145128,"_task_hash":1345228390,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Insurance","start":11,"end":20,"id":2},{"text":"Consultant","start":21,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Project","start":41,"end":48,"id":5},{"text":"Coordination","start":49,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"Ticketing","start":66,"end":75,"id":8},{"text":"initiatives","start":76,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} {"text":"Implemented Threat Intelligence controls and monitoring.","spans":[{"start":12,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1176634310,"_task_hash":2079173616,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Threat","start":12,"end":18,"id":1},{"text":"Intelligence","start":19,"end":31,"id":2},{"text":"controls","start":32,"end":40,"id":3},{"text":"and","start":41,"end":44,"id":4},{"text":"monitoring","start":45,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"OPA certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1792304265,"_task_hash":-919128943,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Exploited Kerberoasting vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":352658851,"_task_hash":-1149607801,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Kerberoasting","start":10,"end":23,"id":1},{"text":"vulnerability","start":24,"end":37,"id":2},{"text":"in","start":38,"end":40,"id":3},{"text":"web","start":41,"end":44,"id":4},{"text":"application","start":45,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} {"text":"Senior Cybersecurity Analyst position: 7 years minimum, expert in Content Creation, Hacking, and Cloud Security Architecture.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":66,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":97,"end":124,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":504363669,"_task_hash":278479788,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cybersecurity","start":7,"end":20,"id":1},{"text":"Analyst","start":21,"end":28,"id":2},{"text":"position","start":29,"end":37,"id":3},{"text":":","start":37,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"minimum","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"expert","start":56,"end":62,"id":9},{"text":"in","start":63,"end":65,"id":10},{"text":"Content","start":66,"end":73,"id":11},{"text":"Creation","start":74,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"Hacking","start":84,"end":91,"id":14},{"text":",","start":91,"end":92,"id":15},{"text":"and","start":93,"end":96,"id":16},{"text":"Cloud","start":97,"end":102,"id":17},{"text":"Security","start":103,"end":111,"id":18},{"text":"Architecture","start":112,"end":124,"id":19},{"text":".","start":124,"end":125,"id":20}]} {"text":"Senior Defensive Security Analyst position: 5+ years minimum, expert in Training, Risk Transfer, and Email Security.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":72,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":82,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":101,"end":115,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1511669483,"_task_hash":-1248641866,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Defensive","start":7,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"position","start":34,"end":42,"id":4},{"text":":","start":42,"end":43,"id":5},{"text":"5","start":44,"end":45,"id":6},{"text":"+","start":45,"end":46,"id":7},{"text":"years","start":47,"end":52,"id":8},{"text":"minimum","start":53,"end":60,"id":9},{"text":",","start":60,"end":61,"id":10},{"text":"expert","start":62,"end":68,"id":11},{"text":"in","start":69,"end":71,"id":12},{"text":"Training","start":72,"end":80,"id":13},{"text":",","start":80,"end":81,"id":14},{"text":"Risk","start":82,"end":86,"id":15},{"text":"Transfer","start":87,"end":95,"id":16},{"text":",","start":95,"end":96,"id":17},{"text":"and","start":97,"end":100,"id":18},{"text":"Email","start":101,"end":106,"id":19},{"text":"Security","start":107,"end":115,"id":20},{"text":".","start":115,"end":116,"id":21}]} {"text":"Experienced Cloud Architect specializing in Security Awareness.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":768607209,"_task_hash":-2020170260,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cloud","start":12,"end":17,"id":1},{"text":"Architect","start":18,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Security","start":44,"end":52,"id":5},{"text":"Awareness","start":53,"end":62,"id":6},{"text":".","start":62,"end":63,"id":7}]} {"text":"Holds ITIL.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-21057009,"_task_hash":-312416917,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ITIL","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Implemented controls to prevent cryptominer attacks.","spans":[{"start":32,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":911767390,"_task_hash":-52789145,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"cryptominer","start":32,"end":43,"id":4},{"text":"attacks","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Forensic Analyst with CISSP certification, expert in YARA.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":22,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-744099879,"_task_hash":-1975802360,"tokens":[{"text":"Forensic","start":0,"end":8,"id":0},{"text":"Analyst","start":9,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"CISSP","start":22,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"YARA","start":53,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} {"text":"DevSecOps Engineer with OSED certification, expert in Ghidra.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-611822075,"_task_hash":741757100,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"OSED","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Ghidra","start":54,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"Experienced Enterprise Risk Analyst specializing in Security Culture Building.","spans":[{"start":12,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":2096686534,"_task_hash":294291666,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Enterprise","start":12,"end":22,"id":1},{"text":"Risk","start":23,"end":27,"id":2},{"text":"Analyst","start":28,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Security","start":52,"end":60,"id":6},{"text":"Culture","start":61,"end":68,"id":7},{"text":"Building","start":69,"end":77,"id":8},{"text":".","start":77,"end":78,"id":9}]} {"text":"Join our team as Head of Security!","spans":[{"start":17,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1596845202,"_task_hash":211631595,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Head","start":17,"end":21,"id":4},{"text":"of","start":22,"end":24,"id":5},{"text":"Security","start":25,"end":33,"id":6},{"text":"!","start":33,"end":34,"id":7}]} {"text":"Join our team as Enterprise Solutions Architect!","spans":[{"start":17,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1867499106,"_task_hash":-1236583068,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Enterprise","start":17,"end":27,"id":4},{"text":"Solutions","start":28,"end":37,"id":5},{"text":"Architect","start":38,"end":47,"id":6},{"text":"!","start":47,"end":48,"id":7}]} {"text":"Created YARA rules for Process Hollowing detection.","spans":[{"start":23,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1882850893,"_task_hash":11946253,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Process","start":23,"end":30,"id":4},{"text":"Hollowing","start":31,"end":40,"id":5},{"text":"detection","start":41,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"We need a Insider Threat Analyst skilled in Command Injection prevention and Supply Chain Attack analysis using Wireshark.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":44,"end":61,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":77,"end":96,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":14},{"start":112,"end":121,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":70300569,"_task_hash":62293173,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Insider","start":10,"end":17,"id":3},{"text":"Threat","start":18,"end":24,"id":4},{"text":"Analyst","start":25,"end":32,"id":5},{"text":"skilled","start":33,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Command","start":44,"end":51,"id":8},{"text":"Injection","start":52,"end":61,"id":9},{"text":"prevention","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Supply","start":77,"end":83,"id":12},{"text":"Chain","start":84,"end":89,"id":13},{"text":"Attack","start":90,"end":96,"id":14},{"text":"analysis","start":97,"end":105,"id":15},{"text":"using","start":106,"end":111,"id":16},{"text":"Wireshark","start":112,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} {"text":"Proficient in CrowdStrike and Nessus.","spans":[{"start":14,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1837103489,"_task_hash":693235503,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"CrowdStrike","start":14,"end":25,"id":2},{"text":"and","start":26,"end":29,"id":3},{"text":"Nessus","start":30,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Help Desk Technician experienced in detecting Supply Chain Attack attacks using SIEM.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":65,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":8},{"start":80,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-199976935,"_task_hash":-365524149,"tokens":[{"text":"Help","start":0,"end":4,"id":0},{"text":"Desk","start":5,"end":9,"id":1},{"text":"Technician","start":10,"end":20,"id":2},{"text":"experienced","start":21,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"detecting","start":36,"end":45,"id":5},{"text":"Supply","start":46,"end":52,"id":6},{"text":"Chain","start":53,"end":58,"id":7},{"text":"Attack","start":59,"end":65,"id":8},{"text":"attacks","start":66,"end":73,"id":9},{"text":"using","start":74,"end":79,"id":10},{"text":"SIEM","start":80,"end":84,"id":11},{"text":".","start":84,"end":85,"id":12}]} {"text":"Exploited Reflective DLL Loading vulnerability in web application.","spans":[{"start":10,"end":32,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":768720665,"_task_hash":-407115233,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Reflective","start":10,"end":20,"id":1},{"text":"DLL","start":21,"end":24,"id":2},{"text":"Loading","start":25,"end":32,"id":3},{"text":"vulnerability","start":33,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"web","start":50,"end":53,"id":6},{"text":"application","start":54,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Must know Splunk, QRadar, and OWASP Top 10.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":42,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1580797335,"_task_hash":1519239139,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"QRadar","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"OWASP","start":30,"end":35,"id":7},{"text":"Top","start":36,"end":39,"id":8},{"text":"10","start":40,"end":42,"id":9},{"text":".","start":42,"end":43,"id":10}]} {"text":"VP of Security with GSEC certification, expert in YARA.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":50,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":250534918,"_task_hash":-15612319,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"GSEC","start":20,"end":24,"id":4},{"text":"certification","start":25,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"expert","start":40,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"YARA","start":50,"end":54,"id":9},{"text":".","start":54,"end":55,"id":10}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Analyzed Process Hollowing samples in malware lab.","spans":[{"start":9,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1895873445,"_task_hash":380340077,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Process","start":9,"end":16,"id":1},{"text":"Hollowing","start":17,"end":26,"id":2},{"text":"samples","start":27,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"malware","start":38,"end":45,"id":5},{"text":"lab","start":46,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Holds CCPA certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1889162723,"_task_hash":1781085210,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Implemented controls to prevent worm attacks.","spans":[{"start":32,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-156225098,"_task_hash":1926203920,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"worm","start":32,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Privacy Specialist with hands-on experience in Wireshark, QRadar, and Security Operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":58,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":70,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":95477045,"_task_hash":-2127779324,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Specialist","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Wireshark","start":47,"end":56,"id":8},{"text":",","start":56,"end":57,"id":9},{"text":"QRadar","start":58,"end":64,"id":10},{"text":",","start":64,"end":65,"id":11},{"text":"and","start":66,"end":69,"id":12},{"text":"Security","start":70,"end":78,"id":13},{"text":"Operations","start":79,"end":89,"id":14},{"text":".","start":89,"end":90,"id":15}]} {"text":"Certified ISO 31000 working as ML Ops Engineer, focused on Security Champions Program and Session Hijacking prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":59,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":90,"end":107,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1369026444,"_task_hash":778344688,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"31000","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"ML","start":31,"end":33,"id":5},{"text":"Ops","start":34,"end":37,"id":6},{"text":"Engineer","start":38,"end":46,"id":7},{"text":",","start":46,"end":47,"id":8},{"text":"focused","start":48,"end":55,"id":9},{"text":"on","start":56,"end":58,"id":10},{"text":"Security","start":59,"end":67,"id":11},{"text":"Champions","start":68,"end":77,"id":12},{"text":"Program","start":78,"end":85,"id":13},{"text":"and","start":86,"end":89,"id":14},{"text":"Session","start":90,"end":97,"id":15},{"text":"Hijacking","start":98,"end":107,"id":16},{"text":"prevention","start":108,"end":118,"id":17},{"text":".","start":118,"end":119,"id":18}]} {"text":"Lead Systems Integration Engineer managing PKI and Server Management initiatives.","spans":[{"start":5,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":51,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1283328422,"_task_hash":335376859,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Systems","start":5,"end":12,"id":1},{"text":"Integration","start":13,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"managing","start":34,"end":42,"id":4},{"text":"PKI","start":43,"end":46,"id":5},{"text":"and","start":47,"end":50,"id":6},{"text":"Server","start":51,"end":57,"id":7},{"text":"Management","start":58,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"AI with hands-on experience in SIEM, QRadar, and Security Design.","spans":[{"start":0,"end":2,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":31,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":37,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":49,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-877152545,"_task_hash":650211727,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"with","start":3,"end":7,"id":1},{"text":"hands","start":8,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"on","start":14,"end":16,"id":4},{"text":"experience","start":17,"end":27,"id":5},{"text":"in","start":28,"end":30,"id":6},{"text":"SIEM","start":31,"end":35,"id":7},{"text":",","start":35,"end":36,"id":8},{"text":"QRadar","start":37,"end":43,"id":9},{"text":",","start":43,"end":44,"id":10},{"text":"and","start":45,"end":48,"id":11},{"text":"Security","start":49,"end":57,"id":12},{"text":"Design","start":58,"end":64,"id":13},{"text":".","start":64,"end":65,"id":14}]} {"text":"Database Administrator needed for enterprise security team.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1157971936,"_task_hash":1946868488,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Administrator","start":9,"end":22,"id":1},{"text":"needed","start":23,"end":29,"id":2},{"text":"for","start":30,"end":33,"id":3},{"text":"enterprise","start":34,"end":44,"id":4},{"text":"security","start":45,"end":53,"id":5},{"text":"team","start":54,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Troubleshot IDS performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":153216172,"_task_hash":-1129673977,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"IDS","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"UI Designer experienced in detecting worm attacks using Nessus.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":41,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":56,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":2019638519,"_task_hash":-1033369758,"tokens":[{"text":"UI","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"experienced","start":12,"end":23,"id":2},{"text":"in","start":24,"end":26,"id":3},{"text":"detecting","start":27,"end":36,"id":4},{"text":"worm","start":37,"end":41,"id":5},{"text":"attacks","start":42,"end":49,"id":6},{"text":"using","start":50,"end":55,"id":7},{"text":"Nessus","start":56,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Facility Security Consultant experienced in detecting Supply Chain Attack attacks using QRadar.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":73,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":8},{"start":88,"end":94,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1607388430,"_task_hash":189809033,"tokens":[{"text":"Facility","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Consultant","start":18,"end":28,"id":2},{"text":"experienced","start":29,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"detecting","start":44,"end":53,"id":5},{"text":"Supply","start":54,"end":60,"id":6},{"text":"Chain","start":61,"end":66,"id":7},{"text":"Attack","start":67,"end":73,"id":8},{"text":"attacks","start":74,"end":81,"id":9},{"text":"using","start":82,"end":87,"id":10},{"text":"QRadar","start":88,"end":94,"id":11},{"text":".","start":94,"end":95,"id":12}]} {"text":"Assessed Malware Analysis maturity using industry frameworks.","spans":[{"start":9,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2070217977,"_task_hash":-697135050,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Malware","start":9,"end":16,"id":1},{"text":"Analysis","start":17,"end":25,"id":2},{"text":"maturity","start":26,"end":34,"id":3},{"text":"using","start":35,"end":40,"id":4},{"text":"industry","start":41,"end":49,"id":5},{"text":"frameworks","start":50,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"PCI-DSS compliance experience preferred.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1829455208,"_task_hash":1390445460,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"compliance","start":8,"end":18,"id":3},{"text":"experience","start":19,"end":29,"id":4},{"text":"preferred","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Infrastructure Security Engineer needed for enterprise security team.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":831795016,"_task_hash":263889430,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"needed","start":33,"end":39,"id":3},{"text":"for","start":40,"end":43,"id":4},{"text":"enterprise","start":44,"end":54,"id":5},{"text":"security","start":55,"end":63,"id":6},{"text":"team","start":64,"end":68,"id":7},{"text":".","start":68,"end":69,"id":8}]} {"text":"Assessed Network Security maturity using industry frameworks.","spans":[{"start":9,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1216555317,"_task_hash":224620434,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Network","start":9,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"maturity","start":26,"end":34,"id":3},{"text":"using","start":35,"end":40,"id":4},{"text":"industry","start":41,"end":49,"id":5},{"text":"frameworks","start":50,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Required skills: Splunk, Customer Service, TOGAF certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":43,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-783739186,"_task_hash":-344535861,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Customer","start":25,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":",","start":41,"end":42,"id":7},{"text":"TOGAF","start":43,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} {"text":"AppSec Engineer professional with 5+ years implementing SIEM Operations and managing Offline Storage programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":85,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":164119797,"_task_hash":2025086941,"tokens":[{"text":"AppSec","start":0,"end":6,"id":0},{"text":"Engineer","start":7,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"5","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"implementing","start":43,"end":55,"id":7},{"text":"SIEM","start":56,"end":60,"id":8},{"text":"Operations","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"managing","start":76,"end":84,"id":11},{"text":"Offline","start":85,"end":92,"id":12},{"text":"Storage","start":93,"end":100,"id":13},{"text":"programs","start":101,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} {"text":"Accomplished Analytics Specialist specializing in Unity and CI/CD Security.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":60,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-381564547,"_task_hash":1830481489,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Analytics","start":13,"end":22,"id":1},{"text":"Specialist","start":23,"end":33,"id":2},{"text":"specializing","start":34,"end":46,"id":3},{"text":"in","start":47,"end":49,"id":4},{"text":"Unity","start":50,"end":55,"id":5},{"text":"and","start":56,"end":59,"id":6},{"text":"CI","start":60,"end":62,"id":7},{"text":"/","start":62,"end":63,"id":8},{"text":"CD","start":63,"end":65,"id":9},{"text":"Security","start":66,"end":74,"id":10},{"text":".","start":74,"end":75,"id":11}]} {"text":"We need a IAM Engineer skilled in Buffer Overflow prevention and botnet analysis using CrowdStrike.","spans":[{"start":10,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":34,"end":49,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":65,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":87,"end":98,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":581216374,"_task_hash":-959442433,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"IAM","start":10,"end":13,"id":3},{"text":"Engineer","start":14,"end":22,"id":4},{"text":"skilled","start":23,"end":30,"id":5},{"text":"in","start":31,"end":33,"id":6},{"text":"Buffer","start":34,"end":40,"id":7},{"text":"Overflow","start":41,"end":49,"id":8},{"text":"prevention","start":50,"end":60,"id":9},{"text":"and","start":61,"end":64,"id":10},{"text":"botnet","start":65,"end":71,"id":11},{"text":"analysis","start":72,"end":80,"id":12},{"text":"using","start":81,"end":86,"id":13},{"text":"CrowdStrike","start":87,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Mentored junior engineers in Data Security.","spans":[{"start":29,"end":42,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-775289563,"_task_hash":-93707090,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Data","start":29,"end":33,"id":4},{"text":"Security","start":34,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Required skills: Nessus, Bias Detection, IAM certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":41,"end":44,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1777910803,"_task_hash":-1743840806,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Bias","start":25,"end":29,"id":5},{"text":"Detection","start":30,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"IAM","start":41,"end":44,"id":8},{"text":"certification","start":45,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"Expert in DAST configuration and tuning.","spans":[{"start":10,"end":14,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1323669278,"_task_hash":-1614782146,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DAST","start":10,"end":14,"id":2},{"text":"configuration","start":15,"end":28,"id":3},{"text":"and","start":29,"end":32,"id":4},{"text":"tuning","start":33,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Seeking CTI Analyst with 3+ years experience in Audit and Database Management.","spans":[{"start":8,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1305089989,"_task_hash":-346214418,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"CTI","start":8,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"with","start":20,"end":24,"id":3},{"text":"3","start":25,"end":26,"id":4},{"text":"+","start":26,"end":27,"id":5},{"text":"years","start":28,"end":33,"id":6},{"text":"experience","start":34,"end":44,"id":7},{"text":"in","start":45,"end":47,"id":8},{"text":"Audit","start":48,"end":53,"id":9},{"text":"and","start":54,"end":57,"id":10},{"text":"Database","start":58,"end":66,"id":11},{"text":"Management","start":67,"end":77,"id":12},{"text":".","start":77,"end":78,"id":13}]} {"text":"Holds OSINT.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1470986036,"_task_hash":-1256149054,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSINT","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Ensured compliance with GDPR requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":946413884,"_task_hash":1895437357,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"GDPR","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Must know Wireshark, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":506850155,"_task_hash":-1192668616,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"CrowdStrike","start":21,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"and","start":34,"end":37,"id":6},{"text":"NIST","start":38,"end":42,"id":7},{"text":"Framework","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} {"text":"Mentored junior engineers in Cryptography.","spans":[{"start":29,"end":41,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4},{"start":29,"end":41,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1375477144,"_task_hash":1710234532,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Cryptography","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Senior Malware Specialist skilled in Literature Review, IAM, and Mobile Security.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":65,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":850710010,"_task_hash":-1955882144,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Malware","start":7,"end":14,"id":1},{"text":"Specialist","start":15,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Literature","start":37,"end":47,"id":5},{"text":"Review","start":48,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"IAM","start":56,"end":59,"id":8},{"text":",","start":59,"end":60,"id":9},{"text":"and","start":61,"end":64,"id":10},{"text":"Mobile","start":65,"end":71,"id":11},{"text":"Security","start":72,"end":80,"id":12},{"text":".","start":80,"end":81,"id":13}]} {"text":"Seeking MLOps Engineer with 5+ years experience in Audience Research and Audit Management.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":73,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-830951439,"_task_hash":1447123212,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"MLOps","start":8,"end":13,"id":1},{"text":"Engineer","start":14,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"5","start":28,"end":29,"id":4},{"text":"+","start":29,"end":30,"id":5},{"text":"years","start":31,"end":36,"id":6},{"text":"experience","start":37,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"Audience","start":51,"end":59,"id":9},{"text":"Research","start":60,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Audit","start":73,"end":78,"id":12},{"text":"Management","start":79,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} {"text":"Automated CIS Control 3 compliance monitoring.","spans":[{"start":10,"end":23,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":500140600,"_task_hash":-654218225,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"CIS","start":10,"end":13,"id":1},{"text":"Control","start":14,"end":21,"id":2},{"text":"3","start":22,"end":23,"id":3},{"text":"compliance","start":24,"end":34,"id":4},{"text":"monitoring","start":35,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Senior GRC Manager skilled in Reinforcement Learning, Enterprise Architecture, and Cloud Security Posture Management.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":54,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":83,"end":116,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1273135807,"_task_hash":494941224,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"GRC","start":7,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"skilled","start":19,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"Reinforcement","start":30,"end":43,"id":5},{"text":"Learning","start":44,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"Enterprise","start":54,"end":64,"id":8},{"text":"Architecture","start":65,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"and","start":79,"end":82,"id":11},{"text":"Cloud","start":83,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"Posture","start":98,"end":105,"id":14},{"text":"Management","start":106,"end":116,"id":15},{"text":".","start":116,"end":117,"id":16}]} {"text":"Endpoint Security Specialist experienced in detecting trojan attacks using SIEM.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":60,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":75,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-301439305,"_task_hash":-2047662059,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"experienced","start":29,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"detecting","start":44,"end":53,"id":5},{"text":"trojan","start":54,"end":60,"id":6},{"text":"attacks","start":61,"end":68,"id":7},{"text":"using","start":69,"end":74,"id":8},{"text":"SIEM","start":75,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Senior Application Security Specialist skilled in Test Automation, Red Team Operations, and Security Tools.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":92,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":465398997,"_task_hash":1798525568,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Application","start":7,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Specialist","start":28,"end":38,"id":3},{"text":"skilled","start":39,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Test","start":50,"end":54,"id":6},{"text":"Automation","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Red","start":67,"end":70,"id":9},{"text":"Team","start":71,"end":75,"id":10},{"text":"Operations","start":76,"end":86,"id":11},{"text":",","start":86,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":"Tools","start":101,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Looking for Copywriter to lead Hardware Security initiatives.","spans":[{"start":12,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2},{"start":31,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-312806863,"_task_hash":31462709,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Copywriter","start":12,"end":22,"id":2},{"text":"to","start":23,"end":25,"id":3},{"text":"lead","start":26,"end":30,"id":4},{"text":"Hardware","start":31,"end":39,"id":5},{"text":"Security","start":40,"end":48,"id":6},{"text":"initiatives","start":49,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} {"text":"Developed FedRAMP policies and procedures.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1959682186,"_task_hash":965947495,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"FedRAMP","start":10,"end":17,"id":1},{"text":"policies","start":18,"end":26,"id":2},{"text":"and","start":27,"end":30,"id":3},{"text":"procedures","start":31,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Simulated LLMNR Poisoning during red team exercise.","spans":[{"start":10,"end":25,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":260881105,"_task_hash":-2095094384,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"LLMNR","start":10,"end":15,"id":1},{"text":"Poisoning","start":16,"end":25,"id":2},{"text":"during","start":26,"end":32,"id":3},{"text":"red","start":33,"end":36,"id":4},{"text":"team","start":37,"end":41,"id":5},{"text":"exercise","start":42,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Business Continuity Manager with hands-on experience in ELK Stack, Wireshark, and Security.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":67,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":82,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":504407204,"_task_hash":-519783691,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Continuity","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"hands","start":33,"end":38,"id":4},{"text":"-","start":38,"end":39,"id":5},{"text":"on","start":39,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"ELK","start":56,"end":59,"id":9},{"text":"Stack","start":60,"end":65,"id":10},{"text":",","start":65,"end":66,"id":11},{"text":"Wireshark","start":67,"end":76,"id":12},{"text":",","start":76,"end":77,"id":13},{"text":"and","start":78,"end":81,"id":14},{"text":"Security","start":82,"end":90,"id":15},{"text":".","start":90,"end":91,"id":16}]} {"text":"Security Operations Manager with GCP Security certification, expert in Metasploit.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":45,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":71,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":500060901,"_task_hash":1784092802,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"GCP","start":33,"end":36,"id":4},{"text":"Security","start":37,"end":45,"id":5},{"text":"certification","start":46,"end":59,"id":6},{"text":",","start":59,"end":60,"id":7},{"text":"expert","start":61,"end":67,"id":8},{"text":"in","start":68,"end":70,"id":9},{"text":"Metasploit","start":71,"end":81,"id":10},{"text":".","start":81,"end":82,"id":11}]} {"text":"Blue Team Lead with GCIH certification, expert in Mimikatz.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":50,"end":58,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1813550079,"_task_hash":1029063837,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Lead","start":10,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"GCIH","start":20,"end":24,"id":4},{"text":"certification","start":25,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"expert","start":40,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Mimikatz","start":50,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"SLAM required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":45167728,"_task_hash":1981946623,"tokens":[{"text":"SLAM","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Created YARA rules for Heap Overflow detection.","spans":[{"start":23,"end":36,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":457685070,"_task_hash":1394769793,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Heap","start":23,"end":27,"id":4},{"text":"Overflow","start":28,"end":36,"id":5},{"text":"detection","start":37,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Cloud Solutions Architect with 10+ years experience in Policy Analysis, Ethics Frameworks, and Database.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":70,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":72,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":95,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":18326640,"_task_hash":-804133979,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Solutions","start":6,"end":15,"id":1},{"text":"Architect","start":16,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"10","start":31,"end":33,"id":4},{"text":"+","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"Policy","start":55,"end":61,"id":9},{"text":"Analysis","start":62,"end":70,"id":10},{"text":",","start":70,"end":71,"id":11},{"text":"Ethics","start":72,"end":78,"id":12},{"text":"Frameworks","start":79,"end":89,"id":13},{"text":",","start":89,"end":90,"id":14},{"text":"and","start":91,"end":94,"id":15},{"text":"Database","start":95,"end":103,"id":16},{"text":".","start":103,"end":104,"id":17}]} {"text":"Lead Game Programmer managing Serverless and AI Market Trends initiatives.","spans":[{"start":5,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":45,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-330043153,"_task_hash":567177615,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Game","start":5,"end":9,"id":1},{"text":"Programmer","start":10,"end":20,"id":2},{"text":"managing","start":21,"end":29,"id":3},{"text":"Serverless","start":30,"end":40,"id":4},{"text":"and","start":41,"end":44,"id":5},{"text":"AI","start":45,"end":47,"id":6},{"text":"Market","start":48,"end":54,"id":7},{"text":"Trends","start":55,"end":61,"id":8},{"text":"initiatives","start":62,"end":73,"id":9},{"text":".","start":73,"end":74,"id":10}]} {"text":"Senior Crisis Manager position: 10 years minimum, expert in Contract Negotiation, Vishing, and Container Registry Security.","spans":[{"start":7,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":60,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":95,"end":122,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":2015157675,"_task_hash":341438624,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Crisis","start":7,"end":13,"id":1},{"text":"Manager","start":14,"end":21,"id":2},{"text":"position","start":22,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"10","start":32,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"minimum","start":41,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"expert","start":50,"end":56,"id":9},{"text":"in","start":57,"end":59,"id":10},{"text":"Contract","start":60,"end":68,"id":11},{"text":"Negotiation","start":69,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"Vishing","start":82,"end":89,"id":14},{"text":",","start":89,"end":90,"id":15},{"text":"and","start":91,"end":94,"id":16},{"text":"Container","start":95,"end":104,"id":17},{"text":"Registry","start":105,"end":113,"id":18},{"text":"Security","start":114,"end":122,"id":19},{"text":".","start":122,"end":123,"id":20}]} {"text":"Automation Engineer needed for enterprise security team.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":2118035081,"_task_hash":-1022539934,"tokens":[{"text":"Automation","start":0,"end":10,"id":0},{"text":"Engineer","start":11,"end":19,"id":1},{"text":"needed","start":20,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"enterprise","start":31,"end":41,"id":4},{"text":"security","start":42,"end":50,"id":5},{"text":"team","start":51,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Join our team as Security Awareness Specialist!","spans":[{"start":17,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":799737856,"_task_hash":1717341725,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Security","start":17,"end":25,"id":4},{"text":"Awareness","start":26,"end":35,"id":5},{"text":"Specialist","start":36,"end":46,"id":6},{"text":"!","start":46,"end":47,"id":7}]} {"text":"Trained staff on PCI-DSS obligations.","spans":[{"start":17,"end":24,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5},{"start":17,"end":24,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5},{"start":17,"end":24,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1149130124,"_task_hash":1294453906,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"PCI","start":17,"end":20,"id":3},{"text":"-","start":20,"end":21,"id":4},{"text":"DSS","start":21,"end":24,"id":5},{"text":"obligations","start":25,"end":36,"id":6},{"text":".","start":36,"end":37,"id":7}]} {"text":"Required skills: Wireshark, Test Data Management, BDD/TDD certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":28,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":50,"end":57,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":884001747,"_task_hash":-1025139378,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Wireshark","start":17,"end":26,"id":3},{"text":",","start":26,"end":27,"id":4},{"text":"Test","start":28,"end":32,"id":5},{"text":"Data","start":33,"end":37,"id":6},{"text":"Management","start":38,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"BDD","start":50,"end":53,"id":9},{"text":"/","start":53,"end":54,"id":10},{"text":"TDD","start":54,"end":57,"id":11},{"text":"certification","start":58,"end":71,"id":12},{"text":".","start":71,"end":72,"id":13}]} {"text":"Looking for Social Engineering Specialist to lead Model Security initiatives.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":50,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":136865282,"_task_hash":946069059,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Social","start":12,"end":18,"id":2},{"text":"Engineering","start":19,"end":30,"id":3},{"text":"Specialist","start":31,"end":41,"id":4},{"text":"to","start":42,"end":44,"id":5},{"text":"lead","start":45,"end":49,"id":6},{"text":"Model","start":50,"end":55,"id":7},{"text":"Security","start":56,"end":64,"id":8},{"text":"initiatives","start":65,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Experienced Lead Software Engineer specializing in Security Assessment.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1365362000,"_task_hash":-1413712522,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Lead","start":12,"end":16,"id":1},{"text":"Software","start":17,"end":25,"id":2},{"text":"Engineer","start":26,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Security","start":51,"end":59,"id":6},{"text":"Assessment","start":60,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Lead Cryptology Expert managing BCP/DR Planning and Data Mining initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":7},{"start":52,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":17719540,"_task_hash":-2115330357,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cryptology","start":5,"end":15,"id":1},{"text":"Expert","start":16,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"BCP","start":32,"end":35,"id":4},{"text":"/","start":35,"end":36,"id":5},{"text":"DR","start":36,"end":38,"id":6},{"text":"Planning","start":39,"end":47,"id":7},{"text":"and","start":48,"end":51,"id":8},{"text":"Data","start":52,"end":56,"id":9},{"text":"Mining","start":57,"end":63,"id":10},{"text":"initiatives","start":64,"end":75,"id":11},{"text":".","start":75,"end":76,"id":12}]} {"text":"Cybersecurity Threat Hunter experienced in detecting trojan attacks using EDR Tools.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1520846597,"_task_hash":930636680,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Threat","start":14,"end":20,"id":1},{"text":"Hunter","start":21,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"EDR","start":74,"end":77,"id":9},{"text":"Tools","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Developed SOX policies and procedures.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":188396574,"_task_hash":-150062858,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"SOX","start":10,"end":13,"id":1},{"text":"policies","start":14,"end":22,"id":2},{"text":"and","start":23,"end":26,"id":3},{"text":"procedures","start":27,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} {"text":"Insider Risk Analyst with hands-on experience in CrowdStrike, Nessus, and Hardware Security Modules.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":74,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1424412507,"_task_hash":-492938815,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"hands","start":26,"end":31,"id":4},{"text":"-","start":31,"end":32,"id":5},{"text":"on","start":32,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"CrowdStrike","start":49,"end":60,"id":9},{"text":",","start":60,"end":61,"id":10},{"text":"Nessus","start":62,"end":68,"id":11},{"text":",","start":68,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Hardware","start":74,"end":82,"id":14},{"text":"Security","start":83,"end":91,"id":15},{"text":"Modules","start":92,"end":99,"id":16},{"text":".","start":99,"end":100,"id":17}]} {"text":"Security Training Specialist opportunity: Lead Container Security program, implement OWASP Top 10, manage UI Design operations.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":85,"end":97,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":106,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1162808066,"_task_hash":822917854,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Training","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"opportunity","start":29,"end":40,"id":3},{"text":":","start":40,"end":41,"id":4},{"text":"Lead","start":42,"end":46,"id":5},{"text":"Container","start":47,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":"program","start":66,"end":73,"id":8},{"text":",","start":73,"end":74,"id":9},{"text":"implement","start":75,"end":84,"id":10},{"text":"OWASP","start":85,"end":90,"id":11},{"text":"Top","start":91,"end":94,"id":12},{"text":"10","start":95,"end":97,"id":13},{"text":",","start":97,"end":98,"id":14},{"text":"manage","start":99,"end":105,"id":15},{"text":"UI","start":106,"end":108,"id":16},{"text":"Design","start":109,"end":115,"id":17},{"text":"operations","start":116,"end":126,"id":18},{"text":".","start":126,"end":127,"id":19}]} {"text":"Tested WAF rules against Living off the Land payloads.","spans":[{"start":25,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":7},{"start":25,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1180344582,"_task_hash":358451819,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Living","start":25,"end":31,"id":4},{"text":"off","start":32,"end":35,"id":5},{"text":"the","start":36,"end":39,"id":6},{"text":"Land","start":40,"end":44,"id":7},{"text":"payloads","start":45,"end":53,"id":8},{"text":".","start":53,"end":54,"id":9}]} {"text":"Led incident response for CVE-2019-11510 exploitation.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1787025772,"_task_hash":1601923215,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2019","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"11510","start":35,"end":40,"id":6},{"text":"exploitation","start":41,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"IAM Engineer opportunity: Lead Terraform Security program, implement NIST Framework, manage Data Privacy operations.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":69,"end":83,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-50133480,"_task_hash":-385661605,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"Engineer","start":4,"end":12,"id":1},{"text":"opportunity","start":13,"end":24,"id":2},{"text":":","start":24,"end":25,"id":3},{"text":"Lead","start":26,"end":30,"id":4},{"text":"Terraform","start":31,"end":40,"id":5},{"text":"Security","start":41,"end":49,"id":6},{"text":"program","start":50,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"implement","start":59,"end":68,"id":9},{"text":"NIST","start":69,"end":73,"id":10},{"text":"Framework","start":74,"end":83,"id":11},{"text":",","start":83,"end":84,"id":12},{"text":"manage","start":85,"end":91,"id":13},{"text":"Data","start":92,"end":96,"id":14},{"text":"Privacy","start":97,"end":104,"id":15},{"text":"operations","start":105,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} {"text":"Required skills: Wireshark, Threat Modeling, HIPAA certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":28,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":50,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-684724865,"_task_hash":21987103,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Wireshark","start":17,"end":26,"id":3},{"text":",","start":26,"end":27,"id":4},{"text":"Threat","start":28,"end":34,"id":5},{"text":"Modeling","start":35,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"HIPAA","start":45,"end":50,"id":8},{"text":"certification","start":51,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Incident Responder with OSEP certification, expert in SentinelOne.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":803503143,"_task_hash":597569603,"tokens":[{"text":"Incident","start":0,"end":8,"id":0},{"text":"Responder","start":9,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"OSEP","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"SentinelOne","start":54,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Holds NIST RMF.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1769087407,"_task_hash":-23255768,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"NIST","start":6,"end":10,"id":1},{"text":"RMF","start":11,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Join our team as GRC Analyst!","spans":[{"start":17,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-81149907,"_task_hash":-640905684,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"GRC","start":17,"end":20,"id":4},{"text":"Analyst","start":21,"end":28,"id":5},{"text":"!","start":28,"end":29,"id":6}]} {"text":"Lead Forensic Investigator managing Monitoring Tools and Data Mining initiatives.","spans":[{"start":5,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":36,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":57,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":237017,"_task_hash":490629115,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Forensic","start":5,"end":13,"id":1},{"text":"Investigator","start":14,"end":26,"id":2},{"text":"managing","start":27,"end":35,"id":3},{"text":"Monitoring","start":36,"end":46,"id":4},{"text":"Tools","start":47,"end":52,"id":5},{"text":"and","start":53,"end":56,"id":6},{"text":"Data","start":57,"end":61,"id":7},{"text":"Mining","start":62,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Lead Insider Risk Specialist managing Adult Learning Principles and Phishing Detection initiatives.","spans":[{"start":5,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":68,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1930717197,"_task_hash":-143553317,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Insider","start":5,"end":12,"id":1},{"text":"Risk","start":13,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"managing","start":29,"end":37,"id":4},{"text":"Adult","start":38,"end":43,"id":5},{"text":"Learning","start":44,"end":52,"id":6},{"text":"Principles","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Phishing","start":68,"end":76,"id":9},{"text":"Detection","start":77,"end":86,"id":10},{"text":"initiatives","start":87,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} {"text":"Looking for Ethical Hacker to lead Model Security initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":49,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":253209206,"_task_hash":-1371021280,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Ethical","start":12,"end":19,"id":2},{"text":"Hacker","start":20,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Model","start":35,"end":40,"id":6},{"text":"Security","start":41,"end":49,"id":7},{"text":"initiatives","start":50,"end":61,"id":8},{"text":".","start":61,"end":62,"id":9}]} {"text":"Certified FTK working as Network Security Specialist, focused on Security Design and Cross-Site Scripting prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":65,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":85,"end":105,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":652319514,"_task_hash":1441382483,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"FTK","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Network","start":25,"end":32,"id":4},{"text":"Security","start":33,"end":41,"id":5},{"text":"Specialist","start":42,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"focused","start":54,"end":61,"id":8},{"text":"on","start":62,"end":64,"id":9},{"text":"Security","start":65,"end":73,"id":10},{"text":"Design","start":74,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Cross","start":85,"end":90,"id":13},{"text":"-","start":90,"end":91,"id":14},{"text":"Site","start":91,"end":95,"id":15},{"text":"Scripting","start":96,"end":105,"id":16},{"text":"prevention","start":106,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} {"text":"Immediate opening for Phishing Defense Expert.","spans":[{"start":22,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-58762404,"_task_hash":-1002142669,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Phishing","start":22,"end":30,"id":3},{"text":"Defense","start":31,"end":38,"id":4},{"text":"Expert","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Proficient in EDR Platforms and ELK Stack.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":41,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1088208363,"_task_hash":803036729,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"ELK","start":32,"end":35,"id":5},{"text":"Stack","start":36,"end":41,"id":6},{"text":".","start":41,"end":42,"id":7}]} {"text":"Must have EDR Tools experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":341881145,"_task_hash":-941982494,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"NIST","start":35,"end":39,"id":6},{"text":"Framework","start":40,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Looking for AI Safety Architect to lead Application Security initiatives.","spans":[{"start":12,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":40,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-2038127034,"_task_hash":-464301416,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"AI","start":12,"end":14,"id":2},{"text":"Safety","start":15,"end":21,"id":3},{"text":"Architect","start":22,"end":31,"id":4},{"text":"to","start":32,"end":34,"id":5},{"text":"lead","start":35,"end":39,"id":6},{"text":"Application","start":40,"end":51,"id":7},{"text":"Security","start":52,"end":60,"id":8},{"text":"initiatives","start":61,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} {"text":"Advanced Threat Hunter with 7 years experience in Requirements Analysis, Compliance Auditing, and Change Management.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-382930363,"_task_hash":1970453596,"tokens":[{"text":"Advanced","start":0,"end":8,"id":0},{"text":"Threat","start":9,"end":15,"id":1},{"text":"Hunter","start":16,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"7","start":28,"end":29,"id":4},{"text":"years","start":30,"end":35,"id":5},{"text":"experience","start":36,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Requirements","start":50,"end":62,"id":8},{"text":"Analysis","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Compliance","start":73,"end":83,"id":11},{"text":"Auditing","start":84,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"and","start":94,"end":97,"id":14},{"text":"Change","start":98,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} {"text":"Certified NLP working as Cybersecurity Trainer, focused on Physical Security and Privilege Escalation prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":59,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":81,"end":101,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1674317083,"_task_hash":1492470143,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Cybersecurity","start":25,"end":38,"id":4},{"text":"Trainer","start":39,"end":46,"id":5},{"text":",","start":46,"end":47,"id":6},{"text":"focused","start":48,"end":55,"id":7},{"text":"on","start":56,"end":58,"id":8},{"text":"Physical","start":59,"end":67,"id":9},{"text":"Security","start":68,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"Privilege","start":81,"end":90,"id":12},{"text":"Escalation","start":91,"end":101,"id":13},{"text":"prevention","start":102,"end":112,"id":14},{"text":".","start":112,"end":113,"id":15}]} {"text":"Expert in Security Operations best practices.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":762638432,"_task_hash":-12952155,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"best","start":30,"end":34,"id":4},{"text":"practices","start":35,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Led Infrastructure Security initiatives across organization.","spans":[{"start":4,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-478630348,"_task_hash":-1861903595,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Infrastructure","start":4,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"initiatives","start":28,"end":39,"id":3},{"text":"across","start":40,"end":46,"id":4},{"text":"organization","start":47,"end":59,"id":5},{"text":".","start":59,"end":60,"id":6}]} {"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"OPA required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370918646,"_task_hash":-45550355,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Seeking Server-Side Developer with 10++ years experience in Wireless Networks and Physics.","spans":[{"start":8,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":60,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":533103381,"_task_hash":-292318527,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Server","start":8,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"Side","start":15,"end":19,"id":3},{"text":"Developer","start":20,"end":29,"id":4},{"text":"with","start":30,"end":34,"id":5},{"text":"10++","start":35,"end":39,"id":6},{"text":"years","start":40,"end":45,"id":7},{"text":"experience","start":46,"end":56,"id":8},{"text":"in","start":57,"end":59,"id":9},{"text":"Wireless","start":60,"end":68,"id":10},{"text":"Networks","start":69,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Physics","start":82,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} {"text":"Reverse engineered CVE-2023-44487 exploit for threat intelligence.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2056121576,"_task_hash":-1038737380,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"engineered","start":8,"end":18,"id":1},{"text":"CVE-2023","start":19,"end":27,"id":2},{"text":"-","start":27,"end":28,"id":3},{"text":"44487","start":28,"end":33,"id":4},{"text":"exploit","start":34,"end":41,"id":5},{"text":"for","start":42,"end":45,"id":6},{"text":"threat","start":46,"end":52,"id":7},{"text":"intelligence","start":53,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Hiring Test Engineer for Shaders and trojan detection.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":25,"end":32,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1362019885,"_task_hash":1157514645,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"for","start":21,"end":24,"id":3},{"text":"Shaders","start":25,"end":32,"id":4},{"text":"and","start":33,"end":36,"id":5},{"text":"trojan","start":37,"end":43,"id":6},{"text":"detection","start":44,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Mentored junior engineers in Risk Management.","spans":[{"start":29,"end":44,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-789479822,"_task_hash":-1006243189,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Risk","start":29,"end":33,"id":4},{"text":"Management","start":34,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Experienced Application Security Engineer specializing in API Security.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1868467689,"_task_hash":-2063311556,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Application","start":12,"end":23,"id":1},{"text":"Security","start":24,"end":32,"id":2},{"text":"Engineer","start":33,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"API","start":58,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Developed Network Security strategy and roadmap.","spans":[{"start":10,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2007025198,"_task_hash":-1376449256,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Network","start":10,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"strategy","start":27,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"roadmap","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Performed Evidence Collection for SOC 2 certification.","spans":[{"start":10,"end":29,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-295563987,"_task_hash":893781575,"tokens":[{"text":"Performed","start":0,"end":9,"id":0},{"text":"Evidence","start":10,"end":18,"id":1},{"text":"Collection","start":19,"end":29,"id":2},{"text":"for","start":30,"end":33,"id":3},{"text":"SOC","start":34,"end":37,"id":4},{"text":"2","start":38,"end":39,"id":5},{"text":"certification","start":40,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"VR/AR certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":311753143,"_task_hash":1135622316,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Presented SCADA Security updates to leadership.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-780364313,"_task_hash":-1229347757,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"SCADA","start":10,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"updates","start":25,"end":32,"id":3},{"text":"to","start":33,"end":35,"id":4},{"text":"leadership","start":36,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Head of InfoSec with hands-on experience in EDR Platforms, Splunk, and Security Scanning Tools.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":59,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":71,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1748755362,"_task_hash":-162039905,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"InfoSec","start":8,"end":15,"id":2},{"text":"with","start":16,"end":20,"id":3},{"text":"hands","start":21,"end":26,"id":4},{"text":"-","start":26,"end":27,"id":5},{"text":"on","start":27,"end":29,"id":6},{"text":"experience","start":30,"end":40,"id":7},{"text":"in","start":41,"end":43,"id":8},{"text":"EDR","start":44,"end":47,"id":9},{"text":"Platforms","start":48,"end":57,"id":10},{"text":",","start":57,"end":58,"id":11},{"text":"Splunk","start":59,"end":65,"id":12},{"text":",","start":65,"end":66,"id":13},{"text":"and","start":67,"end":70,"id":14},{"text":"Security","start":71,"end":79,"id":15},{"text":"Scanning","start":80,"end":88,"id":16},{"text":"Tools","start":89,"end":94,"id":17},{"text":".","start":94,"end":95,"id":18}]} {"text":"FISMA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1159449825,"_task_hash":869222594,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Ensured compliance with FISMA requirements.","spans":[{"start":24,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-920627862,"_task_hash":-1419571263,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"FISMA","start":24,"end":29,"id":3},{"text":"requirements","start":30,"end":42,"id":4},{"text":".","start":42,"end":43,"id":5}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Proficient in Splunk and EDR Platforms.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1473027651,"_task_hash":1237123694,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"EDR","start":25,"end":28,"id":4},{"text":"Platforms","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Must know SIEM Operations, Burp Suite, and NIST Framework.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":43,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-198887386,"_task_hash":-453283939,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"Burp","start":27,"end":31,"id":5},{"text":"Suite","start":32,"end":37,"id":6},{"text":",","start":37,"end":38,"id":7},{"text":"and","start":39,"end":42,"id":8},{"text":"NIST","start":43,"end":47,"id":9},{"text":"Framework","start":48,"end":57,"id":10},{"text":".","start":57,"end":58,"id":11}]} {"text":"Promoted to CISO after serving as Security Director.","spans":[{"start":12,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-634588992,"_task_hash":-1354962071,"tokens":[{"text":"Promoted","start":0,"end":8,"id":0},{"text":"to","start":9,"end":11,"id":1},{"text":"CISO","start":12,"end":16,"id":2},{"text":"after","start":17,"end":22,"id":3},{"text":"serving","start":23,"end":30,"id":4},{"text":"as","start":31,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Director","start":43,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"SAML certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1108473182,"_task_hash":-1907986411,"tokens":[{"text":"SAML","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Appointed DPO to manage GDPR obligations.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-983542380,"_task_hash":-973318922,"tokens":[{"text":"Appointed","start":0,"end":9,"id":0},{"text":"DPO","start":10,"end":13,"id":1},{"text":"to","start":14,"end":16,"id":2},{"text":"manage","start":17,"end":23,"id":3},{"text":"GDPR","start":24,"end":28,"id":4},{"text":"obligations","start":29,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Immediate opening for Security Training Specialist.","spans":[{"start":22,"end":50,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1330161150,"_task_hash":-1636317149,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Training","start":31,"end":39,"id":4},{"text":"Specialist","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"AI Ethicist experienced in detecting trojan attacks using Nessus.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-2144921870,"_task_hash":-1746160041,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Ethicist","start":3,"end":11,"id":1},{"text":"experienced","start":12,"end":23,"id":2},{"text":"in","start":24,"end":26,"id":3},{"text":"detecting","start":27,"end":36,"id":4},{"text":"trojan","start":37,"end":43,"id":5},{"text":"attacks","start":44,"end":51,"id":6},{"text":"using","start":52,"end":57,"id":7},{"text":"Nessus","start":58,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Developed Incident Response strategy and roadmap.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-516090697,"_task_hash":-752776137,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Incident","start":10,"end":18,"id":1},{"text":"Response","start":19,"end":27,"id":2},{"text":"strategy","start":28,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"roadmap","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Must have CrowdStrike experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1576336426,"_task_hash":1887255783,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Recovered systems after spear phishing attack.","spans":[{"start":24,"end":38,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":576866430,"_task_hash":-696340944,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"spear","start":24,"end":29,"id":3},{"text":"phishing","start":30,"end":38,"id":4},{"text":"attack","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Accomplished Technical Project Manager specializing in AWS/Azure/GCP and Mobile App Security.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":10},{"start":73,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1212585452,"_task_hash":641644581,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Technical","start":13,"end":22,"id":1},{"text":"Project","start":23,"end":30,"id":2},{"text":"Manager","start":31,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"AWS","start":55,"end":58,"id":6},{"text":"/","start":58,"end":59,"id":7},{"text":"Azure","start":59,"end":64,"id":8},{"text":"/","start":64,"end":65,"id":9},{"text":"GCP","start":65,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Mobile","start":73,"end":79,"id":12},{"text":"App","start":80,"end":83,"id":13},{"text":"Security","start":84,"end":92,"id":14},{"text":".","start":92,"end":93,"id":15}]} {"text":"Compliance Officer with AWS Security certification, expert in Wireshark.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":36,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":62,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2050986701,"_task_hash":-1022373343,"tokens":[{"text":"Compliance","start":0,"end":10,"id":0},{"text":"Officer","start":11,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"AWS","start":24,"end":27,"id":3},{"text":"Security","start":28,"end":36,"id":4},{"text":"certification","start":37,"end":50,"id":5},{"text":",","start":50,"end":51,"id":6},{"text":"expert","start":52,"end":58,"id":7},{"text":"in","start":59,"end":61,"id":8},{"text":"Wireshark","start":62,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Led incident response for CVE-2023-20198 exploitation.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1226871288,"_task_hash":1947600955,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2023","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"20198","start":35,"end":40,"id":6},{"text":"exploitation","start":41,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Assistant with 7 years experience in Identity Federation, Bug Bounty, and Vulnerability Management Platforms.","spans":[{"start":0,"end":9,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":37,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":58,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":74,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":10153209,"_task_hash":-1260936809,"tokens":[{"text":"Assistant","start":0,"end":9,"id":0},{"text":"with","start":10,"end":14,"id":1},{"text":"7","start":15,"end":16,"id":2},{"text":"years","start":17,"end":22,"id":3},{"text":"experience","start":23,"end":33,"id":4},{"text":"in","start":34,"end":36,"id":5},{"text":"Identity","start":37,"end":45,"id":6},{"text":"Federation","start":46,"end":56,"id":7},{"text":",","start":56,"end":57,"id":8},{"text":"Bug","start":58,"end":61,"id":9},{"text":"Bounty","start":62,"end":68,"id":10},{"text":",","start":68,"end":69,"id":11},{"text":"and","start":70,"end":73,"id":12},{"text":"Vulnerability","start":74,"end":87,"id":13},{"text":"Management","start":88,"end":98,"id":14},{"text":"Platforms","start":99,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Assessed Incident Response maturity using industry frameworks.","spans":[{"start":9,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1643891749,"_task_hash":-71030004,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Incident","start":9,"end":17,"id":1},{"text":"Response","start":18,"end":26,"id":2},{"text":"maturity","start":27,"end":35,"id":3},{"text":"using","start":36,"end":41,"id":4},{"text":"industry","start":42,"end":50,"id":5},{"text":"frameworks","start":51,"end":61,"id":6},{"text":".","start":61,"end":62,"id":7}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Frontend Engineer with 5+ years experience in Database Management, Risk Quantification, and Cloud Migration.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":92,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1458408108,"_task_hash":-1204773604,"tokens":[{"text":"Frontend","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"5","start":23,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Database","start":46,"end":54,"id":8},{"text":"Management","start":55,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"Risk","start":67,"end":71,"id":11},{"text":"Quantification","start":72,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"and","start":88,"end":91,"id":14},{"text":"Cloud","start":92,"end":97,"id":15},{"text":"Migration","start":98,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} {"text":"Built Patch Management team from ground up.","spans":[{"start":6,"end":22,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1833574209,"_task_hash":-180916094,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Patch","start":6,"end":11,"id":1},{"text":"Management","start":12,"end":22,"id":2},{"text":"team","start":23,"end":27,"id":3},{"text":"from","start":28,"end":32,"id":4},{"text":"ground","start":33,"end":39,"id":5},{"text":"up","start":40,"end":42,"id":6},{"text":".","start":42,"end":43,"id":7}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Coordinated with law enforcement on Advanced Persistent Threat case.","spans":[{"start":36,"end":62,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7},{"start":36,"end":62,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-867999233,"_task_hash":-955678140,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"Advanced","start":36,"end":44,"id":5},{"text":"Persistent","start":45,"end":55,"id":6},{"text":"Threat","start":56,"end":62,"id":7},{"text":"case","start":63,"end":67,"id":8},{"text":".","start":67,"end":68,"id":9}]} {"text":"ML Ops Engineer role available: User Research experience required, CI/CD Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":32,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":281747249,"_task_hash":-1679055091,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Ops","start":3,"end":6,"id":1},{"text":"Engineer","start":7,"end":15,"id":2},{"text":"role","start":16,"end":20,"id":3},{"text":"available","start":21,"end":30,"id":4},{"text":":","start":30,"end":31,"id":5},{"text":"User","start":32,"end":36,"id":6},{"text":"Research","start":37,"end":45,"id":7},{"text":"experience","start":46,"end":56,"id":8},{"text":"required","start":57,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"CI","start":67,"end":69,"id":11},{"text":"/","start":69,"end":70,"id":12},{"text":"CD","start":70,"end":72,"id":13},{"text":"Security","start":73,"end":81,"id":14},{"text":"knowledge","start":82,"end":91,"id":15},{"text":"essential","start":92,"end":101,"id":16},{"text":".","start":101,"end":102,"id":17}]} {"text":"SABSA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":953533127,"_task_hash":482991972,"tokens":[{"text":"SABSA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Troubleshot API performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1478103537,"_task_hash":1737865107,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"API","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"SRE with hands-on experience in SIEM, Splunk, and BYOD Security.","spans":[{"start":0,"end":3,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":38,"end":44,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":50,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1213471425,"_task_hash":1328956055,"tokens":[{"text":"SRE","start":0,"end":3,"id":0},{"text":"with","start":4,"end":8,"id":1},{"text":"hands","start":9,"end":14,"id":2},{"text":"-","start":14,"end":15,"id":3},{"text":"on","start":15,"end":17,"id":4},{"text":"experience","start":18,"end":28,"id":5},{"text":"in","start":29,"end":31,"id":6},{"text":"SIEM","start":32,"end":36,"id":7},{"text":",","start":36,"end":37,"id":8},{"text":"Splunk","start":38,"end":44,"id":9},{"text":",","start":44,"end":45,"id":10},{"text":"and","start":46,"end":49,"id":11},{"text":"BYOD","start":50,"end":54,"id":12},{"text":"Security","start":55,"end":63,"id":13},{"text":".","start":63,"end":64,"id":14}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Holds ETL.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":582823180,"_task_hash":-1693571280,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ETL","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Experienced Cyber Operations Manager specializing in Security Operations.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-804042884,"_task_hash":755021497,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Operations","start":18,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Security","start":53,"end":61,"id":6},{"text":"Operations","start":62,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} {"text":"Proficient in SIEM Operations and Nessus.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1869879119,"_task_hash":-1760989935,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"Nessus","start":34,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Holds PRINCE2.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1460297396,"_task_hash":-885041091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PRINCE2","start":6,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Must have Metasploit experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1432922912,"_task_hash":873180234,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"OWASP","start":36,"end":41,"id":5},{"text":"Top","start":42,"end":45,"id":6},{"text":"10","start":46,"end":48,"id":7},{"text":"knowledge","start":49,"end":58,"id":8},{"text":".","start":58,"end":59,"id":9}]} {"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Proficient in SIEM and Metasploit.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":33,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-304615267,"_task_hash":465878963,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Metasploit","start":23,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"MLOps Engineer experienced in detecting phishing attacks using SIEM Operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":40,"end":48,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":63,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":499928702,"_task_hash":224239561,"tokens":[{"text":"MLOps","start":0,"end":5,"id":0},{"text":"Engineer","start":6,"end":14,"id":1},{"text":"experienced","start":15,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"detecting","start":30,"end":39,"id":4},{"text":"phishing","start":40,"end":48,"id":5},{"text":"attacks","start":49,"end":56,"id":6},{"text":"using","start":57,"end":62,"id":7},{"text":"SIEM","start":63,"end":67,"id":8},{"text":"Operations","start":68,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Proficient in Metasploit and EDR Platforms.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":42,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-973233824,"_task_hash":1462430662,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"EDR","start":29,"end":32,"id":4},{"text":"Platforms","start":33,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"HIPAA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370665845,"_task_hash":-1113010267,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Looking for IT Department Manager to lead Security Integration initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":42,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1270949761,"_task_hash":-180304727,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"IT","start":12,"end":14,"id":2},{"text":"Department","start":15,"end":25,"id":3},{"text":"Manager","start":26,"end":33,"id":4},{"text":"to","start":34,"end":36,"id":5},{"text":"lead","start":37,"end":41,"id":6},{"text":"Security","start":42,"end":50,"id":7},{"text":"Integration","start":51,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Must know SIEM Operations, SIEM, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":242137399,"_task_hash":-1346233020,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"SIEM","start":27,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"and","start":33,"end":36,"id":7},{"text":"OWASP","start":37,"end":42,"id":8},{"text":"Top","start":43,"end":46,"id":9},{"text":"10","start":47,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} {"text":"Looking for Cloud Security Engineer to lead Physical Security initiatives.","spans":[{"start":12,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":44,"end":61,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1637656492,"_task_hash":1597373206,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Cloud","start":12,"end":17,"id":2},{"text":"Security","start":18,"end":26,"id":3},{"text":"Engineer","start":27,"end":35,"id":4},{"text":"to","start":36,"end":38,"id":5},{"text":"lead","start":39,"end":43,"id":6},{"text":"Physical","start":44,"end":52,"id":7},{"text":"Security","start":53,"end":61,"id":8},{"text":"initiatives","start":62,"end":73,"id":9},{"text":".","start":73,"end":74,"id":10}]} {"text":"Required skills: Wireshark, Zero Knowledge Proofs, FTK certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":28,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":51,"end":54,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1999685393,"_task_hash":-2078386564,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Wireshark","start":17,"end":26,"id":3},{"text":",","start":26,"end":27,"id":4},{"text":"Zero","start":28,"end":32,"id":5},{"text":"Knowledge","start":33,"end":42,"id":6},{"text":"Proofs","start":43,"end":49,"id":7},{"text":",","start":49,"end":50,"id":8},{"text":"FTK","start":51,"end":54,"id":9},{"text":"certification","start":55,"end":68,"id":10},{"text":".","start":68,"end":69,"id":11}]} {"text":"We need a Cyberpunk Hacker skilled in Path Traversal prevention and DDoS analysis using EDR Tools.","spans":[{"start":10,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":38,"end":52,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":68,"end":72,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":88,"end":97,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-162712307,"_task_hash":-862967301,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cyberpunk","start":10,"end":19,"id":3},{"text":"Hacker","start":20,"end":26,"id":4},{"text":"skilled","start":27,"end":34,"id":5},{"text":"in","start":35,"end":37,"id":6},{"text":"Path","start":38,"end":42,"id":7},{"text":"Traversal","start":43,"end":52,"id":8},{"text":"prevention","start":53,"end":63,"id":9},{"text":"and","start":64,"end":67,"id":10},{"text":"DDoS","start":68,"end":72,"id":11},{"text":"analysis","start":73,"end":81,"id":12},{"text":"using","start":82,"end":87,"id":13},{"text":"EDR","start":88,"end":91,"id":14},{"text":"Tools","start":92,"end":97,"id":15},{"text":".","start":97,"end":98,"id":16}]} {"text":"PCI-DSS compliance experience preferred.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1829455208,"_task_hash":1390445460,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"compliance","start":8,"end":18,"id":3},{"text":"experience","start":19,"end":29,"id":4},{"text":"preferred","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Release Manager with expertise in NIST Framework compliance and Recovery Planning operations.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-47113090,"_task_hash":-1263364134,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"expertise","start":21,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"NIST","start":34,"end":38,"id":5},{"text":"Framework","start":39,"end":48,"id":6},{"text":"compliance","start":49,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Recovery","start":64,"end":72,"id":9},{"text":"Planning","start":73,"end":81,"id":10},{"text":"operations","start":82,"end":92,"id":11},{"text":".","start":92,"end":93,"id":12}]} {"text":"Proficient in SIEM and Splunk.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1283449210,"_task_hash":-1622949620,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"VR/AR certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":311753143,"_task_hash":1135622316,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"DORA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":757810043,"_task_hash":-723281915,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Lead Solutions Architect managing Flutter and Legal Knowledge initiatives.","spans":[{"start":5,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":46,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1979781127,"_task_hash":1122698061,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Solutions","start":5,"end":14,"id":1},{"text":"Architect","start":15,"end":24,"id":2},{"text":"managing","start":25,"end":33,"id":3},{"text":"Flutter","start":34,"end":41,"id":4},{"text":"and","start":42,"end":45,"id":5},{"text":"Legal","start":46,"end":51,"id":6},{"text":"Knowledge","start":52,"end":61,"id":7},{"text":"initiatives","start":62,"end":73,"id":8},{"text":".","start":73,"end":74,"id":9}]} {"text":"Information Specialist experienced in detecting worm attacks using SIEM.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":52,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":67,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":60848270,"_task_hash":1233922102,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"worm","start":48,"end":52,"id":5},{"text":"attacks","start":53,"end":60,"id":6},{"text":"using","start":61,"end":66,"id":7},{"text":"SIEM","start":67,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"Analyzed CVE-2023-4863 exploit chain and mitigations.","spans":[{"start":9,"end":22,"label":"CVE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1005173184,"_task_hash":-1964180127,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"CVE-2023","start":9,"end":17,"id":1},{"text":"-","start":17,"end":18,"id":2},{"text":"4863","start":18,"end":22,"id":3},{"text":"exploit","start":23,"end":30,"id":4},{"text":"chain","start":31,"end":36,"id":5},{"text":"and","start":37,"end":40,"id":6},{"text":"mitigations","start":41,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"NIS2 compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1501553921,"_task_hash":1788738932,"tokens":[{"text":"NIS2","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Security Consultant with GWAPT certification, expert in Qualys.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":25,"end":30,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":56,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1499256748,"_task_hash":1851324222,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Consultant","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"GWAPT","start":25,"end":30,"id":3},{"text":"certification","start":31,"end":44,"id":4},{"text":",","start":44,"end":45,"id":5},{"text":"expert","start":46,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Qualys","start":56,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Published research on Security Engineering trends.","spans":[{"start":22,"end":42,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1858729790,"_task_hash":-1901784636,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Engineering","start":31,"end":42,"id":4},{"text":"trends","start":43,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Accomplished Copywriter specializing in Threat Assessment and Security Awareness Platforms.","spans":[{"start":13,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":40,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":62,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-540893721,"_task_hash":-1836637508,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Copywriter","start":13,"end":23,"id":1},{"text":"specializing","start":24,"end":36,"id":2},{"text":"in","start":37,"end":39,"id":3},{"text":"Threat","start":40,"end":46,"id":4},{"text":"Assessment","start":47,"end":57,"id":5},{"text":"and","start":58,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":"Awareness","start":71,"end":80,"id":8},{"text":"Platforms","start":81,"end":90,"id":9},{"text":".","start":90,"end":91,"id":10}]} {"text":"Mitigated Golden Ticket through code remediation.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":426266431,"_task_hash":-860394577,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Golden","start":10,"end":16,"id":1},{"text":"Ticket","start":17,"end":23,"id":2},{"text":"through","start":24,"end":31,"id":3},{"text":"code","start":32,"end":36,"id":4},{"text":"remediation","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Presented Application Security updates to leadership.","spans":[{"start":10,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-843772243,"_task_hash":-1107988472,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Application","start":10,"end":21,"id":1},{"text":"Security","start":22,"end":30,"id":2},{"text":"updates","start":31,"end":38,"id":3},{"text":"to","start":39,"end":41,"id":4},{"text":"leadership","start":42,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Seeking Penetration Tester with 5+ years experience in Continuous Testing and Web Development.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":55,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2137099803,"_task_hash":-1253534255,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Penetration","start":8,"end":19,"id":1},{"text":"Tester","start":20,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"5","start":32,"end":33,"id":4},{"text":"+","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"Continuous","start":55,"end":65,"id":9},{"text":"Testing","start":66,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"Web","start":78,"end":81,"id":12},{"text":"Development","start":82,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} {"text":"Cyber Threat Hunter role available: Budget Planning experience required, Supply Chain Security knowledge essential.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-977842585,"_task_hash":502498465,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Threat","start":6,"end":12,"id":1},{"text":"Hunter","start":13,"end":19,"id":2},{"text":"role","start":20,"end":24,"id":3},{"text":"available","start":25,"end":34,"id":4},{"text":":","start":34,"end":35,"id":5},{"text":"Budget","start":36,"end":42,"id":6},{"text":"Planning","start":43,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"required","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Supply","start":73,"end":79,"id":11},{"text":"Chain","start":80,"end":85,"id":12},{"text":"Security","start":86,"end":94,"id":13},{"text":"knowledge","start":95,"end":104,"id":14},{"text":"essential","start":105,"end":114,"id":15},{"text":".","start":114,"end":115,"id":16}]} {"text":"Analyzed Pass the Hash samples in malware lab.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1816570966,"_task_hash":-624104149,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Pass","start":9,"end":13,"id":1},{"text":"the","start":14,"end":17,"id":2},{"text":"Hash","start":18,"end":22,"id":3},{"text":"samples","start":23,"end":30,"id":4},{"text":"in","start":31,"end":33,"id":5},{"text":"malware","start":34,"end":41,"id":6},{"text":"lab","start":42,"end":45,"id":7},{"text":".","start":45,"end":46,"id":8}]} {"text":"Looking for Cryptographer to lead Security Champions Program initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2},{"start":34,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1547005063,"_task_hash":-803403339,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Cryptographer","start":12,"end":25,"id":2},{"text":"to","start":26,"end":28,"id":3},{"text":"lead","start":29,"end":33,"id":4},{"text":"Security","start":34,"end":42,"id":5},{"text":"Champions","start":43,"end":52,"id":6},{"text":"Program","start":53,"end":60,"id":7},{"text":"initiatives","start":61,"end":72,"id":8},{"text":".","start":72,"end":73,"id":9}]} {"text":"Content Writer needed for enterprise security team.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1921172514,"_task_hash":2125871702,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Writer","start":8,"end":14,"id":1},{"text":"needed","start":15,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"enterprise","start":26,"end":36,"id":4},{"text":"security","start":37,"end":45,"id":5},{"text":"team","start":46,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Lead Application Security Specialist managing Elliptic Curve Cryptography and HR Collaboration initiatives.","spans":[{"start":5,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":46,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":78,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":464368485,"_task_hash":470957480,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Application","start":5,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"managing","start":37,"end":45,"id":4},{"text":"Elliptic","start":46,"end":54,"id":5},{"text":"Curve","start":55,"end":60,"id":6},{"text":"Cryptography","start":61,"end":73,"id":7},{"text":"and","start":74,"end":77,"id":8},{"text":"HR","start":78,"end":80,"id":9},{"text":"Collaboration","start":81,"end":94,"id":10},{"text":"initiatives","start":95,"end":106,"id":11},{"text":".","start":106,"end":107,"id":12}]} {"text":"Tested WAF rules against Lateral Movement payloads.","spans":[{"start":25,"end":41,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5},{"start":25,"end":41,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":39129764,"_task_hash":-579686330,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Lateral","start":25,"end":32,"id":4},{"text":"Movement","start":33,"end":41,"id":5},{"text":"payloads","start":42,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"DB Administrator experienced in detecting phishing attacks using CrowdStrike.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":65,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1649511803,"_task_hash":-596436536,"tokens":[{"text":"DB","start":0,"end":2,"id":0},{"text":"Administrator","start":3,"end":16,"id":1},{"text":"experienced","start":17,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"detecting","start":32,"end":41,"id":4},{"text":"phishing","start":42,"end":50,"id":5},{"text":"attacks","start":51,"end":58,"id":6},{"text":"using","start":59,"end":64,"id":7},{"text":"CrowdStrike","start":65,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} {"text":"Project Manager professional with 3++ years implementing SIEM and managing SoC programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":75,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1833421030,"_task_hash":1093746730,"tokens":[{"text":"Project","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3++","start":34,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"SIEM","start":57,"end":61,"id":7},{"text":"and","start":62,"end":65,"id":8},{"text":"managing","start":66,"end":74,"id":9},{"text":"SoC","start":75,"end":78,"id":10},{"text":"programs","start":79,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} {"text":"Emergency Response Manager experienced in detecting adware attacks using Nessus.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":73,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-387394820,"_task_hash":-445982435,"tokens":[{"text":"Emergency","start":0,"end":9,"id":0},{"text":"Response","start":10,"end":18,"id":1},{"text":"Manager","start":19,"end":26,"id":2},{"text":"experienced","start":27,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"detecting","start":42,"end":51,"id":5},{"text":"adware","start":52,"end":58,"id":6},{"text":"attacks","start":59,"end":66,"id":7},{"text":"using","start":67,"end":72,"id":8},{"text":"Nessus","start":73,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Cloud Security Architect with 10 years experience in Log Analysis, R, and Claims Management.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":67,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":74,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-16140070,"_task_hash":486565712,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Architect","start":15,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"10","start":30,"end":32,"id":4},{"text":"years","start":33,"end":38,"id":5},{"text":"experience","start":39,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Log","start":53,"end":56,"id":8},{"text":"Analysis","start":57,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"R","start":67,"end":68,"id":11},{"text":",","start":68,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Claims","start":74,"end":80,"id":14},{"text":"Management","start":81,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} {"text":"Certified VR/AR working as Mobile Engineer, focused on Database Security and XSS prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":55,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":77,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":211415846,"_task_hash":647286112,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"VR","start":10,"end":12,"id":1},{"text":"/","start":12,"end":13,"id":2},{"text":"AR","start":13,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Mobile","start":27,"end":33,"id":6},{"text":"Engineer","start":34,"end":42,"id":7},{"text":",","start":42,"end":43,"id":8},{"text":"focused","start":44,"end":51,"id":9},{"text":"on","start":52,"end":54,"id":10},{"text":"Database","start":55,"end":63,"id":11},{"text":"Security","start":64,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"XSS","start":77,"end":80,"id":14},{"text":"prevention","start":81,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} {"text":"Assessed third-party vendors for ECPA compliance.","spans":[{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1606760543,"_task_hash":-1704187599,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"ECPA","start":33,"end":37,"id":6},{"text":"compliance","start":38,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"Cybersecurity Threat Hunter experienced in detecting phishing attacks using EDR Platforms.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-867563363,"_task_hash":443453182,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Threat","start":14,"end":20,"id":1},{"text":"Hunter","start":21,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"phishing","start":53,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"EDR","start":76,"end":79,"id":9},{"text":"Platforms","start":80,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"PCI-DSS familiarity needed.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1912092747,"_task_hash":981602091,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"familiarity","start":8,"end":19,"id":3},{"text":"needed","start":20,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Developed CCPA policies and procedures.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1999798355,"_task_hash":-6871183,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"CCPA","start":10,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"procedures","start":28,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Implemented NDR solution for enterprise security monitoring.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2076123165,"_task_hash":-2064865310,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NDR","start":12,"end":15,"id":1},{"text":"solution","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"security","start":40,"end":48,"id":5},{"text":"monitoring","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"ML Platform Engineer opportunity: Lead Aqua Security program, implement NIST Framework, manage Cloud Migration operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":72,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":95,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1596339586,"_task_hash":488521225,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Platform","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"Aqua","start":39,"end":43,"id":6},{"text":"Security","start":44,"end":52,"id":7},{"text":"program","start":53,"end":60,"id":8},{"text":",","start":60,"end":61,"id":9},{"text":"implement","start":62,"end":71,"id":10},{"text":"NIST","start":72,"end":76,"id":11},{"text":"Framework","start":77,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"Cloud","start":95,"end":100,"id":15},{"text":"Migration","start":101,"end":110,"id":16},{"text":"operations","start":111,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} {"text":"Lead MLOps Engineer managing Network Scanning and iOS initiatives.","spans":[{"start":5,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":50,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":2001099414,"_task_hash":-1094204000,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"MLOps","start":5,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"managing","start":20,"end":28,"id":3},{"text":"Network","start":29,"end":36,"id":4},{"text":"Scanning","start":37,"end":45,"id":5},{"text":"and","start":46,"end":49,"id":6},{"text":"iOS","start":50,"end":53,"id":7},{"text":"initiatives","start":54,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"QA Engineer opportunity: Lead Security Testing program, implement OWASP Top 10, manage AI Regulation operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":78,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":87,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1953622260,"_task_hash":-1642875693,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Engineer","start":3,"end":11,"id":1},{"text":"opportunity","start":12,"end":23,"id":2},{"text":":","start":23,"end":24,"id":3},{"text":"Lead","start":25,"end":29,"id":4},{"text":"Security","start":30,"end":38,"id":5},{"text":"Testing","start":39,"end":46,"id":6},{"text":"program","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"implement","start":56,"end":65,"id":9},{"text":"OWASP","start":66,"end":71,"id":10},{"text":"Top","start":72,"end":75,"id":11},{"text":"10","start":76,"end":78,"id":12},{"text":",","start":78,"end":79,"id":13},{"text":"manage","start":80,"end":86,"id":14},{"text":"AI","start":87,"end":89,"id":15},{"text":"Regulation","start":90,"end":100,"id":16},{"text":"operations","start":101,"end":111,"id":17},{"text":".","start":111,"end":112,"id":18}]} {"text":"Coordinated with law enforcement on cryptominer case.","spans":[{"start":36,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1959802785,"_task_hash":947790864,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"cryptominer","start":36,"end":47,"id":5},{"text":"case","start":48,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Mentored junior engineers in Patch Management.","spans":[{"start":29,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1718216061,"_task_hash":-1114905470,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Patch","start":29,"end":34,"id":4},{"text":"Management","start":35,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Led HIPAA compliance program.","spans":[{"start":4,"end":9,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1127724628,"_task_hash":-190009003,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"HIPAA","start":4,"end":9,"id":1},{"text":"compliance","start":10,"end":20,"id":2},{"text":"program","start":21,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Briefed executives on drive-by download risks.","spans":[{"start":22,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1152724160,"_task_hash":979709853,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"drive","start":22,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"by","start":28,"end":30,"id":5},{"text":"download","start":31,"end":39,"id":6},{"text":"risks","start":40,"end":45,"id":7},{"text":".","start":45,"end":46,"id":8}]} {"text":"Certified TOGAF working as Insider Threat Specialist, focused on Security Patterns and Path Traversal prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":65,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":87,"end":101,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":671262086,"_task_hash":-101860997,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TOGAF","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Insider","start":27,"end":34,"id":4},{"text":"Threat","start":35,"end":41,"id":5},{"text":"Specialist","start":42,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"focused","start":54,"end":61,"id":8},{"text":"on","start":62,"end":64,"id":9},{"text":"Security","start":65,"end":73,"id":10},{"text":"Patterns","start":74,"end":82,"id":11},{"text":"and","start":83,"end":86,"id":12},{"text":"Path","start":87,"end":91,"id":13},{"text":"Traversal","start":92,"end":101,"id":14},{"text":"prevention","start":102,"end":112,"id":15},{"text":".","start":112,"end":113,"id":16}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Lead Big Data Engineer managing Awareness Programs and Dark Web Monitoring initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":784477787,"_task_hash":-2072040005,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Big","start":5,"end":8,"id":1},{"text":"Data","start":9,"end":13,"id":2},{"text":"Engineer","start":14,"end":22,"id":3},{"text":"managing","start":23,"end":31,"id":4},{"text":"Awareness","start":32,"end":41,"id":5},{"text":"Programs","start":42,"end":50,"id":6},{"text":"and","start":51,"end":54,"id":7},{"text":"Dark","start":55,"end":59,"id":8},{"text":"Web","start":60,"end":63,"id":9},{"text":"Monitoring","start":64,"end":74,"id":10},{"text":"initiatives","start":75,"end":86,"id":11},{"text":".","start":86,"end":87,"id":12}]} {"text":"Senior GRC Manager skilled in BCP/DR Planning, Technical Leadership, and Security Training.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":47,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":73,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1622741824,"_task_hash":2119618955,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"GRC","start":7,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"skilled","start":19,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"BCP","start":30,"end":33,"id":5},{"text":"/","start":33,"end":34,"id":6},{"text":"DR","start":34,"end":36,"id":7},{"text":"Planning","start":37,"end":45,"id":8},{"text":",","start":45,"end":46,"id":9},{"text":"Technical","start":47,"end":56,"id":10},{"text":"Leadership","start":57,"end":67,"id":11},{"text":",","start":67,"end":68,"id":12},{"text":"and","start":69,"end":72,"id":13},{"text":"Security","start":73,"end":81,"id":14},{"text":"Training","start":82,"end":90,"id":15},{"text":".","start":90,"end":91,"id":16}]} {"text":"Code Reviewer with expertise in NIST Framework compliance and Network Monitoring operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1840446746,"_task_hash":-848698732,"tokens":[{"text":"Code","start":0,"end":4,"id":0},{"text":"Reviewer","start":5,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Network","start":62,"end":69,"id":9},{"text":"Monitoring","start":70,"end":80,"id":10},{"text":"operations","start":81,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} {"text":"DORA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":757810043,"_task_hash":-723281915,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Senior Anti-Phishing Specialist skilled in Packet Analysis, Privacy Frameworks, and Service Mesh Security.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":43,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":60,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":84,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-658030376,"_task_hash":2138689841,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Anti","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"Phishing","start":12,"end":20,"id":3},{"text":"Specialist","start":21,"end":31,"id":4},{"text":"skilled","start":32,"end":39,"id":5},{"text":"in","start":40,"end":42,"id":6},{"text":"Packet","start":43,"end":49,"id":7},{"text":"Analysis","start":50,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"Privacy","start":60,"end":67,"id":10},{"text":"Frameworks","start":68,"end":78,"id":11},{"text":",","start":78,"end":79,"id":12},{"text":"and","start":80,"end":83,"id":13},{"text":"Service","start":84,"end":91,"id":14},{"text":"Mesh","start":92,"end":96,"id":15},{"text":"Security","start":97,"end":105,"id":16},{"text":".","start":105,"end":106,"id":17}]} {"text":"Holds MFA & SSO.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-292355214,"_task_hash":-664029969,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"MFA","start":6,"end":9,"id":1},{"text":"&","start":10,"end":11,"id":2},{"text":"SSO","start":12,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Must know SIEM, QRadar, and OWASP Top 10.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1657276668,"_task_hash":-615589961,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"QRadar","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":".","start":40,"end":41,"id":10}]} {"text":"Full\u2011Stack Developer with expertise in NIST Framework compliance and Architecture Design operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":316585620,"_task_hash":950942889,"tokens":[{"text":"Full\u2011Stack","start":0,"end":10,"id":0},{"text":"Developer","start":11,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"expertise","start":26,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"NIST","start":39,"end":43,"id":5},{"text":"Framework","start":44,"end":53,"id":6},{"text":"compliance","start":54,"end":64,"id":7},{"text":"and","start":65,"end":68,"id":8},{"text":"Architecture","start":69,"end":81,"id":9},{"text":"Design","start":82,"end":88,"id":10},{"text":"operations","start":89,"end":99,"id":11},{"text":".","start":99,"end":100,"id":12}]} {"text":"Holds STIX/TAXII certification.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1000322515,"_task_hash":-855492174,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":"certification","start":17,"end":30,"id":4},{"text":".","start":30,"end":31,"id":5}]} {"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and Technical Leadership operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":784981389,"_task_hash":-1885566748,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Technical","start":82,"end":91,"id":13},{"text":"Leadership","start":92,"end":102,"id":14},{"text":"operations","start":103,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} {"text":"Certified ETL working as Enterprise Risk Analyst, focused on Web App Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":82,"end":102,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1377424861,"_task_hash":-961801186,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ETL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Enterprise","start":25,"end":35,"id":4},{"text":"Risk","start":36,"end":40,"id":5},{"text":"Analyst","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Web","start":61,"end":64,"id":10},{"text":"App","start":65,"end":68,"id":11},{"text":"Security","start":69,"end":77,"id":12},{"text":"and","start":78,"end":81,"id":13},{"text":"Cross","start":82,"end":87,"id":14},{"text":"-","start":87,"end":88,"id":15},{"text":"Site","start":88,"end":92,"id":16},{"text":"Scripting","start":93,"end":102,"id":17},{"text":"prevention","start":103,"end":113,"id":18},{"text":".","start":113,"end":114,"id":19}]} {"text":"Facility Security Consultant professional with 5+ years implementing Wireshark and managing Computer Vision programs.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":69,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":810013112,"_task_hash":-756347082,"tokens":[{"text":"Facility","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Consultant","start":18,"end":28,"id":2},{"text":"professional","start":29,"end":41,"id":3},{"text":"with","start":42,"end":46,"id":4},{"text":"5","start":47,"end":48,"id":5},{"text":"+","start":48,"end":49,"id":6},{"text":"years","start":50,"end":55,"id":7},{"text":"implementing","start":56,"end":68,"id":8},{"text":"Wireshark","start":69,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"Computer","start":92,"end":100,"id":12},{"text":"Vision","start":101,"end":107,"id":13},{"text":"programs","start":108,"end":116,"id":14},{"text":".","start":116,"end":117,"id":15}]} {"text":"Must know ELK Stack, EDR Tools, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2063348789,"_task_hash":1329520009,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"ELK","start":10,"end":13,"id":2},{"text":"Stack","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"EDR","start":21,"end":24,"id":5},{"text":"Tools","start":25,"end":30,"id":6},{"text":",","start":30,"end":31,"id":7},{"text":"and","start":32,"end":35,"id":8},{"text":"NIST","start":36,"end":40,"id":9},{"text":"Framework","start":41,"end":50,"id":10},{"text":".","start":50,"end":51,"id":11}]} {"text":"Security Operations Manager with CISM certification, expert in Nessus.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":37,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":63,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":657142495,"_task_hash":-234782022,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"CISM","start":33,"end":37,"id":4},{"text":"certification","start":38,"end":51,"id":5},{"text":",","start":51,"end":52,"id":6},{"text":"expert","start":53,"end":59,"id":7},{"text":"in","start":60,"end":62,"id":8},{"text":"Nessus","start":63,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Endpoint Security Specialist with hands-on experience in QRadar, EDR Tools, and Security Awareness.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":65,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":80,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1378526787,"_task_hash":1279789220,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"QRadar","start":57,"end":63,"id":9},{"text":",","start":63,"end":64,"id":10},{"text":"EDR","start":65,"end":68,"id":11},{"text":"Tools","start":69,"end":74,"id":12},{"text":",","start":74,"end":75,"id":13},{"text":"and","start":76,"end":79,"id":14},{"text":"Security","start":80,"end":88,"id":15},{"text":"Awareness","start":89,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"Hiring Security Director for Penetration Testing and ransomware detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":63,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":670454477,"_task_hash":-2037509525,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Director","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"Penetration","start":29,"end":40,"id":4},{"text":"Testing","start":41,"end":48,"id":5},{"text":"and","start":49,"end":52,"id":6},{"text":"ransomware","start":53,"end":63,"id":7},{"text":"detection","start":64,"end":73,"id":8},{"text":".","start":73,"end":74,"id":9}]} {"text":"AI Ethics Specialist with expertise in NIST Framework compliance and Solution Frameworks operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-240303149,"_task_hash":1250505949,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Ethics","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"Solution","start":69,"end":77,"id":10},{"text":"Frameworks","start":78,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Immediate opening for Back-End Developer.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-284818503,"_task_hash":-2032280972,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Back","start":22,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"End","start":27,"end":30,"id":5},{"text":"Developer","start":31,"end":40,"id":6},{"text":".","start":40,"end":41,"id":7}]} {"text":"Simulated Path Traversal during red team exercise.","spans":[{"start":10,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2087878205,"_task_hash":-1570896848,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Path","start":10,"end":14,"id":1},{"text":"Traversal","start":15,"end":24,"id":2},{"text":"during","start":25,"end":31,"id":3},{"text":"red","start":32,"end":35,"id":4},{"text":"team","start":36,"end":40,"id":5},{"text":"exercise","start":41,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Admin with hands-on experience in CrowdStrike, EDR Tools, and Model Security.","spans":[{"start":0,"end":5,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":34,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":62,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":782128303,"_task_hash":-1292701544,"tokens":[{"text":"Admin","start":0,"end":5,"id":0},{"text":"with","start":6,"end":10,"id":1},{"text":"hands","start":11,"end":16,"id":2},{"text":"-","start":16,"end":17,"id":3},{"text":"on","start":17,"end":19,"id":4},{"text":"experience","start":20,"end":30,"id":5},{"text":"in","start":31,"end":33,"id":6},{"text":"CrowdStrike","start":34,"end":45,"id":7},{"text":",","start":45,"end":46,"id":8},{"text":"EDR","start":47,"end":50,"id":9},{"text":"Tools","start":51,"end":56,"id":10},{"text":",","start":56,"end":57,"id":11},{"text":"and","start":58,"end":61,"id":12},{"text":"Model","start":62,"end":67,"id":13},{"text":"Security","start":68,"end":76,"id":14},{"text":".","start":76,"end":77,"id":15}]} {"text":"iOS Developer role available: Data Leakage Prevention experience required, Security Integration knowledge essential.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":75,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1063417443,"_task_hash":-35970952,"tokens":[{"text":"iOS","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"role","start":14,"end":18,"id":2},{"text":"available","start":19,"end":28,"id":3},{"text":":","start":28,"end":29,"id":4},{"text":"Data","start":30,"end":34,"id":5},{"text":"Leakage","start":35,"end":42,"id":6},{"text":"Prevention","start":43,"end":53,"id":7},{"text":"experience","start":54,"end":64,"id":8},{"text":"required","start":65,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"Security","start":75,"end":83,"id":11},{"text":"Integration","start":84,"end":95,"id":12},{"text":"knowledge","start":96,"end":105,"id":13},{"text":"essential","start":106,"end":115,"id":14},{"text":".","start":115,"end":116,"id":15}]} {"text":"Required skills: ELK Stack, Android, SABSA certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":37,"end":42,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1954669909,"_task_hash":1060091812,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Android","start":28,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"SABSA","start":37,"end":42,"id":8},{"text":"certification","start":43,"end":56,"id":9},{"text":".","start":56,"end":57,"id":10}]} {"text":"Accomplished AI/ML Security Specialist specializing in Investigations and Web Application Security.","spans":[{"start":13,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":55,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":74,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1144111926,"_task_hash":-25479247,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"AI","start":13,"end":15,"id":1},{"text":"/","start":15,"end":16,"id":2},{"text":"ML","start":16,"end":18,"id":3},{"text":"Security","start":19,"end":27,"id":4},{"text":"Specialist","start":28,"end":38,"id":5},{"text":"specializing","start":39,"end":51,"id":6},{"text":"in","start":52,"end":54,"id":7},{"text":"Investigations","start":55,"end":69,"id":8},{"text":"and","start":70,"end":73,"id":9},{"text":"Web","start":74,"end":77,"id":10},{"text":"Application","start":78,"end":89,"id":11},{"text":"Security","start":90,"end":98,"id":12},{"text":".","start":98,"end":99,"id":13}]} {"text":"Exploited DCShadow vulnerability in web application.","spans":[{"start":10,"end":18,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1701011189,"_task_hash":429618012,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"DCShadow","start":10,"end":18,"id":1},{"text":"vulnerability","start":19,"end":32,"id":2},{"text":"in","start":33,"end":35,"id":3},{"text":"web","start":36,"end":39,"id":4},{"text":"application","start":40,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Azure Architect needed for enterprise security team.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-33316505,"_task_hash":1441826068,"tokens":[{"text":"Azure","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"needed","start":16,"end":22,"id":2},{"text":"for","start":23,"end":26,"id":3},{"text":"enterprise","start":27,"end":37,"id":4},{"text":"security","start":38,"end":46,"id":5},{"text":"team","start":47,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Experienced Security Training Coordinator specializing in Security.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1468999011,"_task_hash":1748301169,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Training","start":21,"end":29,"id":2},{"text":"Coordinator","start":30,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Security","start":58,"end":66,"id":6},{"text":".","start":66,"end":67,"id":7}]} {"text":"Required skills: Wireshark, Data Modeling, JIRA certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":28,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":43,"end":47,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-218014057,"_task_hash":1988567552,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Wireshark","start":17,"end":26,"id":3},{"text":",","start":26,"end":27,"id":4},{"text":"Data","start":28,"end":32,"id":5},{"text":"Modeling","start":33,"end":41,"id":6},{"text":",","start":41,"end":42,"id":7},{"text":"JIRA","start":43,"end":47,"id":8},{"text":"certification","start":48,"end":61,"id":9},{"text":".","start":61,"end":62,"id":10}]} {"text":"System Administrator with 3+ years experience in Sketch, Azure, and JIRA/ServiceNow.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":49,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":57,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":68,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":2146441926,"_task_hash":1057988777,"tokens":[{"text":"System","start":0,"end":6,"id":0},{"text":"Administrator","start":7,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"3","start":26,"end":27,"id":3},{"text":"+","start":27,"end":28,"id":4},{"text":"years","start":29,"end":34,"id":5},{"text":"experience","start":35,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"Sketch","start":49,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"Azure","start":57,"end":62,"id":10},{"text":",","start":62,"end":63,"id":11},{"text":"and","start":64,"end":67,"id":12},{"text":"JIRA","start":68,"end":72,"id":13},{"text":"/","start":72,"end":73,"id":14},{"text":"ServiceNow","start":73,"end":83,"id":15},{"text":".","start":83,"end":84,"id":16}]} {"text":"Tested systems for CVE-2023-20198 vulnerability.","spans":[{"start":19,"end":33,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":348743282,"_task_hash":1995063804,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"systems","start":7,"end":14,"id":1},{"text":"for","start":15,"end":18,"id":2},{"text":"CVE-2023","start":19,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"20198","start":28,"end":33,"id":5},{"text":"vulnerability","start":34,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Created YARA rules for Token Impersonation detection.","spans":[{"start":23,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1643296687,"_task_hash":-980975367,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Token","start":23,"end":28,"id":4},{"text":"Impersonation","start":29,"end":42,"id":5},{"text":"detection","start":43,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Hiring Applied Cryptography Specialist for Model Deployment and botnet detection.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":70,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-170596871,"_task_hash":-1618063258,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Applied","start":7,"end":14,"id":1},{"text":"Cryptography","start":15,"end":27,"id":2},{"text":"Specialist","start":28,"end":38,"id":3},{"text":"for","start":39,"end":42,"id":4},{"text":"Model","start":43,"end":48,"id":5},{"text":"Deployment","start":49,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"botnet","start":64,"end":70,"id":8},{"text":"detection","start":71,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Analyzed Credential Dumping samples in malware lab.","spans":[{"start":9,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-811177666,"_task_hash":-1759944682,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Credential","start":9,"end":19,"id":1},{"text":"Dumping","start":20,"end":27,"id":2},{"text":"samples","start":28,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"malware","start":39,"end":46,"id":5},{"text":"lab","start":47,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Senior Application Security Engineer skilled in Secure SDLC, Explainable AI, and Hardware Security Modules.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":81,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1272735473,"_task_hash":1262320162,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Application","start":7,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"skilled","start":37,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Secure","start":48,"end":54,"id":6},{"text":"SDLC","start":55,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Explainable","start":61,"end":72,"id":9},{"text":"AI","start":73,"end":75,"id":10},{"text":",","start":75,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Hardware","start":81,"end":89,"id":13},{"text":"Security","start":90,"end":98,"id":14},{"text":"Modules","start":99,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Developed detection for XSS attacks.","spans":[{"start":24,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1587761077,"_task_hash":213450109,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"XSS","start":24,"end":27,"id":3},{"text":"attacks","start":28,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Mentored junior engineers in Endpoint Security.","spans":[{"start":29,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1515855980,"_task_hash":279711246,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Endpoint","start":29,"end":37,"id":4},{"text":"Security","start":38,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Cyber Insurance Consultant professional with 10+ years implementing EDR Platforms and managing VMware programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":95,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":439777095,"_task_hash":-62577232,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Insurance","start":6,"end":15,"id":1},{"text":"Consultant","start":16,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"10","start":45,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"EDR","start":68,"end":71,"id":9},{"text":"Platforms","start":72,"end":81,"id":10},{"text":"and","start":82,"end":85,"id":11},{"text":"managing","start":86,"end":94,"id":12},{"text":"VMware","start":95,"end":101,"id":13},{"text":"programs","start":102,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} {"text":"Lead Game Programmer managing Playbook Development and Stakeholder Engagement initiatives.","spans":[{"start":5,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1387813716,"_task_hash":-1787575896,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Game","start":5,"end":9,"id":1},{"text":"Programmer","start":10,"end":20,"id":2},{"text":"managing","start":21,"end":29,"id":3},{"text":"Playbook","start":30,"end":38,"id":4},{"text":"Development","start":39,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Stakeholder","start":55,"end":66,"id":7},{"text":"Engagement","start":67,"end":77,"id":8},{"text":"initiatives","start":78,"end":89,"id":9},{"text":".","start":89,"end":90,"id":10}]} {"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"SAML certification a plus.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-339627073,"_task_hash":535182571,"tokens":[{"text":"SAML","start":0,"end":4,"id":0},{"text":"certification","start":5,"end":18,"id":1},{"text":"a","start":19,"end":20,"id":2},{"text":"plus","start":21,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Accomplished IT Solutions Architect specializing in API Design and Docker Security.","spans":[{"start":13,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":873794613,"_task_hash":696981781,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Solutions","start":16,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"API","start":52,"end":55,"id":6},{"text":"Design","start":56,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"Docker","start":67,"end":73,"id":9},{"text":"Security","start":74,"end":82,"id":10},{"text":".","start":82,"end":83,"id":11}]} {"text":"Test Engineer professional with 10++ years implementing Metasploit and managing Curriculum Design programs.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":80,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":690808446,"_task_hash":-1031676928,"tokens":[{"text":"Test","start":0,"end":4,"id":0},{"text":"Engineer","start":5,"end":13,"id":1},{"text":"professional","start":14,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"10++","start":32,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"implementing","start":43,"end":55,"id":6},{"text":"Metasploit","start":56,"end":66,"id":7},{"text":"and","start":67,"end":70,"id":8},{"text":"managing","start":71,"end":79,"id":9},{"text":"Curriculum","start":80,"end":90,"id":10},{"text":"Design","start":91,"end":97,"id":11},{"text":"programs","start":98,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} {"text":"Proficient in Burp Suite and Wireshark.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":74102493,"_task_hash":1528570037,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Wireshark","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Data Privacy Analyst opportunity: Lead AI Security program, implement NIST Framework, manage API Testing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":84,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":93,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":949601256,"_task_hash":-563169786,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Privacy","start":5,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"AI","start":39,"end":41,"id":6},{"text":"Security","start":42,"end":50,"id":7},{"text":"program","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"implement","start":60,"end":69,"id":10},{"text":"NIST","start":70,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":",","start":84,"end":85,"id":13},{"text":"manage","start":86,"end":92,"id":14},{"text":"API","start":93,"end":96,"id":15},{"text":"Testing","start":97,"end":104,"id":16},{"text":"operations","start":105,"end":115,"id":17},{"text":".","start":115,"end":116,"id":18}]} {"text":"Hiring Tech Support Specialist for Gamification and adware detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1170839991,"_task_hash":-87225851,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Tech","start":7,"end":11,"id":1},{"text":"Support","start":12,"end":19,"id":2},{"text":"Specialist","start":20,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Gamification","start":35,"end":47,"id":5},{"text":"and","start":48,"end":51,"id":6},{"text":"adware","start":52,"end":58,"id":7},{"text":"detection","start":59,"end":68,"id":8},{"text":".","start":68,"end":69,"id":9}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Proficient in Nessus and Wireshark.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":659279639,"_task_hash":400504924,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Wireshark","start":25,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} {"text":"Experienced Game Programmer specializing in Runtime Security.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1116553489,"_task_hash":474634082,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Game","start":12,"end":16,"id":1},{"text":"Programmer","start":17,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Runtime","start":44,"end":51,"id":5},{"text":"Security","start":52,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Release Manager professional with 3++ years implementing Nessus and managing Social Engineering programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":77,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-15654639,"_task_hash":-470669447,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3++","start":34,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"Nessus","start":57,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"managing","start":68,"end":76,"id":9},{"text":"Social","start":77,"end":83,"id":10},{"text":"Engineering","start":84,"end":95,"id":11},{"text":"programs","start":96,"end":104,"id":12},{"text":".","start":104,"end":105,"id":13}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"We need a Service Desk Analyst skilled in Password Spraying prevention and phishing analysis using Wireshark.","spans":[{"start":10,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":42,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":75,"end":83,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":99,"end":108,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-477251702,"_task_hash":-1625757132,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Service","start":10,"end":17,"id":3},{"text":"Desk","start":18,"end":22,"id":4},{"text":"Analyst","start":23,"end":30,"id":5},{"text":"skilled","start":31,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"Password","start":42,"end":50,"id":8},{"text":"Spraying","start":51,"end":59,"id":9},{"text":"prevention","start":60,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"phishing","start":75,"end":83,"id":12},{"text":"analysis","start":84,"end":92,"id":13},{"text":"using","start":93,"end":98,"id":14},{"text":"Wireshark","start":99,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"AI Governance Specialist with 5+ years experience in Solution Modeling, Performance Testing, and AI Regulation.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":70,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":72,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":97,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-562400532,"_task_hash":-490520696,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Governance","start":3,"end":13,"id":1},{"text":"Specialist","start":14,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"5","start":30,"end":31,"id":4},{"text":"+","start":31,"end":32,"id":5},{"text":"years","start":33,"end":38,"id":6},{"text":"experience","start":39,"end":49,"id":7},{"text":"in","start":50,"end":52,"id":8},{"text":"Solution","start":53,"end":61,"id":9},{"text":"Modeling","start":62,"end":70,"id":10},{"text":",","start":70,"end":71,"id":11},{"text":"Performance","start":72,"end":83,"id":12},{"text":"Testing","start":84,"end":91,"id":13},{"text":",","start":91,"end":92,"id":14},{"text":"and","start":93,"end":96,"id":15},{"text":"AI","start":97,"end":99,"id":16},{"text":"Regulation","start":100,"end":110,"id":17},{"text":".","start":110,"end":111,"id":18}]} {"text":"Lead ML Infrastructure Engineer managing Multiplayer Networking and Privacy in AI initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":68,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1883114233,"_task_hash":1120422593,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"ML","start":5,"end":7,"id":1},{"text":"Infrastructure","start":8,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Multiplayer","start":41,"end":52,"id":5},{"text":"Networking","start":53,"end":63,"id":6},{"text":"and","start":64,"end":67,"id":7},{"text":"Privacy","start":68,"end":75,"id":8},{"text":"in","start":76,"end":78,"id":9},{"text":"AI","start":79,"end":81,"id":10},{"text":"initiatives","start":82,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} {"text":"Presented Reverse Engineering updates to leadership.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":331708516,"_task_hash":-176519993,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Reverse","start":10,"end":17,"id":1},{"text":"Engineering","start":18,"end":29,"id":2},{"text":"updates","start":30,"end":37,"id":3},{"text":"to","start":38,"end":40,"id":4},{"text":"leadership","start":41,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Blue Team Operator with expertise in NIST Framework compliance and Incident Management Tools operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":2010510509,"_task_hash":1941262224,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Operator","start":10,"end":18,"id":2},{"text":"with","start":19,"end":23,"id":3},{"text":"expertise","start":24,"end":33,"id":4},{"text":"in","start":34,"end":36,"id":5},{"text":"NIST","start":37,"end":41,"id":6},{"text":"Framework","start":42,"end":51,"id":7},{"text":"compliance","start":52,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"Incident","start":67,"end":75,"id":10},{"text":"Management","start":76,"end":86,"id":11},{"text":"Tools","start":87,"end":92,"id":12},{"text":"operations","start":93,"end":103,"id":13},{"text":".","start":103,"end":104,"id":14}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"We need a AI Ethics Specialist skilled in Buffer Overflow prevention and spyware analysis using SIEM.","spans":[{"start":10,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":42,"end":57,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":80,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":96,"end":100,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1755577598,"_task_hash":1064182563,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"AI","start":10,"end":12,"id":3},{"text":"Ethics","start":13,"end":19,"id":4},{"text":"Specialist","start":20,"end":30,"id":5},{"text":"skilled","start":31,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"Buffer","start":42,"end":48,"id":8},{"text":"Overflow","start":49,"end":57,"id":9},{"text":"prevention","start":58,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"spyware","start":73,"end":80,"id":12},{"text":"analysis","start":81,"end":89,"id":13},{"text":"using","start":90,"end":95,"id":14},{"text":"SIEM","start":96,"end":100,"id":15},{"text":".","start":100,"end":101,"id":16}]} {"text":"Managed PCI-DSS certification process.","spans":[{"start":8,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1549268507,"_task_hash":-176798335,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"PCI","start":8,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"DSS","start":12,"end":15,"id":3},{"text":"certification","start":16,"end":29,"id":4},{"text":"process","start":30,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"Briefed executives on trojan risks.","spans":[{"start":22,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-635719992,"_task_hash":941369654,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"trojan","start":22,"end":28,"id":3},{"text":"risks","start":29,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Accomplished Security Training Specialist specializing in Regulatory Frameworks and Security Policies.","spans":[{"start":13,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":84,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1529767170,"_task_hash":985456719,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Training","start":22,"end":30,"id":2},{"text":"Specialist","start":31,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Regulatory","start":58,"end":68,"id":6},{"text":"Frameworks","start":69,"end":79,"id":7},{"text":"and","start":80,"end":83,"id":8},{"text":"Security","start":84,"end":92,"id":9},{"text":"Policies","start":93,"end":101,"id":10},{"text":".","start":101,"end":102,"id":11}]} {"text":"Must know SIEM Operations, SIEM Operations, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":42,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":48,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-505125661,"_task_hash":1942746127,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"SIEM","start":27,"end":31,"id":5},{"text":"Operations","start":32,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"and","start":44,"end":47,"id":8},{"text":"OWASP","start":48,"end":53,"id":9},{"text":"Top","start":54,"end":57,"id":10},{"text":"10","start":58,"end":60,"id":11},{"text":".","start":60,"end":61,"id":12}]} {"text":"Recovered systems after DDoS attack.","spans":[{"start":24,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2092674159,"_task_hash":-477071454,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"DDoS","start":24,"end":28,"id":3},{"text":"attack","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Trained developers on Process Hollowing prevention.","spans":[{"start":22,"end":39,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2009977562,"_task_hash":-396252980,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Process","start":22,"end":29,"id":3},{"text":"Hollowing","start":30,"end":39,"id":4},{"text":"prevention","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Recovered systems after watering hole attack.","spans":[{"start":24,"end":37,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-871673612,"_task_hash":112749668,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"watering","start":24,"end":32,"id":3},{"text":"hole","start":33,"end":37,"id":4},{"text":"attack","start":38,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Developed playbooks for business email compromise response.","spans":[{"start":24,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1383467899,"_task_hash":-1001964656,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"business","start":24,"end":32,"id":3},{"text":"email","start":33,"end":38,"id":4},{"text":"compromise","start":39,"end":49,"id":5},{"text":"response","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Must have Burp Suite experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-579291119,"_task_hash":-2099350353,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":"experience","start":21,"end":31,"id":4},{"text":"and","start":32,"end":35,"id":5},{"text":"OWASP","start":36,"end":41,"id":6},{"text":"Top","start":42,"end":45,"id":7},{"text":"10","start":46,"end":48,"id":8},{"text":"knowledge","start":49,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"HIPAA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370665845,"_task_hash":-1113010267,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Senior Backend Engineer skilled in Architecture Design, Zero Trust Architecture, and Network Security.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":35,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":85,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-720215196,"_task_hash":1437671043,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Backend","start":7,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"skilled","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"Architecture","start":35,"end":47,"id":5},{"text":"Design","start":48,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"Zero","start":56,"end":60,"id":8},{"text":"Trust","start":61,"end":66,"id":9},{"text":"Architecture","start":67,"end":79,"id":10},{"text":",","start":79,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Network","start":85,"end":92,"id":13},{"text":"Security","start":93,"end":101,"id":14},{"text":".","start":101,"end":102,"id":15}]} {"text":"GRC Manager opportunity: Lead Security Patterns program, implement OWASP Top 10, manage Monitoring Tools operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":79,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1454406276,"_task_hash":513921843,"tokens":[{"text":"GRC","start":0,"end":3,"id":0},{"text":"Manager","start":4,"end":11,"id":1},{"text":"opportunity","start":12,"end":23,"id":2},{"text":":","start":23,"end":24,"id":3},{"text":"Lead","start":25,"end":29,"id":4},{"text":"Security","start":30,"end":38,"id":5},{"text":"Patterns","start":39,"end":47,"id":6},{"text":"program","start":48,"end":55,"id":7},{"text":",","start":55,"end":56,"id":8},{"text":"implement","start":57,"end":66,"id":9},{"text":"OWASP","start":67,"end":72,"id":10},{"text":"Top","start":73,"end":76,"id":11},{"text":"10","start":77,"end":79,"id":12},{"text":",","start":79,"end":80,"id":13},{"text":"manage","start":81,"end":87,"id":14},{"text":"Monitoring","start":88,"end":98,"id":15},{"text":"Tools","start":99,"end":104,"id":16},{"text":"operations","start":105,"end":115,"id":17},{"text":".","start":115,"end":116,"id":18}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Developed detection for Remote Code Execution attacks.","spans":[{"start":24,"end":45,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2033836009,"_task_hash":700009077,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Remote","start":24,"end":30,"id":3},{"text":"Code","start":31,"end":35,"id":4},{"text":"Execution","start":36,"end":45,"id":5},{"text":"attacks","start":46,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Must have Metasploit experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1432922912,"_task_hash":873180234,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"OWASP","start":36,"end":41,"id":5},{"text":"Top","start":42,"end":45,"id":6},{"text":"10","start":46,"end":48,"id":7},{"text":"knowledge","start":49,"end":58,"id":8},{"text":".","start":58,"end":59,"id":9}]} {"text":"Must know SIEM, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":31,"end":43,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-756117656,"_task_hash":198163040,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Wireshark","start":16,"end":25,"id":4},{"text":",","start":25,"end":26,"id":5},{"text":"and","start":27,"end":30,"id":6},{"text":"OWASP","start":31,"end":36,"id":7},{"text":"Top","start":37,"end":40,"id":8},{"text":"10","start":41,"end":43,"id":9},{"text":".","start":43,"end":44,"id":10}]} {"text":"Senior Compliance Officer skilled in Log Analysis, Data Governance, and Security Patterns.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":72,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2078451862,"_task_hash":1844235398,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Compliance","start":7,"end":17,"id":1},{"text":"Officer","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Log","start":37,"end":40,"id":5},{"text":"Analysis","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Data","start":51,"end":55,"id":8},{"text":"Governance","start":56,"end":66,"id":9},{"text":",","start":66,"end":67,"id":10},{"text":"and","start":68,"end":71,"id":11},{"text":"Security","start":72,"end":80,"id":12},{"text":"Patterns","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} {"text":"We need a DevOps Specialist skilled in XXE prevention and spyware analysis using Nessus.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":39,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":58,"end":65,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":81,"end":87,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-2141627285,"_task_hash":1782367803,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"DevOps","start":10,"end":16,"id":3},{"text":"Specialist","start":17,"end":27,"id":4},{"text":"skilled","start":28,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"XXE","start":39,"end":42,"id":7},{"text":"prevention","start":43,"end":53,"id":8},{"text":"and","start":54,"end":57,"id":9},{"text":"spyware","start":58,"end":65,"id":10},{"text":"analysis","start":66,"end":74,"id":11},{"text":"using","start":75,"end":80,"id":12},{"text":"Nessus","start":81,"end":87,"id":13},{"text":".","start":87,"end":88,"id":14}]} {"text":"Exploited Session Hijacking vulnerability in web application.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-498343467,"_task_hash":-230204551,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Session","start":10,"end":17,"id":1},{"text":"Hijacking","start":18,"end":27,"id":2},{"text":"vulnerability","start":28,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"web","start":45,"end":48,"id":5},{"text":"application","start":49,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Reported FERPA compliance status to board.","spans":[{"start":9,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1073167997,"_task_hash":-863850791,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"FERPA","start":9,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"status","start":26,"end":32,"id":3},{"text":"to","start":33,"end":35,"id":4},{"text":"board","start":36,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"EDR Specialist professional with 5+ years implementing Splunk and managing Accessibility programs.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":55,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":75,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1471620097,"_task_hash":-677165418,"tokens":[{"text":"EDR","start":0,"end":3,"id":0},{"text":"Specialist","start":4,"end":14,"id":1},{"text":"professional","start":15,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"5","start":33,"end":34,"id":4},{"text":"+","start":34,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"implementing","start":42,"end":54,"id":7},{"text":"Splunk","start":55,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"managing","start":66,"end":74,"id":10},{"text":"Accessibility","start":75,"end":88,"id":11},{"text":"programs","start":89,"end":97,"id":12},{"text":".","start":97,"end":98,"id":13}]} {"text":"Managed Remediation Plan across multiple business units.","spans":[{"start":8,"end":24,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":705702088,"_task_hash":1081575372,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"Remediation","start":8,"end":19,"id":1},{"text":"Plan","start":20,"end":24,"id":2},{"text":"across","start":25,"end":31,"id":3},{"text":"multiple","start":32,"end":40,"id":4},{"text":"business","start":41,"end":49,"id":5},{"text":"units","start":50,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Holds LDAP.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1805087655,"_task_hash":149409793,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"LDAP","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Led Mobile Security initiatives across organization.","spans":[{"start":4,"end":19,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":717840531,"_task_hash":1277978683,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Mobile","start":4,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"initiatives","start":20,"end":31,"id":3},{"text":"across","start":32,"end":38,"id":4},{"text":"organization","start":39,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Product Security Engineer professional with 5+ years implementing SIEM Operations and managing Python Scripting programs.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":66,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":95,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":342736617,"_task_hash":-568718969,"tokens":[{"text":"Product","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"professional","start":26,"end":38,"id":3},{"text":"with","start":39,"end":43,"id":4},{"text":"5","start":44,"end":45,"id":5},{"text":"+","start":45,"end":46,"id":6},{"text":"years","start":47,"end":52,"id":7},{"text":"implementing","start":53,"end":65,"id":8},{"text":"SIEM","start":66,"end":70,"id":9},{"text":"Operations","start":71,"end":81,"id":10},{"text":"and","start":82,"end":85,"id":11},{"text":"managing","start":86,"end":94,"id":12},{"text":"Python","start":95,"end":101,"id":13},{"text":"Scripting","start":102,"end":111,"id":14},{"text":"programs","start":112,"end":120,"id":15},{"text":".","start":120,"end":121,"id":16}]} {"text":"Experienced Enterprise Security Architect specializing in Cybersecurity.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1498873686,"_task_hash":-530723900,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Enterprise","start":12,"end":22,"id":1},{"text":"Security","start":23,"end":31,"id":2},{"text":"Architect","start":32,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Cybersecurity","start":58,"end":71,"id":6},{"text":".","start":71,"end":72,"id":7}]} {"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} {"text":"DevSecOps Engineer with CompTIA Security+ certification, expert in Nessus.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":41,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":67,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-541519328,"_task_hash":2110007035,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CompTIA","start":24,"end":31,"id":3},{"text":"Security+","start":32,"end":41,"id":4},{"text":"certification","start":42,"end":55,"id":5},{"text":",","start":55,"end":56,"id":6},{"text":"expert","start":57,"end":63,"id":7},{"text":"in","start":64,"end":66,"id":8},{"text":"Nessus","start":67,"end":73,"id":9},{"text":".","start":73,"end":74,"id":10}]} {"text":"Analyzed CVE-2022-41040 exploit chain and mitigations.","spans":[{"start":9,"end":23,"label":"CVE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":279977195,"_task_hash":-1155305137,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"CVE-2022","start":9,"end":17,"id":1},{"text":"-","start":17,"end":18,"id":2},{"text":"41040","start":18,"end":23,"id":3},{"text":"exploit","start":24,"end":31,"id":4},{"text":"chain","start":32,"end":37,"id":5},{"text":"and","start":38,"end":41,"id":6},{"text":"mitigations","start":42,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"DevSecOps Engineer with CEH certification, expert in SentinelOne.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2121093034,"_task_hash":1302145840,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CEH","start":24,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"SentinelOne","start":53,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"iOS Developer with 3+ years experience in Cisco, Azure, and Palo Alto Networks.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":49,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":60,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":303243916,"_task_hash":-1272164453,"tokens":[{"text":"iOS","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"3","start":19,"end":20,"id":3},{"text":"+","start":20,"end":21,"id":4},{"text":"years","start":22,"end":27,"id":5},{"text":"experience","start":28,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"Cisco","start":42,"end":47,"id":8},{"text":",","start":47,"end":48,"id":9},{"text":"Azure","start":49,"end":54,"id":10},{"text":",","start":54,"end":55,"id":11},{"text":"and","start":56,"end":59,"id":12},{"text":"Palo","start":60,"end":64,"id":13},{"text":"Alto","start":65,"end":69,"id":14},{"text":"Networks","start":70,"end":78,"id":15},{"text":".","start":78,"end":79,"id":16}]} {"text":"Seeking Cloud Security Architect with 7+ years experience in Email Marketing and Device Management.","spans":[{"start":8,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":541978004,"_task_hash":-371266128,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Cloud","start":8,"end":13,"id":1},{"text":"Security","start":14,"end":22,"id":2},{"text":"Architect","start":23,"end":32,"id":3},{"text":"with","start":33,"end":37,"id":4},{"text":"7","start":38,"end":39,"id":5},{"text":"+","start":39,"end":40,"id":6},{"text":"years","start":41,"end":46,"id":7},{"text":"experience","start":47,"end":57,"id":8},{"text":"in","start":58,"end":60,"id":9},{"text":"Email","start":61,"end":66,"id":10},{"text":"Marketing","start":67,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Device","start":81,"end":87,"id":13},{"text":"Management","start":88,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Application Security Engineer with GCIH certification, expert in Nmap.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":39,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":65,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-109360202,"_task_hash":381396625,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"GCIH","start":35,"end":39,"id":4},{"text":"certification","start":40,"end":53,"id":5},{"text":",","start":53,"end":54,"id":6},{"text":"expert","start":55,"end":61,"id":7},{"text":"in","start":62,"end":64,"id":8},{"text":"Nmap","start":65,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"SOC 2 required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-777344063,"_task_hash":-1318550929,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"required","start":6,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Presented Red Team updates to leadership.","spans":[{"start":10,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2089210710,"_task_hash":-1108615913,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Red","start":10,"end":13,"id":1},{"text":"Team","start":14,"end":18,"id":2},{"text":"updates","start":19,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"leadership","start":30,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"ITIL certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":227445275,"_task_hash":-739125937,"tokens":[{"text":"ITIL","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Enterprise Cloud Architect with expertise in OWASP Top 10 compliance and Digital Forensics operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":73,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1116201797,"_task_hash":-2036307767,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"expertise","start":32,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"OWASP","start":45,"end":50,"id":6},{"text":"Top","start":51,"end":54,"id":7},{"text":"10","start":55,"end":57,"id":8},{"text":"compliance","start":58,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"Digital","start":73,"end":80,"id":11},{"text":"Forensics","start":81,"end":90,"id":12},{"text":"operations","start":91,"end":101,"id":13},{"text":".","start":101,"end":102,"id":14}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Lead Content Creator managing Qualys and Insider Threat Programs initiatives.","spans":[{"start":5,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-938014590,"_task_hash":-465250893,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Content","start":5,"end":12,"id":1},{"text":"Creator","start":13,"end":20,"id":2},{"text":"managing","start":21,"end":29,"id":3},{"text":"Qualys","start":30,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Insider","start":41,"end":48,"id":6},{"text":"Threat","start":49,"end":55,"id":7},{"text":"Programs","start":56,"end":64,"id":8},{"text":"initiatives","start":65,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Detected business email compromise activity using behavioral analytics.","spans":[{"start":9,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-899618315,"_task_hash":1256692589,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"business","start":9,"end":17,"id":1},{"text":"email","start":18,"end":23,"id":2},{"text":"compromise","start":24,"end":34,"id":3},{"text":"activity","start":35,"end":43,"id":4},{"text":"using","start":44,"end":49,"id":5},{"text":"behavioral","start":50,"end":60,"id":6},{"text":"analytics","start":61,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Cybersecurity Analyst experienced in detecting adware attacks using Wireshark.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":996495949,"_task_hash":1603530611,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Analyst","start":14,"end":21,"id":1},{"text":"experienced","start":22,"end":33,"id":2},{"text":"in","start":34,"end":36,"id":3},{"text":"detecting","start":37,"end":46,"id":4},{"text":"adware","start":47,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"Wireshark","start":68,"end":77,"id":8},{"text":".","start":77,"end":78,"id":9}]} {"text":"SPF/DKIM/DMARC certified.","spans":[{"start":0,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1109510584,"_task_hash":-1427205232,"tokens":[{"text":"SPF","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DKIM","start":4,"end":8,"id":2},{"text":"/","start":8,"end":9,"id":3},{"text":"DMARC","start":9,"end":14,"id":4},{"text":"certified","start":15,"end":24,"id":5},{"text":".","start":24,"end":25,"id":6}]} {"text":"Tracked trojan group activities and TTPs.","spans":[{"start":8,"end":14,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1531227238,"_task_hash":-739709385,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"trojan","start":8,"end":14,"id":1},{"text":"group","start":15,"end":20,"id":2},{"text":"activities","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"TTPs","start":36,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"AI UX certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":651451037,"_task_hash":-1130344377,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certification","start":6,"end":19,"id":2},{"text":"a","start":20,"end":21,"id":3},{"text":"plus","start":22,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Holds ISO 22301.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-874997629,"_task_hash":1166180082,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"22301","start":10,"end":15,"id":2},{"text":".","start":15,"end":16,"id":3}]} {"text":"IT GRC Specialist with hands-on experience in CrowdStrike, Splunk, and Network Security.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":59,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":71,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-2051862315,"_task_hash":-251553806,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"GRC","start":3,"end":6,"id":1},{"text":"Specialist","start":7,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"hands","start":23,"end":28,"id":4},{"text":"-","start":28,"end":29,"id":5},{"text":"on","start":29,"end":31,"id":6},{"text":"experience","start":32,"end":42,"id":7},{"text":"in","start":43,"end":45,"id":8},{"text":"CrowdStrike","start":46,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"Splunk","start":59,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Network","start":71,"end":78,"id":14},{"text":"Security","start":79,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"Social Engineering Consultant experienced in detecting DDoS attacks using Burp Suite.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":987155110,"_task_hash":-899224966,"tokens":[{"text":"Social","start":0,"end":6,"id":0},{"text":"Engineering","start":7,"end":18,"id":1},{"text":"Consultant","start":19,"end":29,"id":2},{"text":"experienced","start":30,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"detecting","start":45,"end":54,"id":5},{"text":"DDoS","start":55,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"Burp","start":74,"end":78,"id":9},{"text":"Suite","start":79,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} {"text":"Holds OSINT certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1710785194,"_task_hash":-1379140320,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSINT","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Mitigated Silver Ticket through code remediation.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1372955560,"_task_hash":2047676498,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Silver","start":10,"end":16,"id":1},{"text":"Ticket","start":17,"end":23,"id":2},{"text":"through","start":24,"end":31,"id":3},{"text":"code","start":32,"end":36,"id":4},{"text":"remediation","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Implemented Endpoint Security controls and monitoring.","spans":[{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1841722321,"_task_hash":-73678899,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Endpoint","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"controls","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"monitoring","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"We need a Information Specialist skilled in Buffer Overflow prevention and worm analysis using Metasploit.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":44,"end":59,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":75,"end":79,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":95,"end":105,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":459425920,"_task_hash":1006494388,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Information","start":10,"end":21,"id":3},{"text":"Specialist","start":22,"end":32,"id":4},{"text":"skilled","start":33,"end":40,"id":5},{"text":"in","start":41,"end":43,"id":6},{"text":"Buffer","start":44,"end":50,"id":7},{"text":"Overflow","start":51,"end":59,"id":8},{"text":"prevention","start":60,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"worm","start":75,"end":79,"id":11},{"text":"analysis","start":80,"end":88,"id":12},{"text":"using","start":89,"end":94,"id":13},{"text":"Metasploit","start":95,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} {"text":"Tested effectiveness of ISO 27001 A.11.1 controls.","spans":[{"start":24,"end":40,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":353566500,"_task_hash":-1562831352,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"effectiveness","start":7,"end":20,"id":1},{"text":"of","start":21,"end":23,"id":2},{"text":"ISO","start":24,"end":27,"id":3},{"text":"27001","start":28,"end":33,"id":4},{"text":"A.11.1","start":34,"end":40,"id":5},{"text":"controls","start":41,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Full\u2011Stack Developer with hands-on experience in ELK Stack, Burp Suite, and Security Strategy.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":49,"end":58,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":60,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":76,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":931395584,"_task_hash":1391900415,"tokens":[{"text":"Full\u2011Stack","start":0,"end":10,"id":0},{"text":"Developer","start":11,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"hands","start":26,"end":31,"id":3},{"text":"-","start":31,"end":32,"id":4},{"text":"on","start":32,"end":34,"id":5},{"text":"experience","start":35,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"ELK","start":49,"end":52,"id":8},{"text":"Stack","start":53,"end":58,"id":9},{"text":",","start":58,"end":59,"id":10},{"text":"Burp","start":60,"end":64,"id":11},{"text":"Suite","start":65,"end":70,"id":12},{"text":",","start":70,"end":71,"id":13},{"text":"and","start":72,"end":75,"id":14},{"text":"Security","start":76,"end":84,"id":15},{"text":"Strategy","start":85,"end":93,"id":16},{"text":".","start":93,"end":94,"id":17}]} {"text":"Detected DNS Hijacking attack in production environment.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1649813538,"_task_hash":1595274083,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"DNS","start":9,"end":12,"id":1},{"text":"Hijacking","start":13,"end":22,"id":2},{"text":"attack","start":23,"end":29,"id":3},{"text":"in","start":30,"end":32,"id":4},{"text":"production","start":33,"end":43,"id":5},{"text":"environment","start":44,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Cyberpunk Hacker needed for enterprise security team.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1336815964,"_task_hash":1441085909,"tokens":[{"text":"Cyberpunk","start":0,"end":9,"id":0},{"text":"Hacker","start":10,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"enterprise","start":28,"end":38,"id":4},{"text":"security","start":39,"end":47,"id":5},{"text":"team","start":48,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Published research on Purple Team trends.","spans":[{"start":22,"end":33,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1371697314,"_task_hash":1861450864,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Purple","start":22,"end":28,"id":3},{"text":"Team","start":29,"end":33,"id":4},{"text":"trends","start":34,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Developed GLBA policies and procedures.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":622449168,"_task_hash":267590375,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"GLBA","start":10,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"procedures","start":28,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Privacy Officer role available: Remote Support Tools experience required, Database Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":74,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1734485722,"_task_hash":1457814816,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Officer","start":8,"end":15,"id":1},{"text":"role","start":16,"end":20,"id":2},{"text":"available","start":21,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"Remote","start":32,"end":38,"id":5},{"text":"Support","start":39,"end":46,"id":6},{"text":"Tools","start":47,"end":52,"id":7},{"text":"experience","start":53,"end":63,"id":8},{"text":"required","start":64,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Database","start":74,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":"knowledge","start":92,"end":101,"id":13},{"text":"essential","start":102,"end":111,"id":14},{"text":".","start":111,"end":112,"id":15}]} {"text":"Implemented controls to prevent nation-state actor attacks.","spans":[{"start":32,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2109803191,"_task_hash":448405165,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"nation","start":32,"end":38,"id":4},{"text":"-","start":38,"end":39,"id":5},{"text":"state","start":39,"end":44,"id":6},{"text":"actor","start":45,"end":50,"id":7},{"text":"attacks","start":51,"end":58,"id":8},{"text":".","start":58,"end":59,"id":9}]} {"text":"Chief Information Security Officer with GWAPT certification, expert in Wireshark.","spans":[{"start":0,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":40,"end":45,"label":"CERTIFICATION","answer":"accept","token_start":5,"token_end":5},{"start":71,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1477016741,"_task_hash":1248953498,"tokens":[{"text":"Chief","start":0,"end":5,"id":0},{"text":"Information","start":6,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Officer","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"GWAPT","start":40,"end":45,"id":5},{"text":"certification","start":46,"end":59,"id":6},{"text":",","start":59,"end":60,"id":7},{"text":"expert","start":61,"end":67,"id":8},{"text":"in","start":68,"end":70,"id":9},{"text":"Wireshark","start":71,"end":80,"id":10},{"text":".","start":80,"end":81,"id":11}]} {"text":"Seeking Automation Engineer with 10++ years experience in OpenVAS and Risk Modeling.","spans":[{"start":8,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":58,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":70,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":512179170,"_task_hash":1226448004,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Automation","start":8,"end":18,"id":1},{"text":"Engineer","start":19,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10++","start":33,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"experience","start":44,"end":54,"id":6},{"text":"in","start":55,"end":57,"id":7},{"text":"OpenVAS","start":58,"end":65,"id":8},{"text":"and","start":66,"end":69,"id":9},{"text":"Risk","start":70,"end":74,"id":10},{"text":"Modeling","start":75,"end":83,"id":11},{"text":".","start":83,"end":84,"id":12}]} {"text":"Developed detection for Lateral Movement attacks.","spans":[{"start":24,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4},{"start":24,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2110574412,"_task_hash":-1031284634,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Lateral","start":24,"end":31,"id":3},{"text":"Movement","start":32,"end":40,"id":4},{"text":"attacks","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"ML Platform Engineer with expertise in NIST Framework compliance and Data Classification operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1768873584,"_task_hash":-1775697481,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Platform","start":3,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"Data","start":69,"end":73,"id":10},{"text":"Classification","start":74,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Seeking Product Security Engineer with 7+ years experience in Message Queues and CCTV Systems.","spans":[{"start":8,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":2119018111,"_task_hash":930113890,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Product","start":8,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"with","start":34,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"experience","start":48,"end":58,"id":8},{"text":"in","start":59,"end":61,"id":9},{"text":"Message","start":62,"end":69,"id":10},{"text":"Queues","start":70,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"CCTV","start":81,"end":85,"id":13},{"text":"Systems","start":86,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} {"text":"Physical Security Consultant with expertise in NIST Framework compliance and CSPM Tools operations.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1706540089,"_task_hash":-824681793,"tokens":[{"text":"Physical","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Consultant","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"expertise","start":34,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"NIST","start":47,"end":51,"id":6},{"text":"Framework","start":52,"end":61,"id":7},{"text":"compliance","start":62,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"CSPM","start":77,"end":81,"id":10},{"text":"Tools","start":82,"end":87,"id":11},{"text":"operations","start":88,"end":98,"id":12},{"text":".","start":98,"end":99,"id":13}]} {"text":"PRINCE2 certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-225429527,"_task_hash":-787420211,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certified","start":8,"end":17,"id":1},{"text":".","start":17,"end":18,"id":2}]} {"text":"Specialized in Threat Intelligence for enterprise environments.","spans":[{"start":15,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1764388881,"_task_hash":2000458780,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Threat","start":15,"end":21,"id":2},{"text":"Intelligence","start":22,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"enterprise","start":39,"end":49,"id":5},{"text":"environments","start":50,"end":62,"id":6},{"text":".","start":62,"end":63,"id":7}]} {"text":"Malware Analyst with CGEIT certification, expert in Cobalt Strike.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":21,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2072252960,"_task_hash":1378027232,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Analyst","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"CGEIT","start":21,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Cobalt","start":52,"end":58,"id":8},{"text":"Strike","start":59,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Must know Nessus, QRadar, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-967030673,"_task_hash":479774730,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"QRadar","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":".","start":44,"end":45,"id":9}]} {"text":"Required skills: Nessus, Zero Trust, IAM certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":37,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1972328296,"_task_hash":-436037117,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Zero","start":25,"end":29,"id":5},{"text":"Trust","start":30,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"IAM","start":37,"end":40,"id":8},{"text":"certification","start":41,"end":54,"id":9},{"text":".","start":54,"end":55,"id":10}]} {"text":"Tested WAF rules against Token Impersonation payloads.","spans":[{"start":25,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1760329415,"_task_hash":1233860526,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Token","start":25,"end":30,"id":4},{"text":"Impersonation","start":31,"end":44,"id":5},{"text":"payloads","start":45,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Coordinated Corrective Action with external auditors.","spans":[{"start":12,"end":29,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-55931121,"_task_hash":942748454,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"Corrective","start":12,"end":22,"id":1},{"text":"Action","start":23,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"external","start":35,"end":43,"id":4},{"text":"auditors","start":44,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Mentored junior engineers in Infrastructure Security.","spans":[{"start":29,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1605797252,"_task_hash":1034339410,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Infrastructure","start":29,"end":43,"id":4},{"text":"Security","start":44,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Looking for Software Security Engineer to lead Cloud Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1395114012,"_task_hash":-318739536,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Cloud","start":47,"end":52,"id":7},{"text":"Security","start":53,"end":61,"id":8},{"text":"Architecture","start":62,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} {"text":"Proficient in Nessus and Metasploit.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":292621728,"_task_hash":-1736199077,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Metasploit","start":25,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Proficient in Nessus and SIEM Operations.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-118921986,"_task_hash":1901973906,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":"Operations","start":30,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Published research on IoT Security trends.","spans":[{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1166971974,"_task_hash":1714208926,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"IoT","start":22,"end":25,"id":3},{"text":"Security","start":26,"end":34,"id":4},{"text":"trends","start":35,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"BDD/TDD required.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-372074300,"_task_hash":-1280738631,"tokens":[{"text":"BDD","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"TDD","start":4,"end":7,"id":2},{"text":"required","start":8,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} {"text":"Risk Assessment Analyst professional with 3+ years implementing Nessus and managing Backup & Recovery programs.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":84,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1467912923,"_task_hash":-67899203,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Assessment","start":5,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"professional","start":24,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"3","start":42,"end":43,"id":5},{"text":"+","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"implementing","start":51,"end":63,"id":8},{"text":"Nessus","start":64,"end":70,"id":9},{"text":"and","start":71,"end":74,"id":10},{"text":"managing","start":75,"end":83,"id":11},{"text":"Backup","start":84,"end":90,"id":12},{"text":"&","start":91,"end":92,"id":13},{"text":"Recovery","start":93,"end":101,"id":14},{"text":"programs","start":102,"end":110,"id":15},{"text":".","start":110,"end":111,"id":16}]} {"text":"Required: ISO 27001, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":222960131,"_task_hash":-551729458,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"27001","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"Metasploit","start":21,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"and","start":33,"end":36,"id":7},{"text":"OWASP","start":37,"end":42,"id":8},{"text":"Top","start":43,"end":46,"id":9},{"text":"10","start":47,"end":49,"id":10},{"text":"expertise","start":50,"end":59,"id":11},{"text":".","start":59,"end":60,"id":12}]} {"text":"Proficient in Splunk and SIEM.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1369442593,"_task_hash":1934435184,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Offensive Security Specialist with expertise in NIST Framework compliance and Threat Actor Analysis operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":48,"end":62,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":78,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1626054472,"_task_hash":-2024708547,"tokens":[{"text":"Offensive","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"expertise","start":35,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"NIST","start":48,"end":52,"id":6},{"text":"Framework","start":53,"end":62,"id":7},{"text":"compliance","start":63,"end":73,"id":8},{"text":"and","start":74,"end":77,"id":9},{"text":"Threat","start":78,"end":84,"id":10},{"text":"Actor","start":85,"end":90,"id":11},{"text":"Analysis","start":91,"end":99,"id":12},{"text":"operations","start":100,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} {"text":"Lead Security Operations Lead managing Network Analysis and JIRA/ServiceNow initiatives.","spans":[{"start":5,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1405161721,"_task_hash":-1630938392,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Operations","start":14,"end":24,"id":2},{"text":"Lead","start":25,"end":29,"id":3},{"text":"managing","start":30,"end":38,"id":4},{"text":"Network","start":39,"end":46,"id":5},{"text":"Analysis","start":47,"end":55,"id":6},{"text":"and","start":56,"end":59,"id":7},{"text":"JIRA","start":60,"end":64,"id":8},{"text":"/","start":64,"end":65,"id":9},{"text":"ServiceNow","start":65,"end":75,"id":10},{"text":"initiatives","start":76,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} {"text":"Assessed Mobile Security maturity using industry frameworks.","spans":[{"start":9,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2035686931,"_task_hash":-186615277,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Mobile","start":9,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"maturity","start":25,"end":33,"id":3},{"text":"using","start":34,"end":39,"id":4},{"text":"industry","start":40,"end":48,"id":5},{"text":"frameworks","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Accomplished ML Security Architect specializing in MLflow and Application Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1003594000,"_task_hash":1715778867,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"ML","start":13,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Architect","start":25,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"MLflow","start":51,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Application","start":62,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} {"text":"Developed detection for CSRF attacks.","spans":[{"start":24,"end":28,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":28,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1704810597,"_task_hash":1952896571,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"CSRF","start":24,"end":28,"id":3},{"text":"attacks","start":29,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Expert in Digital Forensics best practices.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1121458187,"_task_hash":1899887034,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Digital","start":10,"end":17,"id":2},{"text":"Forensics","start":18,"end":27,"id":3},{"text":"best","start":28,"end":32,"id":4},{"text":"practices","start":33,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Proficient in Burp Suite and Metasploit.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":39,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1909729133,"_task_hash":815398737,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Metasploit","start":29,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Senior ML Product Manager position: 5 years minimum, expert in SEO Writing, Penetration Testing, and Security Assessment.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":63,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":101,"end":120,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":648373898,"_task_hash":-2016864269,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"ML","start":7,"end":9,"id":1},{"text":"Product","start":10,"end":17,"id":2},{"text":"Manager","start":18,"end":25,"id":3},{"text":"position","start":26,"end":34,"id":4},{"text":":","start":34,"end":35,"id":5},{"text":"5","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"minimum","start":44,"end":51,"id":8},{"text":",","start":51,"end":52,"id":9},{"text":"expert","start":53,"end":59,"id":10},{"text":"in","start":60,"end":62,"id":11},{"text":"SEO","start":63,"end":66,"id":12},{"text":"Writing","start":67,"end":74,"id":13},{"text":",","start":74,"end":75,"id":14},{"text":"Penetration","start":76,"end":87,"id":15},{"text":"Testing","start":88,"end":95,"id":16},{"text":",","start":95,"end":96,"id":17},{"text":"and","start":97,"end":100,"id":18},{"text":"Security","start":101,"end":109,"id":19},{"text":"Assessment","start":110,"end":120,"id":20},{"text":".","start":120,"end":121,"id":21}]} {"text":"ML Security Architect professional with 10+ years implementing Splunk and managing Sensor Fusion programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":63,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":83,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":988172685,"_task_hash":1714199349,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"10","start":40,"end":42,"id":5},{"text":"+","start":42,"end":43,"id":6},{"text":"years","start":44,"end":49,"id":7},{"text":"implementing","start":50,"end":62,"id":8},{"text":"Splunk","start":63,"end":69,"id":9},{"text":"and","start":70,"end":73,"id":10},{"text":"managing","start":74,"end":82,"id":11},{"text":"Sensor","start":83,"end":89,"id":12},{"text":"Fusion","start":90,"end":96,"id":13},{"text":"programs","start":97,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} {"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"SOC Analyst with OSWE certification, expert in Zeek.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1872861204,"_task_hash":-749516091,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"OSWE","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Zeek","start":47,"end":51,"id":8},{"text":".","start":51,"end":52,"id":9}]} {"text":"Expert in GLBA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1495699365,"_task_hash":435438006,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GLBA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Video Game Developer with expertise in OWASP Top 10 compliance and Vulnerability Scanning operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1167771836,"_task_hash":-1395323103,"tokens":[{"text":"Video","start":0,"end":5,"id":0},{"text":"Game","start":6,"end":10,"id":1},{"text":"Developer","start":11,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Vulnerability","start":67,"end":80,"id":11},{"text":"Scanning","start":81,"end":89,"id":12},{"text":"operations","start":90,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Enterprise Security Architect opportunity: Lead AI Security program, implement OWASP Top 10, manage Customer Service operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":48,"end":59,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":79,"end":91,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":100,"end":116,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":187976827,"_task_hash":-1797566406,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Architect","start":20,"end":29,"id":2},{"text":"opportunity","start":30,"end":41,"id":3},{"text":":","start":41,"end":42,"id":4},{"text":"Lead","start":43,"end":47,"id":5},{"text":"AI","start":48,"end":50,"id":6},{"text":"Security","start":51,"end":59,"id":7},{"text":"program","start":60,"end":67,"id":8},{"text":",","start":67,"end":68,"id":9},{"text":"implement","start":69,"end":78,"id":10},{"text":"OWASP","start":79,"end":84,"id":11},{"text":"Top","start":85,"end":88,"id":12},{"text":"10","start":89,"end":91,"id":13},{"text":",","start":91,"end":92,"id":14},{"text":"manage","start":93,"end":99,"id":15},{"text":"Customer","start":100,"end":108,"id":16},{"text":"Service","start":109,"end":116,"id":17},{"text":"operations","start":117,"end":127,"id":18},{"text":".","start":127,"end":128,"id":19}]} {"text":"Senior Cryptographer skilled in Cloud Connectivity, Social Media Content, and Security Hardening.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":32,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":78,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":245334917,"_task_hash":821245493,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cryptographer","start":7,"end":20,"id":1},{"text":"skilled","start":21,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"Cloud","start":32,"end":37,"id":4},{"text":"Connectivity","start":38,"end":50,"id":5},{"text":",","start":50,"end":51,"id":6},{"text":"Social","start":52,"end":58,"id":7},{"text":"Media","start":59,"end":64,"id":8},{"text":"Content","start":65,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"Security","start":78,"end":86,"id":12},{"text":"Hardening","start":87,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"iOS Developer experienced in detecting rootkit attacks using QRadar.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":61,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1434962920,"_task_hash":-248702305,"tokens":[{"text":"iOS","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"experienced","start":14,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"detecting","start":29,"end":38,"id":4},{"text":"rootkit","start":39,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":"using","start":55,"end":60,"id":7},{"text":"QRadar","start":61,"end":67,"id":8},{"text":".","start":67,"end":68,"id":9}]} {"text":"ISO 22301 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":824458430,"_task_hash":1338890337,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} {"text":"Certified SAML working as Blue Team Operator, focused on Cloud Security and Buffer Overflow prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":76,"end":91,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-373544024,"_task_hash":744008143,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SAML","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Blue","start":26,"end":30,"id":4},{"text":"Team","start":31,"end":35,"id":5},{"text":"Operator","start":36,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Cloud","start":57,"end":62,"id":10},{"text":"Security","start":63,"end":71,"id":11},{"text":"and","start":72,"end":75,"id":12},{"text":"Buffer","start":76,"end":82,"id":13},{"text":"Overflow","start":83,"end":91,"id":14},{"text":"prevention","start":92,"end":102,"id":15},{"text":".","start":102,"end":103,"id":16}]} {"text":"Accomplished Security Monitoring Analyst specializing in Data Pipelines and Security Awareness Platforms.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-32440618,"_task_hash":-1272989664,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Monitoring","start":22,"end":32,"id":2},{"text":"Analyst","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Data","start":57,"end":61,"id":6},{"text":"Pipelines","start":62,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":"Awareness","start":85,"end":94,"id":10},{"text":"Platforms","start":95,"end":104,"id":11},{"text":".","start":104,"end":105,"id":12}]} {"text":"Security Awareness Specialist experienced in detecting botnet attacks using Metasploit.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":86,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":2031202304,"_task_hash":-1955153522,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"experienced","start":30,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"detecting","start":45,"end":54,"id":5},{"text":"botnet","start":55,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"Metasploit","start":76,"end":86,"id":9},{"text":".","start":86,"end":87,"id":10}]} {"text":"Anti-Phishing Specialist professional with 3+ years implementing EDR Platforms and managing ML Lifecycle Management programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":65,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":857789555,"_task_hash":-1431808319,"tokens":[{"text":"Anti","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"Phishing","start":5,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"professional","start":25,"end":37,"id":4},{"text":"with","start":38,"end":42,"id":5},{"text":"3","start":43,"end":44,"id":6},{"text":"+","start":44,"end":45,"id":7},{"text":"years","start":46,"end":51,"id":8},{"text":"implementing","start":52,"end":64,"id":9},{"text":"EDR","start":65,"end":68,"id":10},{"text":"Platforms","start":69,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"managing","start":83,"end":91,"id":13},{"text":"ML","start":92,"end":94,"id":14},{"text":"Lifecycle","start":95,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":"programs","start":116,"end":124,"id":17},{"text":".","start":124,"end":125,"id":18}]} {"text":"Seeking Content Creator with 10++ years experience in Dark Web Monitoring and Privacy Risk.","spans":[{"start":8,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":54,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":78,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1392483771,"_task_hash":-1274244427,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Content","start":8,"end":15,"id":1},{"text":"Creator","start":16,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"10++","start":29,"end":33,"id":4},{"text":"years","start":34,"end":39,"id":5},{"text":"experience","start":40,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Dark","start":54,"end":58,"id":8},{"text":"Web","start":59,"end":62,"id":9},{"text":"Monitoring","start":63,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"Privacy","start":78,"end":85,"id":12},{"text":"Risk","start":86,"end":90,"id":13},{"text":".","start":90,"end":91,"id":14}]} {"text":"Implemented Blue Team controls and monitoring.","spans":[{"start":12,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":12,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":348401481,"_task_hash":-950350891,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Blue","start":12,"end":16,"id":1},{"text":"Team","start":17,"end":21,"id":2},{"text":"controls","start":22,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"monitoring","start":35,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Trained developers on DCSync prevention.","spans":[{"start":22,"end":28,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1248112074,"_task_hash":320049800,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"DCSync","start":22,"end":28,"id":3},{"text":"prevention","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Experienced Cyber Threat Hunter specializing in Security Systems.","spans":[{"start":12,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1181950061,"_task_hash":-1607893642,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Threat","start":18,"end":24,"id":2},{"text":"Hunter","start":25,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Security","start":48,"end":56,"id":6},{"text":"Systems","start":57,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} {"text":"We need a Cryptographer skilled in Session Hijacking prevention and spyware analysis using Wireshark.","spans":[{"start":10,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":3},{"start":35,"end":52,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":6,"token_end":7},{"start":68,"end":75,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":91,"end":100,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1256348827,"_task_hash":-503518684,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cryptographer","start":10,"end":23,"id":3},{"text":"skilled","start":24,"end":31,"id":4},{"text":"in","start":32,"end":34,"id":5},{"text":"Session","start":35,"end":42,"id":6},{"text":"Hijacking","start":43,"end":52,"id":7},{"text":"prevention","start":53,"end":63,"id":8},{"text":"and","start":64,"end":67,"id":9},{"text":"spyware","start":68,"end":75,"id":10},{"text":"analysis","start":76,"end":84,"id":11},{"text":"using","start":85,"end":90,"id":12},{"text":"Wireshark","start":91,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} {"text":"Proficient in SIEM and Nessus.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1177038604,"_task_hash":1302057457,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Nessus","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Recovered systems after worm attack.","spans":[{"start":24,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-588112047,"_task_hash":-1033731128,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"worm","start":24,"end":28,"id":3},{"text":"attack","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Managed PDPA certification process.","spans":[{"start":8,"end":12,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":406967630,"_task_hash":631336831,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"PDPA","start":8,"end":12,"id":1},{"text":"certification","start":13,"end":26,"id":2},{"text":"process","start":27,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"Lead Anti-Phishing Specialist managing Performance Optimization and Model Serving initiatives.","spans":[{"start":5,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":39,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":68,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1342818651,"_task_hash":-505958493,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Anti","start":5,"end":9,"id":1},{"text":"-","start":9,"end":10,"id":2},{"text":"Phishing","start":10,"end":18,"id":3},{"text":"Specialist","start":19,"end":29,"id":4},{"text":"managing","start":30,"end":38,"id":5},{"text":"Performance","start":39,"end":50,"id":6},{"text":"Optimization","start":51,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Model","start":68,"end":73,"id":9},{"text":"Serving","start":74,"end":81,"id":10},{"text":"initiatives","start":82,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} {"text":"IT Project Manager professional with 5++ years implementing QRadar and managing ETL programs.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":60,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":80,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-137095938,"_task_hash":-1794201956,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Project","start":3,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"professional","start":19,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"implementing","start":47,"end":59,"id":7},{"text":"QRadar","start":60,"end":66,"id":8},{"text":"and","start":67,"end":70,"id":9},{"text":"managing","start":71,"end":79,"id":10},{"text":"ETL","start":80,"end":83,"id":11},{"text":"programs","start":84,"end":92,"id":12},{"text":".","start":92,"end":93,"id":13}]} {"text":"Mapped security controls to SOC 2 CC6.1.","spans":[{"start":28,"end":39,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2116933141,"_task_hash":-1114656317,"tokens":[{"text":"Mapped","start":0,"end":6,"id":0},{"text":"security","start":7,"end":15,"id":1},{"text":"controls","start":16,"end":24,"id":2},{"text":"to","start":25,"end":27,"id":3},{"text":"SOC","start":28,"end":31,"id":4},{"text":"2","start":32,"end":33,"id":5},{"text":"CC6.1","start":34,"end":39,"id":6},{"text":".","start":39,"end":40,"id":7}]} {"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Trained staff on GDPR obligations.","spans":[{"start":17,"end":21,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1666413357,"_task_hash":-1663210161,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"GDPR","start":17,"end":21,"id":3},{"text":"obligations","start":22,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Security Architect with GCP Security certification, expert in Splunk.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":36,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1705634352,"_task_hash":-707182327,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"GCP","start":24,"end":27,"id":3},{"text":"Security","start":28,"end":36,"id":4},{"text":"certification","start":37,"end":50,"id":5},{"text":",","start":50,"end":51,"id":6},{"text":"expert","start":52,"end":58,"id":7},{"text":"in","start":59,"end":61,"id":8},{"text":"Splunk","start":62,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} {"text":"Accomplished AI Ethics Specialist specializing in Bug Tracking and AWS Security.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-603702746,"_task_hash":-412711004,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"AI","start":13,"end":15,"id":1},{"text":"Ethics","start":16,"end":22,"id":2},{"text":"Specialist","start":23,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Bug","start":50,"end":53,"id":6},{"text":"Tracking","start":54,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"AWS","start":67,"end":70,"id":9},{"text":"Security","start":71,"end":79,"id":10},{"text":".","start":79,"end":80,"id":11}]} {"text":"Software Architect professional with 5++ years implementing Metasploit and managing Cloud Native Architecture programs.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":60,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":84,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1168450621,"_task_hash":-1033553177,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"professional","start":19,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"5++","start":37,"end":40,"id":4},{"text":"years","start":41,"end":46,"id":5},{"text":"implementing","start":47,"end":59,"id":6},{"text":"Metasploit","start":60,"end":70,"id":7},{"text":"and","start":71,"end":74,"id":8},{"text":"managing","start":75,"end":83,"id":9},{"text":"Cloud","start":84,"end":89,"id":10},{"text":"Native","start":90,"end":96,"id":11},{"text":"Architecture","start":97,"end":109,"id":12},{"text":"programs","start":110,"end":118,"id":13},{"text":".","start":118,"end":119,"id":14}]} {"text":"Malware Researcher with 7 years experience in AI Auditing, Ethical Framework Development, and Technical Product Management.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":59,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":94,"end":122,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":671689178,"_task_hash":300776436,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Researcher","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"7","start":24,"end":25,"id":3},{"text":"years","start":26,"end":31,"id":4},{"text":"experience","start":32,"end":42,"id":5},{"text":"in","start":43,"end":45,"id":6},{"text":"AI","start":46,"end":48,"id":7},{"text":"Auditing","start":49,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"Ethical","start":59,"end":66,"id":10},{"text":"Framework","start":67,"end":76,"id":11},{"text":"Development","start":77,"end":88,"id":12},{"text":",","start":88,"end":89,"id":13},{"text":"and","start":90,"end":93,"id":14},{"text":"Technical","start":94,"end":103,"id":15},{"text":"Product","start":104,"end":111,"id":16},{"text":"Management","start":112,"end":122,"id":17},{"text":".","start":122,"end":123,"id":18}]} {"text":"Conducted Preventive Action for enterprise systems.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1803827349,"_task_hash":-599640404,"tokens":[{"text":"Conducted","start":0,"end":9,"id":0},{"text":"Preventive","start":10,"end":20,"id":1},{"text":"Action","start":21,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"enterprise","start":32,"end":42,"id":4},{"text":"systems","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Required: OSINT, EDR Platforms, and NIST Framework expertise.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1822005119,"_task_hash":1110919644,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"OSINT","start":10,"end":15,"id":2},{"text":",","start":15,"end":16,"id":3},{"text":"EDR","start":17,"end":20,"id":4},{"text":"Platforms","start":21,"end":30,"id":5},{"text":",","start":30,"end":31,"id":6},{"text":"and","start":32,"end":35,"id":7},{"text":"NIST","start":36,"end":40,"id":8},{"text":"Framework","start":41,"end":50,"id":9},{"text":"expertise","start":51,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} {"text":"Holds IDS/IPS.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1001366409,"_task_hash":-842152492,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":".","start":13,"end":14,"id":4}]} {"text":"Cloud Security Engineer with CEH certification, expert in CrowdStrike.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":32,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":58,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-22424750,"_task_hash":-1108009395,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"CEH","start":29,"end":32,"id":4},{"text":"certification","start":33,"end":46,"id":5},{"text":",","start":46,"end":47,"id":6},{"text":"expert","start":48,"end":54,"id":7},{"text":"in","start":55,"end":57,"id":8},{"text":"CrowdStrike","start":58,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Specialized in DevSecOps for enterprise environments.","spans":[{"start":15,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":521329531,"_task_hash":-381048417,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"DevSecOps","start":15,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"environments","start":40,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Certified STIX/TAXII working as Network Engineer, focused on Kubernetes Security and Path Traversal prevention.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":85,"end":99,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":573424294,"_task_hash":-1139270632,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"STIX","start":10,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"TAXII","start":15,"end":20,"id":3},{"text":"working","start":21,"end":28,"id":4},{"text":"as","start":29,"end":31,"id":5},{"text":"Network","start":32,"end":39,"id":6},{"text":"Engineer","start":40,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"focused","start":50,"end":57,"id":9},{"text":"on","start":58,"end":60,"id":10},{"text":"Kubernetes","start":61,"end":71,"id":11},{"text":"Security","start":72,"end":80,"id":12},{"text":"and","start":81,"end":84,"id":13},{"text":"Path","start":85,"end":89,"id":14},{"text":"Traversal","start":90,"end":99,"id":15},{"text":"prevention","start":100,"end":110,"id":16},{"text":".","start":110,"end":111,"id":17}]} {"text":"Remediated SOX audit findings.","spans":[{"start":11,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1249477966,"_task_hash":-1323275279,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"SOX","start":11,"end":14,"id":1},{"text":"audit","start":15,"end":20,"id":2},{"text":"findings","start":21,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} {"text":"Analyzed XSS samples in malware lab.","spans":[{"start":9,"end":12,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":701219066,"_task_hash":236932780,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"XSS","start":9,"end":12,"id":1},{"text":"samples","start":13,"end":20,"id":2},{"text":"in","start":21,"end":23,"id":3},{"text":"malware","start":24,"end":31,"id":4},{"text":"lab","start":32,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Looking for Malware Analyst to lead Security Patterns initiatives.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":53,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":477939376,"_task_hash":1282194303,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Malware","start":12,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"to","start":28,"end":30,"id":4},{"text":"lead","start":31,"end":35,"id":5},{"text":"Security","start":36,"end":44,"id":6},{"text":"Patterns","start":45,"end":53,"id":7},{"text":"initiatives","start":54,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Data Intelligence Analyst with 5+ years experience in Model Explainability, User Activity Monitoring, and Responsible AI.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":76,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14},{"start":106,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1151928079,"_task_hash":-1882989877,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Intelligence","start":5,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"5","start":31,"end":32,"id":4},{"text":"+","start":32,"end":33,"id":5},{"text":"years","start":34,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"Model","start":54,"end":59,"id":9},{"text":"Explainability","start":60,"end":74,"id":10},{"text":",","start":74,"end":75,"id":11},{"text":"User","start":76,"end":80,"id":12},{"text":"Activity","start":81,"end":89,"id":13},{"text":"Monitoring","start":90,"end":100,"id":14},{"text":",","start":100,"end":101,"id":15},{"text":"and","start":102,"end":105,"id":16},{"text":"Responsible","start":106,"end":117,"id":17},{"text":"AI","start":118,"end":120,"id":18},{"text":".","start":120,"end":121,"id":19}]} {"text":"Ensured compliance with CMMC requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1290240875,"_task_hash":959966995,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CMMC","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Experienced Network Administrator specializing in Cloud Security Testing.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":220890651,"_task_hash":-1500493679,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Network","start":12,"end":19,"id":1},{"text":"Administrator","start":20,"end":33,"id":2},{"text":"specializing","start":34,"end":46,"id":3},{"text":"in","start":47,"end":49,"id":4},{"text":"Cloud","start":50,"end":55,"id":5},{"text":"Security","start":56,"end":64,"id":6},{"text":"Testing","start":65,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} {"text":"DevSecOps Engineer with CISA certification, expert in Volatility.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-428288952,"_task_hash":-1323784535,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CISA","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Volatility","start":54,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Exploited DLL Injection vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-486094915,"_task_hash":1605196329,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"DLL","start":10,"end":13,"id":1},{"text":"Injection","start":14,"end":23,"id":2},{"text":"vulnerability","start":24,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"web","start":41,"end":44,"id":5},{"text":"application","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Holds HIPAA.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-196748497,"_task_hash":1970209682,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"HIPAA","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"Senior Security Assessor position: 10 years minimum, expert in Solution Frameworks, Recovery Planning, and BYOD Security.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":63,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":107,"end":120,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1681480882,"_task_hash":-962262092,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Assessor","start":16,"end":24,"id":2},{"text":"position","start":25,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"10","start":35,"end":37,"id":5},{"text":"years","start":38,"end":43,"id":6},{"text":"minimum","start":44,"end":51,"id":7},{"text":",","start":51,"end":52,"id":8},{"text":"expert","start":53,"end":59,"id":9},{"text":"in","start":60,"end":62,"id":10},{"text":"Solution","start":63,"end":71,"id":11},{"text":"Frameworks","start":72,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"Recovery","start":84,"end":92,"id":14},{"text":"Planning","start":93,"end":101,"id":15},{"text":",","start":101,"end":102,"id":16},{"text":"and","start":103,"end":106,"id":17},{"text":"BYOD","start":107,"end":111,"id":18},{"text":"Security","start":112,"end":120,"id":19},{"text":".","start":120,"end":121,"id":20}]} {"text":"Holds ROS.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1290829527,"_task_hash":198536298,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ROS","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"TLS/SSL certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":241661517,"_task_hash":-921594864,"tokens":[{"text":"TLS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"SSL","start":4,"end":7,"id":2},{"text":"certification","start":8,"end":21,"id":3},{"text":"a","start":22,"end":23,"id":4},{"text":"plus","start":24,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Lead Game Programmer managing Facility Protection and Training initiatives.","spans":[{"start":5,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":54,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":824478332,"_task_hash":-1089033853,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Game","start":5,"end":9,"id":1},{"text":"Programmer","start":10,"end":20,"id":2},{"text":"managing","start":21,"end":29,"id":3},{"text":"Facility","start":30,"end":38,"id":4},{"text":"Protection","start":39,"end":49,"id":5},{"text":"and","start":50,"end":53,"id":6},{"text":"Training","start":54,"end":62,"id":7},{"text":"initiatives","start":63,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} {"text":"Head of Security with hands-on experience in SIEM Operations, Metasploit, and Web Application Security.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":62,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":78,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1719037075,"_task_hash":-1105652485,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"with","start":17,"end":21,"id":3},{"text":"hands","start":22,"end":27,"id":4},{"text":"-","start":27,"end":28,"id":5},{"text":"on","start":28,"end":30,"id":6},{"text":"experience","start":31,"end":41,"id":7},{"text":"in","start":42,"end":44,"id":8},{"text":"SIEM","start":45,"end":49,"id":9},{"text":"Operations","start":50,"end":60,"id":10},{"text":",","start":60,"end":61,"id":11},{"text":"Metasploit","start":62,"end":72,"id":12},{"text":",","start":72,"end":73,"id":13},{"text":"and","start":74,"end":77,"id":14},{"text":"Web","start":78,"end":81,"id":15},{"text":"Application","start":82,"end":93,"id":16},{"text":"Security","start":94,"end":102,"id":17},{"text":".","start":102,"end":103,"id":18}]} {"text":"Risk Analyst with CompTIA Security+ certification, expert in Cisco SecureX.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":18,"end":35,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-348205757,"_task_hash":1620692998,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"CompTIA","start":18,"end":25,"id":3},{"text":"Security+","start":26,"end":35,"id":4},{"text":"certification","start":36,"end":49,"id":5},{"text":",","start":49,"end":50,"id":6},{"text":"expert","start":51,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"Cisco","start":61,"end":66,"id":9},{"text":"SecureX.","start":67,"end":75,"id":10}]} {"text":"Enterprise Cloud Architect with hands-on experience in QRadar, Splunk, and Security Scanning Tools.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":63,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":75,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1060381825,"_task_hash":-1936043534,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"hands","start":32,"end":37,"id":4},{"text":"-","start":37,"end":38,"id":5},{"text":"on","start":38,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"QRadar","start":55,"end":61,"id":9},{"text":",","start":61,"end":62,"id":10},{"text":"Splunk","start":63,"end":69,"id":11},{"text":",","start":69,"end":70,"id":12},{"text":"and","start":71,"end":74,"id":13},{"text":"Security","start":75,"end":83,"id":14},{"text":"Scanning","start":84,"end":92,"id":15},{"text":"Tools","start":93,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"Managed API infrastructure for Fortune 500 client.","spans":[{"start":8,"end":11,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-287754759,"_task_hash":1141105537,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"API","start":8,"end":11,"id":1},{"text":"infrastructure","start":12,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"Fortune","start":31,"end":38,"id":4},{"text":"500","start":39,"end":42,"id":5},{"text":"client","start":43,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Responded to keylogger incident affecting 1000+ users.","spans":[{"start":13,"end":22,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2},{"start":13,"end":22,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1482280264,"_task_hash":-1996258125,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"keylogger","start":13,"end":22,"id":2},{"text":"incident","start":23,"end":31,"id":3},{"text":"affecting","start":32,"end":41,"id":4},{"text":"1000","start":42,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"users","start":48,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Certified IDS/IPS working as IT Compliance Specialist, focused on BYOD Security and Password Spraying prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":66,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":101,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1277457498,"_task_hash":-1632607298,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"IT","start":29,"end":31,"id":6},{"text":"Compliance","start":32,"end":42,"id":7},{"text":"Specialist","start":43,"end":53,"id":8},{"text":",","start":53,"end":54,"id":9},{"text":"focused","start":55,"end":62,"id":10},{"text":"on","start":63,"end":65,"id":11},{"text":"BYOD","start":66,"end":70,"id":12},{"text":"Security","start":71,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"Password","start":84,"end":92,"id":15},{"text":"Spraying","start":93,"end":101,"id":16},{"text":"prevention","start":102,"end":112,"id":17},{"text":".","start":112,"end":113,"id":18}]} {"text":"Developed detection for Session Hijacking attacks.","spans":[{"start":24,"end":41,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1007078458,"_task_hash":1727481333,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Session","start":24,"end":31,"id":3},{"text":"Hijacking","start":32,"end":41,"id":4},{"text":"attacks","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Mentored junior engineers in Reverse Engineering.","spans":[{"start":29,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-822031056,"_task_hash":956146088,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Reverse","start":29,"end":36,"id":4},{"text":"Engineering","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Must know Splunk, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-855667001,"_task_hash":382797546,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Wireshark","start":18,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"OWASP","start":33,"end":38,"id":7},{"text":"Top","start":39,"end":42,"id":8},{"text":"10","start":43,"end":45,"id":9},{"text":".","start":45,"end":46,"id":10}]} {"text":"Assessed Purple Team maturity using industry frameworks.","spans":[{"start":9,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1006348439,"_task_hash":-319997852,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Purple","start":9,"end":15,"id":1},{"text":"Team","start":16,"end":20,"id":2},{"text":"maturity","start":21,"end":29,"id":3},{"text":"using","start":30,"end":35,"id":4},{"text":"industry","start":36,"end":44,"id":5},{"text":"frameworks","start":45,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Vulnerability Assessment Analyst role available: Robotics experience required, Container Registry Security knowledge essential.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":79,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-368699291,"_task_hash":-245962593,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Assessment","start":14,"end":24,"id":1},{"text":"Analyst","start":25,"end":32,"id":2},{"text":"role","start":33,"end":37,"id":3},{"text":"available","start":38,"end":47,"id":4},{"text":":","start":47,"end":48,"id":5},{"text":"Robotics","start":49,"end":57,"id":6},{"text":"experience","start":58,"end":68,"id":7},{"text":"required","start":69,"end":77,"id":8},{"text":",","start":77,"end":78,"id":9},{"text":"Container","start":79,"end":88,"id":10},{"text":"Registry","start":89,"end":97,"id":11},{"text":"Security","start":98,"end":106,"id":12},{"text":"knowledge","start":107,"end":116,"id":13},{"text":"essential","start":117,"end":126,"id":14},{"text":".","start":126,"end":127,"id":15}]} {"text":"Senior Disaster Recovery Specialist position: 5+ years minimum, expert in Identity Lifecycle, Data Modeling, and Security Patterns.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":74,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":94,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":113,"end":130,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-236312413,"_task_hash":505572690,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Disaster","start":7,"end":15,"id":1},{"text":"Recovery","start":16,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"position","start":36,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"5","start":46,"end":47,"id":6},{"text":"+","start":47,"end":48,"id":7},{"text":"years","start":49,"end":54,"id":8},{"text":"minimum","start":55,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"expert","start":64,"end":70,"id":11},{"text":"in","start":71,"end":73,"id":12},{"text":"Identity","start":74,"end":82,"id":13},{"text":"Lifecycle","start":83,"end":92,"id":14},{"text":",","start":92,"end":93,"id":15},{"text":"Data","start":94,"end":98,"id":16},{"text":"Modeling","start":99,"end":107,"id":17},{"text":",","start":107,"end":108,"id":18},{"text":"and","start":109,"end":112,"id":19},{"text":"Security","start":113,"end":121,"id":20},{"text":"Patterns","start":122,"end":130,"id":21},{"text":".","start":130,"end":131,"id":22}]} {"text":"Proficient in EDR Tools and ELK Stack.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-471465511,"_task_hash":-1399664345,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"ELK","start":28,"end":31,"id":5},{"text":"Stack","start":32,"end":37,"id":6},{"text":".","start":37,"end":38,"id":7}]} {"text":"Looking for Endpoint Security Engineer to lead Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1797885356,"_task_hash":-924742124,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Endpoint","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"Architecture","start":56,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Holds C++ certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-302962117,"_task_hash":-401299562,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Certified CCPA working as Server-Side Developer, focused on Pod Security and SSRF prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7},{"start":60,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":77,"end":81,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":2024389177,"_task_hash":399162568,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CCPA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Server","start":26,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"Side","start":33,"end":37,"id":6},{"text":"Developer","start":38,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"focused","start":49,"end":56,"id":9},{"text":"on","start":57,"end":59,"id":10},{"text":"Pod","start":60,"end":63,"id":11},{"text":"Security","start":64,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"SSRF","start":77,"end":81,"id":14},{"text":"prevention","start":82,"end":92,"id":15},{"text":".","start":92,"end":93,"id":16}]} {"text":"Looking for IT Network Administrator to lead Hardware Security initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1245471293,"_task_hash":-1954476644,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"IT","start":12,"end":14,"id":2},{"text":"Network","start":15,"end":22,"id":3},{"text":"Administrator","start":23,"end":36,"id":4},{"text":"to","start":37,"end":39,"id":5},{"text":"lead","start":40,"end":44,"id":6},{"text":"Hardware","start":45,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Hired as CISO to lead security transformation.","spans":[{"start":9,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":928580539,"_task_hash":941193800,"tokens":[{"text":"Hired","start":0,"end":5,"id":0},{"text":"as","start":6,"end":8,"id":1},{"text":"CISO","start":9,"end":13,"id":2},{"text":"to","start":14,"end":16,"id":3},{"text":"lead","start":17,"end":21,"id":4},{"text":"security","start":22,"end":30,"id":5},{"text":"transformation","start":31,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Specialized in Purple Team for enterprise environments.","spans":[{"start":15,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2112057791,"_task_hash":-510234378,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Purple","start":15,"end":21,"id":2},{"text":"Team","start":22,"end":26,"id":3},{"text":"for","start":27,"end":30,"id":4},{"text":"enterprise","start":31,"end":41,"id":5},{"text":"environments","start":42,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Expert in COPPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":849420153,"_task_hash":-371286602,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"COPPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Holds PCI DSS.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-371988377,"_task_hash":931213278,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PCI","start":6,"end":9,"id":1},{"text":"DSS","start":10,"end":13,"id":2},{"text":".","start":13,"end":14,"id":3}]} {"text":"Certified C++ working as Test Automation Engineer, focused on Runtime Security and CSRF prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":83,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1211588561,"_task_hash":850696184,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"C++","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Test","start":25,"end":29,"id":4},{"text":"Automation","start":30,"end":40,"id":5},{"text":"Engineer","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"focused","start":51,"end":58,"id":8},{"text":"on","start":59,"end":61,"id":9},{"text":"Runtime","start":62,"end":69,"id":10},{"text":"Security","start":70,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"CSRF","start":83,"end":87,"id":13},{"text":"prevention","start":88,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Proficient in EDR Platforms and Splunk.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":2026248368,"_task_hash":-519970302,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"Splunk","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Required skills: EDR Platforms, Replication, CCPA certification.","spans":[{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1018845440,"_task_hash":2071507604,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Platforms","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"Replication","start":32,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"CCPA","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"Senior Governance Risk Compliance Specialist skilled in Knowledge Base, IaC, and BYOD Security.","spans":[{"start":7,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":56,"end":70,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":72,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":81,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1796580515,"_task_hash":1365624843,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Governance","start":7,"end":17,"id":1},{"text":"Risk","start":18,"end":22,"id":2},{"text":"Compliance","start":23,"end":33,"id":3},{"text":"Specialist","start":34,"end":44,"id":4},{"text":"skilled","start":45,"end":52,"id":5},{"text":"in","start":53,"end":55,"id":6},{"text":"Knowledge","start":56,"end":65,"id":7},{"text":"Base","start":66,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"IaC","start":72,"end":75,"id":10},{"text":",","start":75,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"BYOD","start":81,"end":85,"id":13},{"text":"Security","start":86,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} {"text":"OSINT required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1609453577,"_task_hash":-644759626,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Developed detection for Memory Injection attacks.","spans":[{"start":24,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4},{"start":24,"end":40,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-894197667,"_task_hash":-2060663825,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Memory","start":24,"end":30,"id":3},{"text":"Injection","start":31,"end":40,"id":4},{"text":"attacks","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Security Architect with expertise in NIST Framework compliance and Android operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1255488980,"_task_hash":984332562,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"expertise","start":24,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"compliance","start":52,"end":62,"id":7},{"text":"and","start":63,"end":66,"id":8},{"text":"Android","start":67,"end":74,"id":9},{"text":"operations","start":75,"end":85,"id":10},{"text":".","start":85,"end":86,"id":11}]} {"text":"Assessed third-party vendors for NIS2 compliance.","spans":[{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6},{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1949407115,"_task_hash":1485580827,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"NIS2","start":33,"end":37,"id":6},{"text":"compliance","start":38,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"Holds TOGAF certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1058317034,"_task_hash":2099672658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Led Malware Analysis initiatives across organization.","spans":[{"start":4,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1906338799,"_task_hash":-1788210772,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Malware","start":4,"end":11,"id":1},{"text":"Analysis","start":12,"end":20,"id":2},{"text":"initiatives","start":21,"end":32,"id":3},{"text":"across","start":33,"end":39,"id":4},{"text":"organization","start":40,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Holds AI UX.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-666568630,"_task_hash":2024535529,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"AI","start":6,"end":8,"id":1},{"text":"UX","start":9,"end":11,"id":2},{"text":".","start":11,"end":12,"id":3}]} {"text":"Must know Metasploit, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":22,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":34,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1591159605,"_task_hash":-2075389288,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":",","start":20,"end":21,"id":3},{"text":"Nessus","start":22,"end":28,"id":4},{"text":",","start":28,"end":29,"id":5},{"text":"and","start":30,"end":33,"id":6},{"text":"OWASP","start":34,"end":39,"id":7},{"text":"Top","start":40,"end":43,"id":8},{"text":"10","start":44,"end":46,"id":9},{"text":".","start":46,"end":47,"id":10}]} {"text":"Certified PCI DSS working as Computer Forensics Investigator, focused on Building Security and Command Injection prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":60,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":73,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":95,"end":112,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1244754383,"_task_hash":-1294342114,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PCI","start":10,"end":13,"id":1},{"text":"DSS","start":14,"end":17,"id":2},{"text":"working","start":18,"end":25,"id":3},{"text":"as","start":26,"end":28,"id":4},{"text":"Computer","start":29,"end":37,"id":5},{"text":"Forensics","start":38,"end":47,"id":6},{"text":"Investigator","start":48,"end":60,"id":7},{"text":",","start":60,"end":61,"id":8},{"text":"focused","start":62,"end":69,"id":9},{"text":"on","start":70,"end":72,"id":10},{"text":"Building","start":73,"end":81,"id":11},{"text":"Security","start":82,"end":90,"id":12},{"text":"and","start":91,"end":94,"id":13},{"text":"Command","start":95,"end":102,"id":14},{"text":"Injection","start":103,"end":112,"id":15},{"text":"prevention","start":113,"end":123,"id":16},{"text":".","start":123,"end":124,"id":17}]} {"text":"Accomplished Full Stack Software Engineer specializing in Kubeflow and Kubernetes Security.","spans":[{"start":13,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":58,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":71,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":135440212,"_task_hash":-1120241294,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Full","start":13,"end":17,"id":1},{"text":"Stack","start":18,"end":23,"id":2},{"text":"Software","start":24,"end":32,"id":3},{"text":"Engineer","start":33,"end":41,"id":4},{"text":"specializing","start":42,"end":54,"id":5},{"text":"in","start":55,"end":57,"id":6},{"text":"Kubeflow","start":58,"end":66,"id":7},{"text":"and","start":67,"end":70,"id":8},{"text":"Kubernetes","start":71,"end":81,"id":9},{"text":"Security","start":82,"end":90,"id":10},{"text":".","start":90,"end":91,"id":11}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Required skills: SIEM Operations, Database Design, PKI certification.","spans":[{"start":17,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":34,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":51,"end":54,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1052345502,"_task_hash":836419010,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":"Operations","start":22,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"Database","start":34,"end":42,"id":6},{"text":"Design","start":43,"end":49,"id":7},{"text":",","start":49,"end":50,"id":8},{"text":"PKI","start":51,"end":54,"id":9},{"text":"certification","start":55,"end":68,"id":10},{"text":".","start":68,"end":69,"id":11}]} {"text":"Led incident response for CVE-2023-4863 exploitation.","spans":[{"start":26,"end":39,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1488455373,"_task_hash":1491855820,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"incident","start":4,"end":12,"id":1},{"text":"response","start":13,"end":21,"id":2},{"text":"for","start":22,"end":25,"id":3},{"text":"CVE-2023","start":26,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"4863","start":35,"end":39,"id":6},{"text":"exploitation","start":40,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Proficient in SIEM and EDR Tools.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1425082907,"_task_hash":-710458621,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"EDR","start":23,"end":26,"id":4},{"text":"Tools","start":27,"end":32,"id":5},{"text":".","start":32,"end":33,"id":6}]} {"text":"Implemented controls to prevent DDoS attacks.","spans":[{"start":32,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":104726764,"_task_hash":-839510441,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"DDoS","start":32,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Remediated SEC Cyber Rules audit findings.","spans":[{"start":11,"end":26,"label":"REGULATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-344306522,"_task_hash":-633540768,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"SEC","start":11,"end":14,"id":1},{"text":"Cyber","start":15,"end":20,"id":2},{"text":"Rules","start":21,"end":26,"id":3},{"text":"audit","start":27,"end":32,"id":4},{"text":"findings","start":33,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"Built GRC team from ground up.","spans":[{"start":6,"end":9,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-869079414,"_task_hash":-192043310,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"GRC","start":6,"end":9,"id":1},{"text":"team","start":10,"end":14,"id":2},{"text":"from","start":15,"end":19,"id":3},{"text":"ground","start":20,"end":26,"id":4},{"text":"up","start":27,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} {"text":"Looking for API Developer to lead Security Awareness initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1362867250,"_task_hash":-901568156,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"API","start":12,"end":15,"id":2},{"text":"Developer","start":16,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Awareness","start":43,"end":52,"id":7},{"text":"initiatives","start":53,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Lead Cyber Forensics Analyst managing Privileged Access Management and ServiceNow initiatives.","spans":[{"start":5,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":71,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":169727744,"_task_hash":-488363860,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Forensics","start":11,"end":20,"id":2},{"text":"Analyst","start":21,"end":28,"id":3},{"text":"managing","start":29,"end":37,"id":4},{"text":"Privileged","start":38,"end":48,"id":5},{"text":"Access","start":49,"end":55,"id":6},{"text":"Management","start":56,"end":66,"id":7},{"text":"and","start":67,"end":70,"id":8},{"text":"ServiceNow","start":71,"end":81,"id":9},{"text":"initiatives","start":82,"end":93,"id":10},{"text":".","start":93,"end":94,"id":11}]} {"text":"Assessed third-party vendors for GDPR compliance.","spans":[{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6},{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2093658154,"_task_hash":38767670,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"GDPR","start":33,"end":37,"id":6},{"text":"compliance","start":38,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"Specialized in Security Awareness for enterprise environments.","spans":[{"start":15,"end":33,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":15,"end":33,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1268610114,"_task_hash":1633940036,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Awareness","start":24,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"enterprise","start":38,"end":48,"id":5},{"text":"environments","start":49,"end":61,"id":6},{"text":".","start":61,"end":62,"id":7}]} {"text":"We need a QA Analyst skilled in Buffer Overflow prevention and adware analysis using SIEM.","spans":[{"start":10,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":47,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":63,"end":69,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":85,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1892234774,"_task_hash":913269893,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"QA","start":10,"end":12,"id":3},{"text":"Analyst","start":13,"end":20,"id":4},{"text":"skilled","start":21,"end":28,"id":5},{"text":"in","start":29,"end":31,"id":6},{"text":"Buffer","start":32,"end":38,"id":7},{"text":"Overflow","start":39,"end":47,"id":8},{"text":"prevention","start":48,"end":58,"id":9},{"text":"and","start":59,"end":62,"id":10},{"text":"adware","start":63,"end":69,"id":11},{"text":"analysis","start":70,"end":78,"id":12},{"text":"using","start":79,"end":84,"id":13},{"text":"SIEM","start":85,"end":89,"id":14},{"text":".","start":89,"end":90,"id":15}]} {"text":"Led Threat Intelligence initiatives across organization.","spans":[{"start":4,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1552062333,"_task_hash":-1517455476,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Threat","start":4,"end":10,"id":1},{"text":"Intelligence","start":11,"end":23,"id":2},{"text":"initiatives","start":24,"end":35,"id":3},{"text":"across","start":36,"end":42,"id":4},{"text":"organization","start":43,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"Hiring Human Factor Security Specialist for Waterfall and APT detection.","spans":[{"start":7,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":44,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":58,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1755534031,"_task_hash":604259232,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Human","start":7,"end":12,"id":1},{"text":"Factor","start":13,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Specialist","start":29,"end":39,"id":4},{"text":"for","start":40,"end":43,"id":5},{"text":"Waterfall","start":44,"end":53,"id":6},{"text":"and","start":54,"end":57,"id":7},{"text":"APT","start":58,"end":61,"id":8},{"text":"detection","start":62,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"IoT Solutions Architect experienced in detecting APT attacks using SIEM.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":52,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":67,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":693768024,"_task_hash":1514624972,"tokens":[{"text":"IoT","start":0,"end":3,"id":0},{"text":"Solutions","start":4,"end":13,"id":1},{"text":"Architect","start":14,"end":23,"id":2},{"text":"experienced","start":24,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"detecting","start":39,"end":48,"id":5},{"text":"APT","start":49,"end":52,"id":6},{"text":"attacks","start":53,"end":60,"id":7},{"text":"using","start":61,"end":66,"id":8},{"text":"SIEM","start":67,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"CISO role requires 15+ years experience.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1747691271,"_task_hash":460465889,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"role","start":5,"end":9,"id":1},{"text":"requires","start":10,"end":18,"id":2},{"text":"15","start":19,"end":21,"id":3},{"text":"+","start":21,"end":22,"id":4},{"text":"years","start":23,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":".","start":39,"end":40,"id":7}]} {"text":"Accomplished Cryptography Expert specializing in Issue Resolution and Physical Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1037935585,"_task_hash":-67997519,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cryptography","start":13,"end":25,"id":1},{"text":"Expert","start":26,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Issue","start":49,"end":54,"id":5},{"text":"Resolution","start":55,"end":65,"id":6},{"text":"and","start":66,"end":69,"id":7},{"text":"Physical","start":70,"end":78,"id":8},{"text":"Security","start":79,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} {"text":"Must know EDR Platforms, SIEM Operations, and OWASP Top 10.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":25,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":46,"end":58,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1978605000,"_task_hash":1741153196,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"SIEM","start":25,"end":29,"id":5},{"text":"Operations","start":30,"end":40,"id":6},{"text":",","start":40,"end":41,"id":7},{"text":"and","start":42,"end":45,"id":8},{"text":"OWASP","start":46,"end":51,"id":9},{"text":"Top","start":52,"end":55,"id":10},{"text":"10","start":56,"end":58,"id":11},{"text":".","start":58,"end":59,"id":12}]} {"text":"Lead Creative Content Strategist managing Risk Management and Qualys initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":202162030,"_task_hash":-1678428128,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Creative","start":5,"end":13,"id":1},{"text":"Content","start":14,"end":21,"id":2},{"text":"Strategist","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Risk","start":42,"end":46,"id":5},{"text":"Management","start":47,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Qualys","start":62,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Looking for Security Operations Lead to lead Building Security initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-958056928,"_task_hash":353607851,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Operations","start":21,"end":31,"id":3},{"text":"Lead","start":32,"end":36,"id":4},{"text":"to","start":37,"end":39,"id":5},{"text":"lead","start":40,"end":44,"id":6},{"text":"Building","start":45,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Immediate opening for Cyber Insurance Consultant.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1679518730,"_task_hash":1744580795,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cyber","start":22,"end":27,"id":3},{"text":"Insurance","start":28,"end":37,"id":4},{"text":"Consultant","start":38,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Hiring AI/ML Security Specialist for Key Management and Supply Chain Attack detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":37,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":56,"end":75,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1034406953,"_task_hash":154613191,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Security","start":13,"end":21,"id":4},{"text":"Specialist","start":22,"end":32,"id":5},{"text":"for","start":33,"end":36,"id":6},{"text":"Key","start":37,"end":40,"id":7},{"text":"Management","start":41,"end":51,"id":8},{"text":"and","start":52,"end":55,"id":9},{"text":"Supply","start":56,"end":62,"id":10},{"text":"Chain","start":63,"end":68,"id":11},{"text":"Attack","start":69,"end":75,"id":12},{"text":"detection","start":76,"end":85,"id":13},{"text":".","start":85,"end":86,"id":14}]} {"text":"Proficient in EDR Tools and Nessus.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2022849284,"_task_hash":-1826334413,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"Nessus","start":28,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"AI UX certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":651451037,"_task_hash":-1130344377,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certification","start":6,"end":19,"id":2},{"text":"a","start":20,"end":21,"id":3},{"text":"plus","start":22,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Anti-Phishing Specialist with expertise in OWASP Top 10 compliance and Microsoft Defender operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":71,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1538438426,"_task_hash":1917584529,"tokens":[{"text":"Anti","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"Phishing","start":5,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"with","start":25,"end":29,"id":4},{"text":"expertise","start":30,"end":39,"id":5},{"text":"in","start":40,"end":42,"id":6},{"text":"OWASP","start":43,"end":48,"id":7},{"text":"Top","start":49,"end":52,"id":8},{"text":"10","start":53,"end":55,"id":9},{"text":"compliance","start":56,"end":66,"id":10},{"text":"and","start":67,"end":70,"id":11},{"text":"Microsoft","start":71,"end":80,"id":12},{"text":"Defender","start":81,"end":89,"id":13},{"text":"operations","start":90,"end":100,"id":14},{"text":".","start":100,"end":101,"id":15}]} {"text":"Experienced Data Intelligence Analyst specializing in Terraform Security.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":54,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-357602119,"_task_hash":-1577511466,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Data","start":12,"end":16,"id":1},{"text":"Intelligence","start":17,"end":29,"id":2},{"text":"Analyst","start":30,"end":37,"id":3},{"text":"specializing","start":38,"end":50,"id":4},{"text":"in","start":51,"end":53,"id":5},{"text":"Terraform","start":54,"end":63,"id":6},{"text":"Security","start":64,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} {"text":"VP of Security with OSCP certification, expert in SentinelOne.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":50,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-52126707,"_task_hash":-22529883,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"OSCP","start":20,"end":24,"id":4},{"text":"certification","start":25,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"expert","start":40,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"SentinelOne","start":50,"end":61,"id":9},{"text":".","start":61,"end":62,"id":10}]} {"text":"Must know EDR Platforms, EDR Platforms, and OWASP Top 10.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":25,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":56,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1224306673,"_task_hash":205846216,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"EDR","start":25,"end":28,"id":5},{"text":"Platforms","start":29,"end":38,"id":6},{"text":",","start":38,"end":39,"id":7},{"text":"and","start":40,"end":43,"id":8},{"text":"OWASP","start":44,"end":49,"id":9},{"text":"Top","start":50,"end":53,"id":10},{"text":"10","start":54,"end":56,"id":11},{"text":".","start":56,"end":57,"id":12}]} {"text":"Holds RBAC.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1050074114,"_task_hash":896161982,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Seeking Information Specialist with 7+ years experience in VLAN Configuration and Impact Assessment.","spans":[{"start":8,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":59,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":82,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1289863381,"_task_hash":579201831,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Information","start":8,"end":19,"id":1},{"text":"Specialist","start":20,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"7","start":36,"end":37,"id":4},{"text":"+","start":37,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"VLAN","start":59,"end":63,"id":9},{"text":"Configuration","start":64,"end":77,"id":10},{"text":"and","start":78,"end":81,"id":11},{"text":"Impact","start":82,"end":88,"id":12},{"text":"Assessment","start":89,"end":99,"id":13},{"text":".","start":99,"end":100,"id":14}]} {"text":"Required: GDPR, Nessus, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1255872532,"_task_hash":-520021751,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Nessus","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":"expertise","start":41,"end":50,"id":10},{"text":".","start":50,"end":51,"id":11}]} {"text":"Assessed IoT Security maturity using industry frameworks.","spans":[{"start":9,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-152961492,"_task_hash":-394497860,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"IoT","start":9,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"maturity","start":22,"end":30,"id":3},{"text":"using","start":31,"end":36,"id":4},{"text":"industry","start":37,"end":45,"id":5},{"text":"frameworks","start":46,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Senior DevSecOps Specialist skilled in Regulatory Frameworks, Hybrid, and Security Tools.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":39,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":74,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-157658046,"_task_hash":856932892,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"DevSecOps","start":7,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"skilled","start":28,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"Regulatory","start":39,"end":49,"id":5},{"text":"Frameworks","start":50,"end":60,"id":6},{"text":",","start":60,"end":61,"id":7},{"text":"Hybrid","start":62,"end":68,"id":8},{"text":",","start":68,"end":69,"id":9},{"text":"and","start":70,"end":73,"id":10},{"text":"Security","start":74,"end":82,"id":11},{"text":"Tools","start":83,"end":88,"id":12},{"text":".","start":88,"end":89,"id":13}]} {"text":"Proficient in SIEM and Nessus.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1177038604,"_task_hash":1302057457,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Nessus","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Developed Security Architecture strategy and roadmap.","spans":[{"start":10,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1557666444,"_task_hash":46318048,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Architecture","start":19,"end":31,"id":2},{"text":"strategy","start":32,"end":40,"id":3},{"text":"and","start":41,"end":44,"id":4},{"text":"roadmap","start":45,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Lead AI Robotics Engineer managing CVSS Scoring and Incident Management initiatives.","spans":[{"start":5,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":299263743,"_task_hash":930339050,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"AI","start":5,"end":7,"id":1},{"text":"Robotics","start":8,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"managing","start":26,"end":34,"id":4},{"text":"CVSS","start":35,"end":39,"id":5},{"text":"Scoring","start":40,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"Incident","start":52,"end":60,"id":8},{"text":"Management","start":61,"end":71,"id":9},{"text":"initiatives","start":72,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Looking for Security Cryptographer to lead Cloud Access Security Broker initiatives.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":43,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1911371696,"_task_hash":1216451533,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Cryptographer","start":21,"end":34,"id":3},{"text":"to","start":35,"end":37,"id":4},{"text":"lead","start":38,"end":42,"id":5},{"text":"Cloud","start":43,"end":48,"id":6},{"text":"Access","start":49,"end":55,"id":7},{"text":"Security","start":56,"end":64,"id":8},{"text":"Broker","start":65,"end":71,"id":9},{"text":"initiatives","start":72,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Lead AWS Architect managing Identity Federation and Performance Management initiatives.","spans":[{"start":5,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":52,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-594395909,"_task_hash":162875948,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"AWS","start":5,"end":8,"id":1},{"text":"Architect","start":9,"end":18,"id":2},{"text":"managing","start":19,"end":27,"id":3},{"text":"Identity","start":28,"end":36,"id":4},{"text":"Federation","start":37,"end":47,"id":5},{"text":"and","start":48,"end":51,"id":6},{"text":"Performance","start":52,"end":63,"id":7},{"text":"Management","start":64,"end":74,"id":8},{"text":"initiatives","start":75,"end":86,"id":9},{"text":".","start":86,"end":87,"id":10}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Holds STIX/TAXII certification.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1000322515,"_task_hash":-855492174,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":"certification","start":17,"end":30,"id":4},{"text":".","start":30,"end":31,"id":5}]} {"text":"DevSecOps Engineer with OSED certification, expert in Splunk.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-130664598,"_task_hash":1711222045,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"OSED","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Splunk","start":54,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"Experienced Emergency Response Manager specializing in Mobile Security.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1977583246,"_task_hash":494590609,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Emergency","start":12,"end":21,"id":1},{"text":"Response","start":22,"end":30,"id":2},{"text":"Manager","start":31,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Mobile","start":55,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Hiring Tech Support Specialist for Cloud Platforms and DDoS detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":542053767,"_task_hash":-140782843,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Tech","start":7,"end":11,"id":1},{"text":"Support","start":12,"end":19,"id":2},{"text":"Specialist","start":20,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Cloud","start":35,"end":40,"id":5},{"text":"Platforms","start":41,"end":50,"id":6},{"text":"and","start":51,"end":54,"id":7},{"text":"DDoS","start":55,"end":59,"id":8},{"text":"detection","start":60,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"BDD/TDD certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1688939224,"_task_hash":-1212079216,"tokens":[{"text":"BDD","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"TDD","start":4,"end":7,"id":2},{"text":"certification","start":8,"end":21,"id":3},{"text":"a","start":22,"end":23,"id":4},{"text":"plus","start":24,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Experienced Mobile Engineer specializing in Database Security.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":61,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1080303185,"_task_hash":1407743480,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Mobile","start":12,"end":18,"id":1},{"text":"Engineer","start":19,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Database","start":44,"end":52,"id":5},{"text":"Security","start":53,"end":61,"id":6},{"text":".","start":61,"end":62,"id":7}]} {"text":"OPA required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370918646,"_task_hash":-45550355,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Holds ISO 27001.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":83721755,"_task_hash":1558105451,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"27001","start":10,"end":15,"id":2},{"text":".","start":15,"end":16,"id":3}]} {"text":"Join our team as Ethical Hacker!","spans":[{"start":17,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1569972175,"_task_hash":1482645367,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Ethical","start":17,"end":24,"id":4},{"text":"Hacker","start":25,"end":31,"id":5},{"text":"!","start":31,"end":32,"id":6}]} {"text":"Accomplished Assistant specializing in Statistical Analysis and Security Policies.","spans":[{"start":13,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":39,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":64,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1776072673,"_task_hash":958763054,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Assistant","start":13,"end":22,"id":1},{"text":"specializing","start":23,"end":35,"id":2},{"text":"in","start":36,"end":38,"id":3},{"text":"Statistical","start":39,"end":50,"id":4},{"text":"Analysis","start":51,"end":59,"id":5},{"text":"and","start":60,"end":63,"id":6},{"text":"Security","start":64,"end":72,"id":7},{"text":"Policies","start":73,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} {"text":"Lead Ethical Hacker managing Budgeting and Privacy by Design initiatives.","spans":[{"start":5,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":38,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":43,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-657619000,"_task_hash":-769122497,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Ethical","start":5,"end":12,"id":1},{"text":"Hacker","start":13,"end":19,"id":2},{"text":"managing","start":20,"end":28,"id":3},{"text":"Budgeting","start":29,"end":38,"id":4},{"text":"and","start":39,"end":42,"id":5},{"text":"Privacy","start":43,"end":50,"id":6},{"text":"by","start":51,"end":53,"id":7},{"text":"Design","start":54,"end":60,"id":8},{"text":"initiatives","start":61,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} {"text":"Content Marketing Specialist professional with 3++ years implementing SIEM Operations and managing Infrastructure as Code programs.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":70,"end":85,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":99,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-2097191771,"_task_hash":1228169932,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"professional","start":29,"end":41,"id":3},{"text":"with","start":42,"end":46,"id":4},{"text":"3++","start":47,"end":50,"id":5},{"text":"years","start":51,"end":56,"id":6},{"text":"implementing","start":57,"end":69,"id":7},{"text":"SIEM","start":70,"end":74,"id":8},{"text":"Operations","start":75,"end":85,"id":9},{"text":"and","start":86,"end":89,"id":10},{"text":"managing","start":90,"end":98,"id":11},{"text":"Infrastructure","start":99,"end":113,"id":12},{"text":"as","start":114,"end":116,"id":13},{"text":"Code","start":117,"end":121,"id":14},{"text":"programs","start":122,"end":130,"id":15},{"text":".","start":130,"end":131,"id":16}]} {"text":"Immediate opening for Privacy Specialist.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1849167284,"_task_hash":-1286686998,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Privacy","start":22,"end":29,"id":3},{"text":"Specialist","start":30,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} {"text":"Certified TLS/SSL working as Deep Learning Researcher, focused on MQTT Security and XXE prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":66,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":84,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-493516544,"_task_hash":-275676797,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TLS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"SSL","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Deep","start":29,"end":33,"id":6},{"text":"Learning","start":34,"end":42,"id":7},{"text":"Researcher","start":43,"end":53,"id":8},{"text":",","start":53,"end":54,"id":9},{"text":"focused","start":55,"end":62,"id":10},{"text":"on","start":63,"end":65,"id":11},{"text":"MQTT","start":66,"end":70,"id":12},{"text":"Security","start":71,"end":79,"id":13},{"text":"and","start":80,"end":83,"id":14},{"text":"XXE","start":84,"end":87,"id":15},{"text":"prevention","start":88,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"Join our team as Head of Security!","spans":[{"start":17,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1596845202,"_task_hash":211631595,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Head","start":17,"end":21,"id":4},{"text":"of","start":22,"end":24,"id":5},{"text":"Security","start":25,"end":33,"id":6},{"text":"!","start":33,"end":34,"id":7}]} {"text":"ISO 22301 certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1486434936,"_task_hash":-892801137,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"certified","start":10,"end":19,"id":2},{"text":".","start":19,"end":20,"id":3}]} {"text":"Coordinated disclosure of CVE-2021-44228 with vendor.","spans":[{"start":26,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-331511508,"_task_hash":1951960000,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"disclosure","start":12,"end":22,"id":1},{"text":"of","start":23,"end":25,"id":2},{"text":"CVE-2021","start":26,"end":34,"id":3},{"text":"-","start":34,"end":35,"id":4},{"text":"44228","start":35,"end":40,"id":5},{"text":"with","start":41,"end":45,"id":6},{"text":"vendor","start":46,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Service Incident Manager professional with 7+ years implementing ELK Stack and managing Expert Testimony programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":65,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-780763799,"_task_hash":-347210040,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Incident","start":8,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"professional","start":25,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"7","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"implementing","start":52,"end":64,"id":8},{"text":"ELK","start":65,"end":68,"id":9},{"text":"Stack","start":69,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"managing","start":79,"end":87,"id":12},{"text":"Expert","start":88,"end":94,"id":13},{"text":"Testimony","start":95,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} {"text":"Developed IoT Security strategy and roadmap.","spans":[{"start":10,"end":22,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-436862323,"_task_hash":-323098475,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"IoT","start":10,"end":13,"id":1},{"text":"Security","start":14,"end":22,"id":2},{"text":"strategy","start":23,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"roadmap","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Experienced Head of Security specializing in Security Patterns.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-622698104,"_task_hash":1807283157,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Head","start":12,"end":16,"id":1},{"text":"of","start":17,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"specializing","start":29,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"Patterns","start":54,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"DBA with expertise in NIST Framework compliance and User Awareness operations.","spans":[{"start":0,"end":3,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":22,"end":36,"label":"FRAMEWORK","answer":"accept","token_start":4,"token_end":5},{"start":52,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-63940604,"_task_hash":-379298446,"tokens":[{"text":"DBA","start":0,"end":3,"id":0},{"text":"with","start":4,"end":8,"id":1},{"text":"expertise","start":9,"end":18,"id":2},{"text":"in","start":19,"end":21,"id":3},{"text":"NIST","start":22,"end":26,"id":4},{"text":"Framework","start":27,"end":36,"id":5},{"text":"compliance","start":37,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"User","start":52,"end":56,"id":8},{"text":"Awareness","start":57,"end":66,"id":9},{"text":"operations","start":67,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} {"text":"Seeking Technical Support Specialist with 3+ years experience in Zero Trust Architecture and Cloud Networking.","spans":[{"start":8,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":65,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":93,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-199143287,"_task_hash":967970076,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Technical","start":8,"end":17,"id":1},{"text":"Support","start":18,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"3","start":42,"end":43,"id":5},{"text":"+","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"experience","start":51,"end":61,"id":8},{"text":"in","start":62,"end":64,"id":9},{"text":"Zero","start":65,"end":69,"id":10},{"text":"Trust","start":70,"end":75,"id":11},{"text":"Architecture","start":76,"end":88,"id":12},{"text":"and","start":89,"end":92,"id":13},{"text":"Cloud","start":93,"end":98,"id":14},{"text":"Networking","start":99,"end":109,"id":15},{"text":".","start":109,"end":110,"id":16}]} {"text":"Exploited SQL Injection vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1693065670,"_task_hash":14126490,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"SQL","start":10,"end":13,"id":1},{"text":"Injection","start":14,"end":23,"id":2},{"text":"vulnerability","start":24,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"web","start":41,"end":44,"id":5},{"text":"application","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Holds BDD/TDD certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":49581127,"_task_hash":247866212,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"BDD","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"TDD","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Assessed third-party vendors for DORA compliance.","spans":[{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6},{"start":33,"end":37,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2082920405,"_task_hash":-458535573,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"DORA","start":33,"end":37,"id":6},{"text":"compliance","start":38,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"Hiring Creative Content Strategist for User Psychology and APT detection.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":62,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1790715586,"_task_hash":-1496346889,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Creative","start":7,"end":15,"id":1},{"text":"Content","start":16,"end":23,"id":2},{"text":"Strategist","start":24,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"User","start":39,"end":43,"id":5},{"text":"Psychology","start":44,"end":54,"id":6},{"text":"and","start":55,"end":58,"id":7},{"text":"APT","start":59,"end":62,"id":8},{"text":"detection","start":63,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Expert in Endpoint Security best practices.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1425677323,"_task_hash":1219882288,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Endpoint","start":10,"end":18,"id":2},{"text":"Security","start":19,"end":27,"id":3},{"text":"best","start":28,"end":32,"id":4},{"text":"practices","start":33,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Expert in XDR configuration and tuning.","spans":[{"start":10,"end":13,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1215846953,"_task_hash":-104179812,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"XDR","start":10,"end":13,"id":2},{"text":"configuration","start":14,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"tuning","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Robotics Engineer professional with 10++ years implementing Wireshark and managing Incident Management Tools programs.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":60,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":83,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-564606882,"_task_hash":-147227722,"tokens":[{"text":"Robotics","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"professional","start":18,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"10++","start":36,"end":40,"id":4},{"text":"years","start":41,"end":46,"id":5},{"text":"implementing","start":47,"end":59,"id":6},{"text":"Wireshark","start":60,"end":69,"id":7},{"text":"and","start":70,"end":73,"id":8},{"text":"managing","start":74,"end":82,"id":9},{"text":"Incident","start":83,"end":91,"id":10},{"text":"Management","start":92,"end":102,"id":11},{"text":"Tools","start":103,"end":108,"id":12},{"text":"programs","start":109,"end":117,"id":13},{"text":".","start":117,"end":118,"id":14}]} {"text":"Created detection rules for CVE-2024-21762 exploitation attempts.","spans":[{"start":28,"end":42,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-307610225,"_task_hash":460465680,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"detection","start":8,"end":17,"id":1},{"text":"rules","start":18,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"CVE-2024","start":28,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"21762","start":37,"end":42,"id":6},{"text":"exploitation","start":43,"end":55,"id":7},{"text":"attempts","start":56,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Fullstack Engineer experienced in detecting malware attacks using SIEM.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":51,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":66,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":146233633,"_task_hash":1916496287,"tokens":[{"text":"Fullstack","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"experienced","start":19,"end":30,"id":2},{"text":"in","start":31,"end":33,"id":3},{"text":"detecting","start":34,"end":43,"id":4},{"text":"malware","start":44,"end":51,"id":5},{"text":"attacks","start":52,"end":59,"id":6},{"text":"using","start":60,"end":65,"id":7},{"text":"SIEM","start":66,"end":70,"id":8},{"text":".","start":70,"end":71,"id":9}]} {"text":"Immediate opening for Security Architect.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-414517898,"_task_hash":-2011743341,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Architect","start":31,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} {"text":"Lead Information Specialist managing Dark Web Monitoring and Motion Planning initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-3268458,"_task_hash":-832781846,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Information","start":5,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"managing","start":28,"end":36,"id":3},{"text":"Dark","start":37,"end":41,"id":4},{"text":"Web","start":42,"end":45,"id":5},{"text":"Monitoring","start":46,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Motion","start":61,"end":67,"id":8},{"text":"Planning","start":68,"end":76,"id":9},{"text":"initiatives","start":77,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} {"text":"Managed FISMA certification process.","spans":[{"start":8,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-544447619,"_task_hash":1525721169,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"FISMA","start":8,"end":13,"id":1},{"text":"certification","start":14,"end":27,"id":2},{"text":"process","start":28,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"We need a IAM Expert skilled in SSRF prevention and phishing analysis using Splunk.","spans":[{"start":10,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":36,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":52,"end":60,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":76,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":972632253,"_task_hash":2111311350,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"IAM","start":10,"end":13,"id":3},{"text":"Expert","start":14,"end":20,"id":4},{"text":"skilled","start":21,"end":28,"id":5},{"text":"in","start":29,"end":31,"id":6},{"text":"SSRF","start":32,"end":36,"id":7},{"text":"prevention","start":37,"end":47,"id":8},{"text":"and","start":48,"end":51,"id":9},{"text":"phishing","start":52,"end":60,"id":10},{"text":"analysis","start":61,"end":69,"id":11},{"text":"using","start":70,"end":75,"id":12},{"text":"Splunk","start":76,"end":82,"id":13},{"text":".","start":82,"end":83,"id":14}]} {"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"Incident Manager experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":48,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":63,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1563575733,"_task_hash":174016661,"tokens":[{"text":"Incident","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"experienced","start":17,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"detecting","start":32,"end":41,"id":4},{"text":"botnet","start":42,"end":48,"id":5},{"text":"attacks","start":49,"end":56,"id":6},{"text":"using","start":57,"end":62,"id":7},{"text":"SIEM","start":63,"end":67,"id":8},{"text":".","start":67,"end":68,"id":9}]} {"text":"Holds OPA.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1953373167,"_task_hash":625579373,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OPA","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Built PKI Management team from ground up.","spans":[{"start":6,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":6,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":777617963,"_task_hash":2131684095,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"PKI","start":6,"end":9,"id":1},{"text":"Management","start":10,"end":20,"id":2},{"text":"team","start":21,"end":25,"id":3},{"text":"from","start":26,"end":30,"id":4},{"text":"ground","start":31,"end":37,"id":5},{"text":"up","start":38,"end":40,"id":6},{"text":".","start":40,"end":41,"id":7}]} {"text":"Trained developers on Memory Injection prevention.","spans":[{"start":22,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-425148151,"_task_hash":1766020215,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Memory","start":22,"end":28,"id":3},{"text":"Injection","start":29,"end":38,"id":4},{"text":"prevention","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Threat Detection Specialist experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1793138900,"_task_hash":776409224,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Detection","start":7,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"botnet","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"SIEM","start":74,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Accomplished Front\u2011End Developer specializing in Web Performance and Enterprise Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":69,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":805075059,"_task_hash":-886607475,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Front\u2011End","start":13,"end":22,"id":1},{"text":"Developer","start":23,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Web","start":49,"end":52,"id":5},{"text":"Performance","start":53,"end":64,"id":6},{"text":"and","start":65,"end":68,"id":7},{"text":"Enterprise","start":69,"end":79,"id":8},{"text":"Security","start":80,"end":88,"id":9},{"text":".","start":88,"end":89,"id":10}]} {"text":"We need a Big Data Engineer skilled in Brute Force prevention and Zero-Day analysis using Burp Suite.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":39,"end":50,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":66,"end":74,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":14},{"start":90,"end":100,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-718822715,"_task_hash":1493358709,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Big","start":10,"end":13,"id":3},{"text":"Data","start":14,"end":18,"id":4},{"text":"Engineer","start":19,"end":27,"id":5},{"text":"skilled","start":28,"end":35,"id":6},{"text":"in","start":36,"end":38,"id":7},{"text":"Brute","start":39,"end":44,"id":8},{"text":"Force","start":45,"end":50,"id":9},{"text":"prevention","start":51,"end":61,"id":10},{"text":"and","start":62,"end":65,"id":11},{"text":"Zero","start":66,"end":70,"id":12},{"text":"-","start":70,"end":71,"id":13},{"text":"Day","start":71,"end":74,"id":14},{"text":"analysis","start":75,"end":83,"id":15},{"text":"using","start":84,"end":89,"id":16},{"text":"Burp","start":90,"end":94,"id":17},{"text":"Suite","start":95,"end":100,"id":18},{"text":".","start":100,"end":101,"id":19}]} {"text":"Cryptology Expert experienced in detecting ransomware attacks using EDR Tools.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":385310314,"_task_hash":1076110720,"tokens":[{"text":"Cryptology","start":0,"end":10,"id":0},{"text":"Expert","start":11,"end":17,"id":1},{"text":"experienced","start":18,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"detecting","start":33,"end":42,"id":4},{"text":"ransomware","start":43,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"EDR","start":68,"end":71,"id":8},{"text":"Tools","start":72,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} {"text":"Kubernetes Security Engineer with expertise in NIST Framework compliance and Legal Knowledge operations.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2066293204,"_task_hash":562535387,"tokens":[{"text":"Kubernetes","start":0,"end":10,"id":0},{"text":"Security","start":11,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"expertise","start":34,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"NIST","start":47,"end":51,"id":6},{"text":"Framework","start":52,"end":61,"id":7},{"text":"compliance","start":62,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"Legal","start":77,"end":82,"id":10},{"text":"Knowledge","start":83,"end":92,"id":11},{"text":"operations","start":93,"end":103,"id":12},{"text":".","start":103,"end":104,"id":13}]} {"text":"ITIL required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":627794360,"_task_hash":-395739088,"tokens":[{"text":"ITIL","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Compliance Officer with CEH certification, expert in Carbon Black.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1663241941,"_task_hash":-1087856509,"tokens":[{"text":"Compliance","start":0,"end":10,"id":0},{"text":"Officer","start":11,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CEH","start":24,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Carbon","start":53,"end":59,"id":8},{"text":"Black","start":60,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Immediate opening for Technical Support Analyst.","spans":[{"start":22,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-544181666,"_task_hash":2027844991,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Technical","start":22,"end":31,"id":3},{"text":"Support","start":32,"end":39,"id":4},{"text":"Analyst","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Access Management Specialist with hands-on experience in Splunk, Burp Suite, and AI Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":65,"end":75,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":81,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-527000630,"_task_hash":-203625773,"tokens":[{"text":"Access","start":0,"end":6,"id":0},{"text":"Management","start":7,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"Splunk","start":57,"end":63,"id":9},{"text":",","start":63,"end":64,"id":10},{"text":"Burp","start":65,"end":69,"id":11},{"text":"Suite","start":70,"end":75,"id":12},{"text":",","start":75,"end":76,"id":13},{"text":"and","start":77,"end":80,"id":14},{"text":"AI","start":81,"end":83,"id":15},{"text":"Security","start":84,"end":92,"id":16},{"text":".","start":92,"end":93,"id":17}]} {"text":"Looking for Security Monitoring Analyst to lead Mobile Security initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1486834487,"_task_hash":2136723309,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Monitoring","start":21,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Mobile","start":48,"end":54,"id":7},{"text":"Security","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} {"text":"Published research on Cryptography trends.","spans":[{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-181506601,"_task_hash":-1117933337,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Cryptography","start":22,"end":34,"id":3},{"text":"trends","start":35,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Lead Insider Risk Specialist managing Storytelling and Hardware Troubleshooting initiatives.","spans":[{"start":5,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":55,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1455381174,"_task_hash":765759359,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Insider","start":5,"end":12,"id":1},{"text":"Risk","start":13,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"managing","start":29,"end":37,"id":4},{"text":"Storytelling","start":38,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Hardware","start":55,"end":63,"id":7},{"text":"Troubleshooting","start":64,"end":79,"id":8},{"text":"initiatives","start":80,"end":91,"id":9},{"text":".","start":91,"end":92,"id":10}]} {"text":"Enterprise Solutions Architect professional with 10++ years implementing ELK Stack and managing Vendor Management programs.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":73,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":96,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1892876997,"_task_hash":-260985836,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Solutions","start":11,"end":20,"id":1},{"text":"Architect","start":21,"end":30,"id":2},{"text":"professional","start":31,"end":43,"id":3},{"text":"with","start":44,"end":48,"id":4},{"text":"10++","start":49,"end":53,"id":5},{"text":"years","start":54,"end":59,"id":6},{"text":"implementing","start":60,"end":72,"id":7},{"text":"ELK","start":73,"end":76,"id":8},{"text":"Stack","start":77,"end":82,"id":9},{"text":"and","start":83,"end":86,"id":10},{"text":"managing","start":87,"end":95,"id":11},{"text":"Vendor","start":96,"end":102,"id":12},{"text":"Management","start":103,"end":113,"id":13},{"text":"programs","start":114,"end":122,"id":14},{"text":".","start":122,"end":123,"id":15}]} {"text":"Accomplished Vendor Manager specializing in Agile Testing and Security Standards.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-891686759,"_task_hash":-1538601991,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Vendor","start":13,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Agile","start":44,"end":49,"id":5},{"text":"Testing","start":50,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Security","start":62,"end":70,"id":8},{"text":"Standards","start":71,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Remediated gaps identified in PCI DSS 3.4 assessment.","spans":[{"start":30,"end":41,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1442846601,"_task_hash":820672348,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"PCI","start":30,"end":33,"id":4},{"text":"DSS","start":34,"end":37,"id":5},{"text":"3.4","start":38,"end":41,"id":6},{"text":"assessment","start":42,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Expert in Reverse Engineering best practices.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-986439547,"_task_hash":2118619475,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Reverse","start":10,"end":17,"id":2},{"text":"Engineering","start":18,"end":29,"id":3},{"text":"best","start":30,"end":34,"id":4},{"text":"practices","start":35,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"We need a Frontend Engineer skilled in Path Traversal prevention and worm analysis using EDR Tools.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":39,"end":53,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":69,"end":73,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":89,"end":98,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1545029605,"_task_hash":-1791717999,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Frontend","start":10,"end":18,"id":3},{"text":"Engineer","start":19,"end":27,"id":4},{"text":"skilled","start":28,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"Path","start":39,"end":43,"id":7},{"text":"Traversal","start":44,"end":53,"id":8},{"text":"prevention","start":54,"end":64,"id":9},{"text":"and","start":65,"end":68,"id":10},{"text":"worm","start":69,"end":73,"id":11},{"text":"analysis","start":74,"end":82,"id":12},{"text":"using","start":83,"end":88,"id":13},{"text":"EDR","start":89,"end":92,"id":14},{"text":"Tools","start":93,"end":98,"id":15},{"text":".","start":98,"end":99,"id":16}]} {"text":"Analyzed spear phishing campaign targeting financial sector.","spans":[{"start":9,"end":23,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1774882834,"_task_hash":-1007767819,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"spear","start":9,"end":14,"id":1},{"text":"phishing","start":15,"end":23,"id":2},{"text":"campaign","start":24,"end":32,"id":3},{"text":"targeting","start":33,"end":42,"id":4},{"text":"financial","start":43,"end":52,"id":5},{"text":"sector","start":53,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Must know QRadar, Burp Suite, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":2005179750,"_task_hash":1321224857,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"Burp","start":18,"end":22,"id":4},{"text":"Suite","start":23,"end":28,"id":5},{"text":",","start":28,"end":29,"id":6},{"text":"and","start":30,"end":33,"id":7},{"text":"NIST","start":34,"end":38,"id":8},{"text":"Framework","start":39,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} {"text":"Analyzed CVE-2021-21972 exploit chain and mitigations.","spans":[{"start":9,"end":23,"label":"CVE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":510786870,"_task_hash":1649793363,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"CVE-2021","start":9,"end":17,"id":1},{"text":"-","start":17,"end":18,"id":2},{"text":"21972","start":18,"end":23,"id":3},{"text":"exploit","start":24,"end":31,"id":4},{"text":"chain","start":32,"end":37,"id":5},{"text":"and","start":38,"end":41,"id":6},{"text":"mitigations","start":42,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} {"text":"Security Risk Analyst with hands-on experience in Nessus, Wireshark, and Supply Chain Security.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":73,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1769092629,"_task_hash":-648992823,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Risk","start":9,"end":13,"id":1},{"text":"Analyst","start":14,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"hands","start":27,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"on","start":33,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Nessus","start":50,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"Wireshark","start":58,"end":67,"id":11},{"text":",","start":67,"end":68,"id":12},{"text":"and","start":69,"end":72,"id":13},{"text":"Supply","start":73,"end":79,"id":14},{"text":"Chain","start":80,"end":85,"id":15},{"text":"Security","start":86,"end":94,"id":16},{"text":".","start":94,"end":95,"id":17}]} {"text":"Holds C/C++.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-840917921,"_task_hash":-1037521268,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":".","start":11,"end":12,"id":4}]} {"text":"Accomplished Security Compliance Officer specializing in Packet Analysis and Security Strategy.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":442689961,"_task_hash":1776971268,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Compliance","start":22,"end":32,"id":2},{"text":"Officer","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Packet","start":57,"end":63,"id":6},{"text":"Analysis","start":64,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"Security","start":77,"end":85,"id":9},{"text":"Strategy","start":86,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} {"text":"Published research on Red Team trends.","spans":[{"start":22,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1222391892,"_task_hash":416286016,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Red","start":22,"end":25,"id":3},{"text":"Team","start":26,"end":30,"id":4},{"text":"trends","start":31,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"Must have Nessus experience and NIST Framework knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1906162071,"_task_hash":-1731622793,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"knowledge","start":47,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Assessed Risk Management maturity using industry frameworks.","spans":[{"start":9,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-778341301,"_task_hash":689030296,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Risk","start":9,"end":13,"id":1},{"text":"Management","start":14,"end":24,"id":2},{"text":"maturity","start":25,"end":33,"id":3},{"text":"using","start":34,"end":39,"id":4},{"text":"industry","start":40,"end":48,"id":5},{"text":"frameworks","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Database Administrator opportunity: Lead API Security program, implement OWASP Top 10, manage Multi\u2011Cloud operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":53,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":85,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":94,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":927136713,"_task_hash":216801578,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Administrator","start":9,"end":22,"id":1},{"text":"opportunity","start":23,"end":34,"id":2},{"text":":","start":34,"end":35,"id":3},{"text":"Lead","start":36,"end":40,"id":4},{"text":"API","start":41,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"program","start":54,"end":61,"id":7},{"text":",","start":61,"end":62,"id":8},{"text":"implement","start":63,"end":72,"id":9},{"text":"OWASP","start":73,"end":78,"id":10},{"text":"Top","start":79,"end":82,"id":11},{"text":"10","start":83,"end":85,"id":12},{"text":",","start":85,"end":86,"id":13},{"text":"manage","start":87,"end":93,"id":14},{"text":"Multi\u2011Cloud","start":94,"end":105,"id":15},{"text":"operations","start":106,"end":116,"id":16},{"text":".","start":116,"end":117,"id":17}]} {"text":"Published threat intel report on malware trends.","spans":[{"start":33,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1734218794,"_task_hash":-1068996698,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"malware","start":33,"end":40,"id":5},{"text":"trends","start":41,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"DBA professional with 5++ years implementing Splunk and managing Pretexting programs.","spans":[{"start":0,"end":3,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":45,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":65,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":751047469,"_task_hash":745816065,"tokens":[{"text":"DBA","start":0,"end":3,"id":0},{"text":"professional","start":4,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"5++","start":22,"end":25,"id":3},{"text":"years","start":26,"end":31,"id":4},{"text":"implementing","start":32,"end":44,"id":5},{"text":"Splunk","start":45,"end":51,"id":6},{"text":"and","start":52,"end":55,"id":7},{"text":"managing","start":56,"end":64,"id":8},{"text":"Pretexting","start":65,"end":75,"id":9},{"text":"programs","start":76,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} {"text":"Senior Business Intelligence Developer position: 7 years minimum, expert in x86/x64 Architecture, Web Application Firewalls, and Database Security.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":76,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15},{"start":98,"end":123,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":19},{"start":129,"end":146,"label":"SECURITY_DOMAIN","answer":"accept","token_start":22,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-751127452,"_task_hash":-952288144,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Business","start":7,"end":15,"id":1},{"text":"Intelligence","start":16,"end":28,"id":2},{"text":"Developer","start":29,"end":38,"id":3},{"text":"position","start":39,"end":47,"id":4},{"text":":","start":47,"end":48,"id":5},{"text":"7","start":49,"end":50,"id":6},{"text":"years","start":51,"end":56,"id":7},{"text":"minimum","start":57,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"expert","start":66,"end":72,"id":10},{"text":"in","start":73,"end":75,"id":11},{"text":"x86","start":76,"end":79,"id":12},{"text":"/","start":79,"end":80,"id":13},{"text":"x64","start":80,"end":83,"id":14},{"text":"Architecture","start":84,"end":96,"id":15},{"text":",","start":96,"end":97,"id":16},{"text":"Web","start":98,"end":101,"id":17},{"text":"Application","start":102,"end":113,"id":18},{"text":"Firewalls","start":114,"end":123,"id":19},{"text":",","start":123,"end":124,"id":20},{"text":"and","start":125,"end":128,"id":21},{"text":"Database","start":129,"end":137,"id":22},{"text":"Security","start":138,"end":146,"id":23},{"text":".","start":146,"end":147,"id":24}]} {"text":"Malware Reverse Engineer with 7 years experience in Device Management, Consent Management, and Project Coordination.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":71,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":95,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1332808849,"_task_hash":22227399,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Reverse","start":8,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"7","start":30,"end":31,"id":4},{"text":"years","start":32,"end":37,"id":5},{"text":"experience","start":38,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Device","start":52,"end":58,"id":8},{"text":"Management","start":59,"end":69,"id":9},{"text":",","start":69,"end":70,"id":10},{"text":"Consent","start":71,"end":78,"id":11},{"text":"Management","start":79,"end":89,"id":12},{"text":",","start":89,"end":90,"id":13},{"text":"and","start":91,"end":94,"id":14},{"text":"Project","start":95,"end":102,"id":15},{"text":"Coordination","start":103,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} {"text":"Proficient in SIEM and QRadar.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1727736061,"_task_hash":1875785462,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"QRadar","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Senior Deep Learning Researcher position: 10+ years minimum, expert in Simulations, Alert Triage, and Security Assessment.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":71,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":84,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":102,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":706515829,"_task_hash":188644156,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Deep","start":7,"end":11,"id":1},{"text":"Learning","start":12,"end":20,"id":2},{"text":"Researcher","start":21,"end":31,"id":3},{"text":"position","start":32,"end":40,"id":4},{"text":":","start":40,"end":41,"id":5},{"text":"10","start":42,"end":44,"id":6},{"text":"+","start":44,"end":45,"id":7},{"text":"years","start":46,"end":51,"id":8},{"text":"minimum","start":52,"end":59,"id":9},{"text":",","start":59,"end":60,"id":10},{"text":"expert","start":61,"end":67,"id":11},{"text":"in","start":68,"end":70,"id":12},{"text":"Simulations","start":71,"end":82,"id":13},{"text":",","start":82,"end":83,"id":14},{"text":"Alert","start":84,"end":89,"id":15},{"text":"Triage","start":90,"end":96,"id":16},{"text":",","start":96,"end":97,"id":17},{"text":"and","start":98,"end":101,"id":18},{"text":"Security","start":102,"end":110,"id":19},{"text":"Assessment","start":111,"end":121,"id":20},{"text":".","start":121,"end":122,"id":21}]} {"text":"API Developer with 5 years experience in E-Learning Development, APT Tracking, and Usability Testing.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":10},{"start":65,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":83,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1741401523,"_task_hash":93242766,"tokens":[{"text":"API","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"5","start":19,"end":20,"id":3},{"text":"years","start":21,"end":26,"id":4},{"text":"experience","start":27,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"E","start":41,"end":42,"id":7},{"text":"-","start":42,"end":43,"id":8},{"text":"Learning","start":43,"end":51,"id":9},{"text":"Development","start":52,"end":63,"id":10},{"text":",","start":63,"end":64,"id":11},{"text":"APT","start":65,"end":68,"id":12},{"text":"Tracking","start":69,"end":77,"id":13},{"text":",","start":77,"end":78,"id":14},{"text":"and","start":79,"end":82,"id":15},{"text":"Usability","start":83,"end":92,"id":16},{"text":"Testing","start":93,"end":100,"id":17},{"text":".","start":100,"end":101,"id":18}]} {"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Remediated NIS2 audit findings.","spans":[{"start":11,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":759738893,"_task_hash":334812898,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"NIS2","start":11,"end":15,"id":1},{"text":"audit","start":16,"end":21,"id":2},{"text":"findings","start":22,"end":30,"id":3},{"text":".","start":30,"end":31,"id":4}]} {"text":"Mitigated CSRF through code remediation.","spans":[{"start":10,"end":14,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":822376364,"_task_hash":-559781889,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"CSRF","start":10,"end":14,"id":1},{"text":"through","start":15,"end":22,"id":2},{"text":"code","start":23,"end":27,"id":3},{"text":"remediation","start":28,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Mentored junior engineers in Security Operations.","spans":[{"start":29,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-569492538,"_task_hash":-1901825987,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Security","start":29,"end":37,"id":4},{"text":"Operations","start":38,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"QA Engineer with hands-on experience in EDR Tools, SIEM Operations, and Security Assessment.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":40,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":51,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":72,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851186729,"_task_hash":1618353702,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Engineer","start":3,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"hands","start":17,"end":22,"id":3},{"text":"-","start":22,"end":23,"id":4},{"text":"on","start":23,"end":25,"id":5},{"text":"experience","start":26,"end":36,"id":6},{"text":"in","start":37,"end":39,"id":7},{"text":"EDR","start":40,"end":43,"id":8},{"text":"Tools","start":44,"end":49,"id":9},{"text":",","start":49,"end":50,"id":10},{"text":"SIEM","start":51,"end":55,"id":11},{"text":"Operations","start":56,"end":66,"id":12},{"text":",","start":66,"end":67,"id":13},{"text":"and","start":68,"end":71,"id":14},{"text":"Security","start":72,"end":80,"id":15},{"text":"Assessment","start":81,"end":91,"id":16},{"text":".","start":91,"end":92,"id":17}]} {"text":"Holds C++.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":526977190,"_task_hash":-1557661950,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Immediate opening for Autonomous Systems Engineer.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-597487692,"_task_hash":1798677782,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Autonomous","start":22,"end":32,"id":3},{"text":"Systems","start":33,"end":40,"id":4},{"text":"Engineer","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Technical Support Specialist with hands-on experience in CrowdStrike, CrowdStrike, and Kubernetes Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":70,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":87,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1390017433,"_task_hash":-1676674033,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"CrowdStrike","start":57,"end":68,"id":9},{"text":",","start":68,"end":69,"id":10},{"text":"CrowdStrike","start":70,"end":81,"id":11},{"text":",","start":81,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"Kubernetes","start":87,"end":97,"id":14},{"text":"Security","start":98,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Analyzed spyware campaign targeting financial sector.","spans":[{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1813233336,"_task_hash":1802903090,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"spyware","start":9,"end":16,"id":1},{"text":"campaign","start":17,"end":25,"id":2},{"text":"targeting","start":26,"end":35,"id":3},{"text":"financial","start":36,"end":45,"id":4},{"text":"sector","start":46,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Immediate opening for Threat Hunter.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-541991024,"_task_hash":1506961299,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Hunter","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Required skills: Nessus, Vulnerability Assessment, ISO 27001 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":60,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1136280156,"_task_hash":1283829036,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Vulnerability","start":25,"end":38,"id":5},{"text":"Assessment","start":39,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"ISO","start":51,"end":54,"id":8},{"text":"27001","start":55,"end":60,"id":9},{"text":"certification","start":61,"end":74,"id":10},{"text":".","start":74,"end":75,"id":11}]} {"text":"Cloud Native Security Engineer with expertise in OWASP Top 10 compliance and OTA Updates operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":49,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":77,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1000218415,"_task_hash":-220607254,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Native","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"with","start":31,"end":35,"id":4},{"text":"expertise","start":36,"end":45,"id":5},{"text":"in","start":46,"end":48,"id":6},{"text":"OWASP","start":49,"end":54,"id":7},{"text":"Top","start":55,"end":58,"id":8},{"text":"10","start":59,"end":61,"id":9},{"text":"compliance","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"OTA","start":77,"end":80,"id":12},{"text":"Updates","start":81,"end":88,"id":13},{"text":"operations","start":89,"end":99,"id":14},{"text":".","start":99,"end":100,"id":15}]} {"text":"AI Security Architect with hands-on experience in QRadar, Burp Suite, and Security Champions Program.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":74,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-282107188,"_task_hash":-1510486686,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"hands","start":27,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"on","start":33,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"QRadar","start":50,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"Burp","start":58,"end":62,"id":11},{"text":"Suite","start":63,"end":68,"id":12},{"text":",","start":68,"end":69,"id":13},{"text":"and","start":70,"end":73,"id":14},{"text":"Security","start":74,"end":82,"id":15},{"text":"Champions","start":83,"end":92,"id":16},{"text":"Program","start":93,"end":100,"id":17},{"text":".","start":100,"end":101,"id":18}]} {"text":"Published research on Mobile Security trends.","spans":[{"start":22,"end":37,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-787159311,"_task_hash":-1797352963,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Mobile","start":22,"end":28,"id":3},{"text":"Security","start":29,"end":37,"id":4},{"text":"trends","start":38,"end":44,"id":5},{"text":".","start":44,"end":45,"id":6}]} {"text":"Lead Security Training Coordinator managing Containerization and Network Configuration initiatives.","spans":[{"start":5,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":44,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":65,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1110236804,"_task_hash":-566586829,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Training","start":14,"end":22,"id":2},{"text":"Coordinator","start":23,"end":34,"id":3},{"text":"managing","start":35,"end":43,"id":4},{"text":"Containerization","start":44,"end":60,"id":5},{"text":"and","start":61,"end":64,"id":6},{"text":"Network","start":65,"end":72,"id":7},{"text":"Configuration","start":73,"end":86,"id":8},{"text":"initiatives","start":87,"end":98,"id":9},{"text":".","start":98,"end":99,"id":10}]} {"text":"Deployed IAM solution across enterprise.","spans":[{"start":9,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-880241955,"_task_hash":1821446661,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"IAM","start":9,"end":12,"id":1},{"text":"solution","start":13,"end":21,"id":2},{"text":"across","start":22,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Led DevSecOps initiatives across organization.","spans":[{"start":4,"end":13,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2018569260,"_task_hash":-757534519,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"DevSecOps","start":4,"end":13,"id":1},{"text":"initiatives","start":14,"end":25,"id":2},{"text":"across","start":26,"end":32,"id":3},{"text":"organization","start":33,"end":45,"id":4},{"text":".","start":45,"end":46,"id":5}]} {"text":"Senior Content Marketing Specialist skilled in RESTful APIs, Compliance, and GCP Security.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1114664692,"_task_hash":-723902705,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Content","start":7,"end":14,"id":1},{"text":"Marketing","start":15,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"skilled","start":36,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"RESTful","start":47,"end":54,"id":6},{"text":"APIs","start":55,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Compliance","start":61,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"GCP","start":77,"end":80,"id":12},{"text":"Security","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} {"text":"Seeking Content Writer with 10+ years experience in Remediation Planning and Communication.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1364656757,"_task_hash":-415519828,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Content","start":8,"end":15,"id":1},{"text":"Writer","start":16,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"10","start":28,"end":30,"id":4},{"text":"+","start":30,"end":31,"id":5},{"text":"years","start":32,"end":37,"id":6},{"text":"experience","start":38,"end":48,"id":7},{"text":"in","start":49,"end":51,"id":8},{"text":"Remediation","start":52,"end":63,"id":9},{"text":"Planning","start":64,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Communication","start":77,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Proficient in Splunk and Burp Suite.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":225119373,"_task_hash":-967917,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Burp","start":25,"end":29,"id":4},{"text":"Suite","start":30,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Technical Support Engineer professional with 10+ years implementing Splunk and managing Secure Boot programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":88,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1605174857,"_task_hash":-1324543133,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"10","start":45,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"Splunk","start":68,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"managing","start":79,"end":87,"id":11},{"text":"Secure","start":88,"end":94,"id":12},{"text":"Boot","start":95,"end":99,"id":13},{"text":"programs","start":100,"end":108,"id":14},{"text":".","start":108,"end":109,"id":15}]} {"text":"AI Policy Specialist with hands-on experience in SIEM, ELK Stack, and Cloud Native Security.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":55,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":70,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1416263145,"_task_hash":1915343407,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"hands","start":26,"end":31,"id":4},{"text":"-","start":31,"end":32,"id":5},{"text":"on","start":32,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"SIEM","start":49,"end":53,"id":9},{"text":",","start":53,"end":54,"id":10},{"text":"ELK","start":55,"end":58,"id":11},{"text":"Stack","start":59,"end":64,"id":12},{"text":",","start":64,"end":65,"id":13},{"text":"and","start":66,"end":69,"id":14},{"text":"Cloud","start":70,"end":75,"id":15},{"text":"Native","start":76,"end":82,"id":16},{"text":"Security","start":83,"end":91,"id":17},{"text":".","start":91,"end":92,"id":18}]} {"text":"QA Analyst needed for enterprise security team.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-584819457,"_task_hash":-518739282,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Analyst","start":3,"end":10,"id":1},{"text":"needed","start":11,"end":17,"id":2},{"text":"for","start":18,"end":21,"id":3},{"text":"enterprise","start":22,"end":32,"id":4},{"text":"security","start":33,"end":41,"id":5},{"text":"team","start":42,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Automated GLBA compliance monitoring.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-717972993,"_task_hash":-2062584681,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"GLBA","start":10,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"monitoring","start":26,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Looking for IT Department Manager to lead Security Systems initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":42,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":282710776,"_task_hash":-1065039411,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"IT","start":12,"end":14,"id":2},{"text":"Department","start":15,"end":25,"id":3},{"text":"Manager","start":26,"end":33,"id":4},{"text":"to","start":34,"end":36,"id":5},{"text":"lead","start":37,"end":41,"id":6},{"text":"Security","start":42,"end":50,"id":7},{"text":"Systems","start":51,"end":58,"id":8},{"text":"initiatives","start":59,"end":70,"id":9},{"text":".","start":70,"end":71,"id":10}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Content Marketing Specialist with hands-on experience in Splunk, QRadar, and Supply Chain Security.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":65,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":77,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-798398347,"_task_hash":1328094373,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"Splunk","start":57,"end":63,"id":9},{"text":",","start":63,"end":64,"id":10},{"text":"QRadar","start":65,"end":71,"id":11},{"text":",","start":71,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"Supply","start":77,"end":83,"id":14},{"text":"Chain","start":84,"end":89,"id":15},{"text":"Security","start":90,"end":98,"id":16},{"text":".","start":98,"end":99,"id":17}]} {"text":"PCI-DSS familiarity needed.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1912092747,"_task_hash":981602091,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"familiarity","start":8,"end":19,"id":3},{"text":"needed","start":20,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Looking for IT GRC Specialist to lead Security Strategy initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":38,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-734552673,"_task_hash":-1896460617,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"IT","start":12,"end":14,"id":2},{"text":"GRC","start":15,"end":18,"id":3},{"text":"Specialist","start":19,"end":29,"id":4},{"text":"to","start":30,"end":32,"id":5},{"text":"lead","start":33,"end":37,"id":6},{"text":"Security","start":38,"end":46,"id":7},{"text":"Strategy","start":47,"end":55,"id":8},{"text":"initiatives","start":56,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} {"text":"Accomplished Android Developer specializing in Adversary Emulation and CI/CD Security.","spans":[{"start":13,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":47,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-2082157368,"_task_hash":-130450683,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Android","start":13,"end":20,"id":1},{"text":"Developer","start":21,"end":30,"id":2},{"text":"specializing","start":31,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"Adversary","start":47,"end":56,"id":5},{"text":"Emulation","start":57,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"CI","start":71,"end":73,"id":8},{"text":"/","start":73,"end":74,"id":9},{"text":"CD","start":74,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":".","start":85,"end":86,"id":12}]} {"text":"Implemented ASM solution for enterprise security monitoring.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":457769276,"_task_hash":1256199251,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"ASM","start":12,"end":15,"id":1},{"text":"solution","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"security","start":40,"end":48,"id":5},{"text":"monitoring","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Analyzed trojan campaign targeting financial sector.","spans":[{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1876884553,"_task_hash":-1227870672,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"trojan","start":9,"end":15,"id":1},{"text":"campaign","start":16,"end":24,"id":2},{"text":"targeting","start":25,"end":34,"id":3},{"text":"financial","start":35,"end":44,"id":4},{"text":"sector","start":45,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Specialized in Malware Analysis for enterprise environments.","spans":[{"start":15,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":15,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1647953036,"_task_hash":634964712,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Malware","start":15,"end":22,"id":2},{"text":"Analysis","start":23,"end":31,"id":3},{"text":"for","start":32,"end":35,"id":4},{"text":"enterprise","start":36,"end":46,"id":5},{"text":"environments","start":47,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Documented evidence for NIST CSF RC.RP-1 audit.","spans":[{"start":24,"end":40,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1253496300,"_task_hash":-1162108707,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"evidence","start":11,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"NIST","start":24,"end":28,"id":3},{"text":"CSF","start":29,"end":32,"id":4},{"text":"RC.RP-1","start":33,"end":40,"id":5},{"text":"audit","start":41,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Malware Analyst with GPEN certification, expert in SentinelOne.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":21,"end":25,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":51,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-812152144,"_task_hash":1593229101,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Analyst","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"GPEN","start":21,"end":25,"id":3},{"text":"certification","start":26,"end":39,"id":4},{"text":",","start":39,"end":40,"id":5},{"text":"expert","start":41,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"SentinelOne","start":51,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Identity Management Engineer professional with 7+ years implementing Wireshark and managing Terraform programs.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":69,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1606958766,"_task_hash":882389241,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"Management","start":9,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"professional","start":29,"end":41,"id":3},{"text":"with","start":42,"end":46,"id":4},{"text":"7","start":47,"end":48,"id":5},{"text":"+","start":48,"end":49,"id":6},{"text":"years","start":50,"end":55,"id":7},{"text":"implementing","start":56,"end":68,"id":8},{"text":"Wireshark","start":69,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"Terraform","start":92,"end":101,"id":12},{"text":"programs","start":102,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Led CSPM implementation project.","spans":[{"start":4,"end":8,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-56551279,"_task_hash":361269812,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"CSPM","start":4,"end":8,"id":1},{"text":"implementation","start":9,"end":23,"id":2},{"text":"project","start":24,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Chief Information Security Officer with CISSP certification, expert in CrowdStrike.","spans":[{"start":0,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":40,"end":45,"label":"CERTIFICATION","answer":"accept","token_start":5,"token_end":5},{"start":71,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-141119919,"_task_hash":65585353,"tokens":[{"text":"Chief","start":0,"end":5,"id":0},{"text":"Information","start":6,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Officer","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"CISSP","start":40,"end":45,"id":5},{"text":"certification","start":46,"end":59,"id":6},{"text":",","start":59,"end":60,"id":7},{"text":"expert","start":61,"end":67,"id":8},{"text":"in","start":68,"end":70,"id":9},{"text":"CrowdStrike","start":71,"end":82,"id":10},{"text":".","start":82,"end":83,"id":11}]} {"text":"Senior Privacy Officer skilled in Transparency, ITSM, and Hardware Security Modules.","spans":[{"start":7,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":46,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":48,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":58,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1503698340,"_task_hash":1828530917,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Privacy","start":7,"end":14,"id":1},{"text":"Officer","start":15,"end":22,"id":2},{"text":"skilled","start":23,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"Transparency","start":34,"end":46,"id":5},{"text":",","start":46,"end":47,"id":6},{"text":"ITSM","start":48,"end":52,"id":7},{"text":",","start":52,"end":53,"id":8},{"text":"and","start":54,"end":57,"id":9},{"text":"Hardware","start":58,"end":66,"id":10},{"text":"Security","start":67,"end":75,"id":11},{"text":"Modules","start":76,"end":83,"id":12},{"text":".","start":83,"end":84,"id":13}]} {"text":"OSCP Certification required.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1225465137,"_task_hash":997524556,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"required","start":19,"end":27,"id":2},{"text":".","start":27,"end":28,"id":3}]} {"text":"Automated Management Review processes using scripts.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-185549996,"_task_hash":-1464052487,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Management","start":10,"end":20,"id":1},{"text":"Review","start":21,"end":27,"id":2},{"text":"processes","start":28,"end":37,"id":3},{"text":"using","start":38,"end":43,"id":4},{"text":"scripts","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"IoT Security Specialist with hands-on experience in Metasploit, ELK Stack, and Email Gateway Security.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":64,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":79,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1152231991,"_task_hash":-302521282,"tokens":[{"text":"IoT","start":0,"end":3,"id":0},{"text":"Security","start":4,"end":12,"id":1},{"text":"Specialist","start":13,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"hands","start":29,"end":34,"id":4},{"text":"-","start":34,"end":35,"id":5},{"text":"on","start":35,"end":37,"id":6},{"text":"experience","start":38,"end":48,"id":7},{"text":"in","start":49,"end":51,"id":8},{"text":"Metasploit","start":52,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"ELK","start":64,"end":67,"id":11},{"text":"Stack","start":68,"end":73,"id":12},{"text":",","start":73,"end":74,"id":13},{"text":"and","start":75,"end":78,"id":14},{"text":"Email","start":79,"end":84,"id":15},{"text":"Gateway","start":85,"end":92,"id":16},{"text":"Security","start":93,"end":101,"id":17},{"text":".","start":101,"end":102,"id":18}]} {"text":"Developed PDPA policies and procedures.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-148252634,"_task_hash":31550192,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"PDPA","start":10,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"procedures","start":28,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Accomplished Compliance Manager specializing in Differential Privacy and AWS Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":881088367,"_task_hash":1812560522,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Compliance","start":13,"end":23,"id":1},{"text":"Manager","start":24,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Differential","start":48,"end":60,"id":5},{"text":"Privacy","start":61,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"AWS","start":73,"end":76,"id":8},{"text":"Security","start":77,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} {"text":"Looking for DBA to lead Web App Security initiatives.","spans":[{"start":12,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2},{"start":24,"end":40,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1823507518,"_task_hash":-1478683544,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"DBA","start":12,"end":15,"id":2},{"text":"to","start":16,"end":18,"id":3},{"text":"lead","start":19,"end":23,"id":4},{"text":"Web","start":24,"end":27,"id":5},{"text":"App","start":28,"end":31,"id":6},{"text":"Security","start":32,"end":40,"id":7},{"text":"initiatives","start":41,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} {"text":"Must know Splunk, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":568827249,"_task_hash":-1094896852,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"CrowdStrike","start":18,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"NIST","start":35,"end":39,"id":7},{"text":"Framework","start":40,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} {"text":"Full Stack Engineer needed for enterprise security team.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1570806551,"_task_hash":1069447721,"tokens":[{"text":"Full","start":0,"end":4,"id":0},{"text":"Stack","start":5,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"needed","start":20,"end":26,"id":3},{"text":"for","start":27,"end":30,"id":4},{"text":"enterprise","start":31,"end":41,"id":5},{"text":"security","start":42,"end":50,"id":6},{"text":"team","start":51,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"AI Governance Specialist with 5 years experience in Infrastructure Design, Endpoint Detection and Response, and Control Systems.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":75,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":112,"end":127,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2083775073,"_task_hash":-2058365189,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Governance","start":3,"end":13,"id":1},{"text":"Specialist","start":14,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"5","start":30,"end":31,"id":4},{"text":"years","start":32,"end":37,"id":5},{"text":"experience","start":38,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Infrastructure","start":52,"end":66,"id":8},{"text":"Design","start":67,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"Endpoint","start":75,"end":83,"id":11},{"text":"Detection","start":84,"end":93,"id":12},{"text":"and","start":94,"end":97,"id":13},{"text":"Response","start":98,"end":106,"id":14},{"text":",","start":106,"end":107,"id":15},{"text":"and","start":108,"end":111,"id":16},{"text":"Control","start":112,"end":119,"id":17},{"text":"Systems","start":120,"end":127,"id":18},{"text":".","start":127,"end":128,"id":19}]} {"text":"Insider Risk Specialist role available: Psychology experience required, ML Pipeline Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1001425558,"_task_hash":-1667466195,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Specialist","start":13,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Psychology","start":40,"end":50,"id":6},{"text":"experience","start":51,"end":61,"id":7},{"text":"required","start":62,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"ML","start":72,"end":74,"id":10},{"text":"Pipeline","start":75,"end":83,"id":11},{"text":"Security","start":84,"end":92,"id":12},{"text":"knowledge","start":93,"end":102,"id":13},{"text":"essential","start":103,"end":112,"id":14},{"text":".","start":112,"end":113,"id":15}]} {"text":"Automated SOC 2 CC6.1 compliance monitoring.","spans":[{"start":10,"end":21,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1756125044,"_task_hash":-1610807563,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"SOC","start":10,"end":13,"id":1},{"text":"2","start":14,"end":15,"id":2},{"text":"CC6.1","start":16,"end":21,"id":3},{"text":"compliance","start":22,"end":32,"id":4},{"text":"monitoring","start":33,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Expert in COPPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":849420153,"_task_hash":-371286602,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"COPPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Tracked APT group activities and TTPs.","spans":[{"start":8,"end":11,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":8,"end":11,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-67829678,"_task_hash":-379054035,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"APT","start":8,"end":11,"id":1},{"text":"group","start":12,"end":17,"id":2},{"text":"activities","start":18,"end":28,"id":3},{"text":"and","start":29,"end":32,"id":4},{"text":"TTPs","start":33,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"ML Security Architect with hands-on experience in EDR Tools, QRadar, and Security Architecture.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":61,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":73,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-2095097062,"_task_hash":-472377059,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"hands","start":27,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"on","start":33,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"EDR","start":50,"end":53,"id":9},{"text":"Tools","start":54,"end":59,"id":10},{"text":",","start":59,"end":60,"id":11},{"text":"QRadar","start":61,"end":67,"id":12},{"text":",","start":67,"end":68,"id":13},{"text":"and","start":69,"end":72,"id":14},{"text":"Security","start":73,"end":81,"id":15},{"text":"Architecture","start":82,"end":94,"id":16},{"text":".","start":94,"end":95,"id":17}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Information Specialist experienced in detecting Supply Chain Attack attacks using ELK Stack.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7},{"start":82,"end":91,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-351152042,"_task_hash":1935482598,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"Supply","start":48,"end":54,"id":5},{"text":"Chain","start":55,"end":60,"id":6},{"text":"Attack","start":61,"end":67,"id":7},{"text":"attacks","start":68,"end":75,"id":8},{"text":"using","start":76,"end":81,"id":9},{"text":"ELK","start":82,"end":85,"id":10},{"text":"Stack","start":86,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} {"text":"Certified ISO 31000 working as Asset Manager, focused on Security Assessment and SQL Injection prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":57,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":51349309,"_task_hash":989715386,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"31000","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"Asset","start":31,"end":36,"id":5},{"text":"Manager","start":37,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Security","start":57,"end":65,"id":10},{"text":"Assessment","start":66,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"SQL","start":81,"end":84,"id":13},{"text":"Injection","start":85,"end":94,"id":14},{"text":"prevention","start":95,"end":105,"id":15},{"text":".","start":105,"end":106,"id":16}]} {"text":"Automated GDPR compliance monitoring.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":833384174,"_task_hash":-420685711,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"GDPR","start":10,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"monitoring","start":26,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"ISO 31000 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1268929123,"_task_hash":-308243635,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"31000","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} {"text":"Hiring Incident Manager for Red Team Operations and malware detection.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1896995374,"_task_hash":1539693263,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Incident","start":7,"end":15,"id":1},{"text":"Manager","start":16,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"Red","start":28,"end":31,"id":4},{"text":"Team","start":32,"end":36,"id":5},{"text":"Operations","start":37,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"malware","start":52,"end":59,"id":8},{"text":"detection","start":60,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} {"text":"Former CISO now advising startups on security.","spans":[{"start":7,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-865509195,"_task_hash":130361679,"tokens":[{"text":"Former","start":0,"end":6,"id":0},{"text":"CISO","start":7,"end":11,"id":1},{"text":"now","start":12,"end":15,"id":2},{"text":"advising","start":16,"end":24,"id":3},{"text":"startups","start":25,"end":33,"id":4},{"text":"on","start":34,"end":36,"id":5},{"text":"security","start":37,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Simulated DCShadow during red team exercise.","spans":[{"start":10,"end":18,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":299319587,"_task_hash":1427080436,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"DCShadow","start":10,"end":18,"id":1},{"text":"during","start":19,"end":25,"id":2},{"text":"red","start":26,"end":29,"id":3},{"text":"team","start":30,"end":34,"id":4},{"text":"exercise","start":35,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Hiring IAM Engineer for Privacy by Design and Zero-Day detection.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":24,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":46,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-876219098,"_task_hash":-1003924816,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"for","start":20,"end":23,"id":3},{"text":"Privacy","start":24,"end":31,"id":4},{"text":"by","start":32,"end":34,"id":5},{"text":"Design","start":35,"end":41,"id":6},{"text":"and","start":42,"end":45,"id":7},{"text":"Zero","start":46,"end":50,"id":8},{"text":"-","start":50,"end":51,"id":9},{"text":"Day","start":51,"end":54,"id":10},{"text":"detection","start":55,"end":64,"id":11},{"text":".","start":64,"end":65,"id":12}]} {"text":"Holds FTK certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-456716311,"_task_hash":1724365143,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"FTK","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Built custom IDS integrations with existing tools.","spans":[{"start":13,"end":16,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1580079891,"_task_hash":845790188,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"custom","start":6,"end":12,"id":1},{"text":"IDS","start":13,"end":16,"id":2},{"text":"integrations","start":17,"end":29,"id":3},{"text":"with","start":30,"end":34,"id":4},{"text":"existing","start":35,"end":43,"id":5},{"text":"tools","start":44,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Implemented controls for PCI-DSS audit.","spans":[{"start":25,"end":32,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5},{"start":25,"end":32,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":514959587,"_task_hash":416181920,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"PCI","start":25,"end":28,"id":3},{"text":"-","start":28,"end":29,"id":4},{"text":"DSS","start":29,"end":32,"id":5},{"text":"audit","start":33,"end":38,"id":6},{"text":".","start":38,"end":39,"id":7}]} {"text":"MFA & SSO required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-239499753,"_task_hash":-1526678368,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"required","start":10,"end":18,"id":3},{"text":".","start":18,"end":19,"id":4}]} {"text":"ML Security Architect experienced in detecting ransomware attacks using Splunk.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":732322781,"_task_hash":-2000809147,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Splunk","start":72,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Troubleshot UEBA performance issues.","spans":[{"start":12,"end":16,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":5919742,"_task_hash":-1364042392,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"UEBA","start":12,"end":16,"id":1},{"text":"performance","start":17,"end":28,"id":2},{"text":"issues","start":29,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Documented evidence for NIST CSF DE.CM-1 audit.","spans":[{"start":24,"end":40,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1250429748,"_task_hash":76284954,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"evidence","start":11,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"NIST","start":24,"end":28,"id":3},{"text":"CSF","start":29,"end":32,"id":4},{"text":"DE.CM-1","start":33,"end":40,"id":5},{"text":"audit","start":41,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Must know SIEM Operations, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":33,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-106006301,"_task_hash":705663433,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"Nessus","start":27,"end":33,"id":5},{"text":",","start":33,"end":34,"id":6},{"text":"and","start":35,"end":38,"id":7},{"text":"OWASP","start":39,"end":44,"id":8},{"text":"Top","start":45,"end":48,"id":9},{"text":"10","start":49,"end":51,"id":10},{"text":".","start":51,"end":52,"id":11}]} {"text":"Hiring Threat Intel Analyst for Network Detection and Response and ransomware detection.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":8},{"start":67,"end":77,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-880189697,"_task_hash":-310995043,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Threat","start":7,"end":13,"id":1},{"text":"Intel","start":14,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"Network","start":32,"end":39,"id":5},{"text":"Detection","start":40,"end":49,"id":6},{"text":"and","start":50,"end":53,"id":7},{"text":"Response","start":54,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"ransomware","start":67,"end":77,"id":10},{"text":"detection","start":78,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} {"text":"Required: OSINT, EDR Platforms, and NIST Framework expertise.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1822005119,"_task_hash":1110919644,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"OSINT","start":10,"end":15,"id":2},{"text":",","start":15,"end":16,"id":3},{"text":"EDR","start":17,"end":20,"id":4},{"text":"Platforms","start":21,"end":30,"id":5},{"text":",","start":30,"end":31,"id":6},{"text":"and","start":32,"end":35,"id":7},{"text":"NIST","start":36,"end":40,"id":8},{"text":"Framework","start":41,"end":50,"id":9},{"text":"expertise","start":51,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} {"text":"Holds TOGAF certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1058317034,"_task_hash":2099672658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Proficient in Splunk and SIEM Operations.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":2054887211,"_task_hash":1858748404,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":"Operations","start":30,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Senior Incident Response Manager skilled in Data Modeling, Bug Bounty, and Cloud Security.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":44,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":59,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":75,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":75792921,"_task_hash":1221768067,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Incident","start":7,"end":15,"id":1},{"text":"Response","start":16,"end":24,"id":2},{"text":"Manager","start":25,"end":32,"id":3},{"text":"skilled","start":33,"end":40,"id":4},{"text":"in","start":41,"end":43,"id":5},{"text":"Data","start":44,"end":48,"id":6},{"text":"Modeling","start":49,"end":57,"id":7},{"text":",","start":57,"end":58,"id":8},{"text":"Bug","start":59,"end":62,"id":9},{"text":"Bounty","start":63,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"and","start":71,"end":74,"id":12},{"text":"Cloud","start":75,"end":80,"id":13},{"text":"Security","start":81,"end":89,"id":14},{"text":".","start":89,"end":90,"id":15}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Immediate opening for Threat Detection Specialist.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":544574104,"_task_hash":2010994894,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Detection","start":29,"end":38,"id":4},{"text":"Specialist","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Experience with SOAR platforms and integration.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1335613297,"_task_hash":1568667495,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"SOAR","start":16,"end":20,"id":2},{"text":"platforms","start":21,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"integration","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Built ICS Security team from ground up.","spans":[{"start":6,"end":18,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1585793173,"_task_hash":-687260154,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"ICS","start":6,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"team","start":19,"end":23,"id":3},{"text":"from","start":24,"end":28,"id":4},{"text":"ground","start":29,"end":35,"id":5},{"text":"up","start":36,"end":38,"id":6},{"text":".","start":38,"end":39,"id":7}]} {"text":"GLBA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1328244680,"_task_hash":-1510078390,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Accomplished Business Continuity Manager specializing in C# and Security Scanning Tools.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":64,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1882260531,"_task_hash":804421001,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Business","start":13,"end":21,"id":1},{"text":"Continuity","start":22,"end":32,"id":2},{"text":"Manager","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"C","start":57,"end":58,"id":6},{"text":"#","start":58,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Security","start":64,"end":72,"id":9},{"text":"Scanning","start":73,"end":81,"id":10},{"text":"Tools","start":82,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} {"text":"Required skills: EDR Platforms, Media Relations, TLS/SSL certification.","spans":[{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":49,"end":56,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1416774968,"_task_hash":-1963616318,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Platforms","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"Media","start":32,"end":37,"id":6},{"text":"Relations","start":38,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"TLS","start":49,"end":52,"id":9},{"text":"/","start":52,"end":53,"id":10},{"text":"SSL","start":53,"end":56,"id":11},{"text":"certification","start":57,"end":70,"id":12},{"text":".","start":70,"end":71,"id":13}]} {"text":"Must know Wireshark, Metasploit, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1990514557,"_task_hash":-2062444498,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Metasploit","start":21,"end":31,"id":4},{"text":",","start":31,"end":32,"id":5},{"text":"and","start":33,"end":36,"id":6},{"text":"OWASP","start":37,"end":42,"id":7},{"text":"Top","start":43,"end":46,"id":8},{"text":"10","start":47,"end":49,"id":9},{"text":".","start":49,"end":50,"id":10}]} {"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Join our team as Front-End Developer!","spans":[{"start":17,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1962737329,"_task_hash":-753820896,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Front","start":17,"end":22,"id":4},{"text":"-","start":22,"end":23,"id":5},{"text":"End","start":23,"end":26,"id":6},{"text":"Developer","start":27,"end":36,"id":7},{"text":"!","start":36,"end":37,"id":8}]} {"text":"Coordinated Finding Report with external auditors.","spans":[{"start":12,"end":26,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-955470200,"_task_hash":-1912531605,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"Finding","start":12,"end":19,"id":1},{"text":"Report","start":20,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"external","start":32,"end":40,"id":4},{"text":"auditors","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Expert in Mobile Security best practices.","spans":[{"start":10,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-793621761,"_task_hash":-1176266336,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Mobile","start":10,"end":16,"id":2},{"text":"Security","start":17,"end":25,"id":3},{"text":"best","start":26,"end":30,"id":4},{"text":"practices","start":31,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Analyzed Lateral Movement samples in malware lab.","spans":[{"start":9,"end":25,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2046561992,"_task_hash":-370681846,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Lateral","start":9,"end":16,"id":1},{"text":"Movement","start":17,"end":25,"id":2},{"text":"samples","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"malware","start":37,"end":44,"id":5},{"text":"lab","start":45,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Principal Engineer with expertise in OWASP Top 10 compliance and Best Practices operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":65,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":517001183,"_task_hash":962912715,"tokens":[{"text":"Principal","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"expertise","start":24,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"compliance","start":50,"end":60,"id":8},{"text":"and","start":61,"end":64,"id":9},{"text":"Best","start":65,"end":69,"id":10},{"text":"Practices","start":70,"end":79,"id":11},{"text":"operations","start":80,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Hiring Network Engineer for Autonomous Navigation and worm detection.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":54,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1204473837,"_task_hash":433643784,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Network","start":7,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"Autonomous","start":28,"end":38,"id":4},{"text":"Navigation","start":39,"end":49,"id":5},{"text":"and","start":50,"end":53,"id":6},{"text":"worm","start":54,"end":58,"id":7},{"text":"detection","start":59,"end":68,"id":8},{"text":".","start":68,"end":69,"id":9}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Mitigated Remote Code Execution through code remediation.","spans":[{"start":10,"end":31,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-54378106,"_task_hash":557612274,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Remote","start":10,"end":16,"id":1},{"text":"Code","start":17,"end":21,"id":2},{"text":"Execution","start":22,"end":31,"id":3},{"text":"through","start":32,"end":39,"id":4},{"text":"code","start":40,"end":44,"id":5},{"text":"remediation","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Experienced Technology Manager specializing in Physical Security.","spans":[{"start":12,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":47,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1470957686,"_task_hash":1479628828,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Technology","start":12,"end":22,"id":1},{"text":"Manager","start":23,"end":30,"id":2},{"text":"specializing","start":31,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"Physical","start":47,"end":55,"id":5},{"text":"Security","start":56,"end":64,"id":6},{"text":".","start":64,"end":65,"id":7}]} {"text":"Required skills: Nessus, Kotlin, PRINCE2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":31,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1542057596,"_task_hash":-578400523,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Kotlin","start":25,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"PRINCE2","start":33,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Certified TOGAF working as Unity Developer, focused on Security Culture and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":76,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":642980448,"_task_hash":-226098929,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TOGAF","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Unity","start":27,"end":32,"id":4},{"text":"Developer","start":33,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Culture","start":64,"end":71,"id":10},{"text":"and","start":72,"end":75,"id":11},{"text":"CSRF","start":76,"end":80,"id":12},{"text":"prevention","start":81,"end":91,"id":13},{"text":".","start":91,"end":92,"id":14}]} {"text":"Seeking GRC Specialist with 3+ years experience in R and Secure Multi-Party Computation.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":57,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-657164487,"_task_hash":-379869526,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"GRC","start":8,"end":11,"id":1},{"text":"Specialist","start":12,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"3","start":28,"end":29,"id":4},{"text":"+","start":29,"end":30,"id":5},{"text":"years","start":31,"end":36,"id":6},{"text":"experience","start":37,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"R","start":51,"end":52,"id":9},{"text":"and","start":53,"end":56,"id":10},{"text":"Secure","start":57,"end":63,"id":11},{"text":"Multi","start":64,"end":69,"id":12},{"text":"-","start":69,"end":70,"id":13},{"text":"Party","start":70,"end":75,"id":14},{"text":"Computation","start":76,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"Remediated PDPA audit findings.","spans":[{"start":11,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":11642784,"_task_hash":-617367468,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"PDPA","start":11,"end":15,"id":1},{"text":"audit","start":16,"end":21,"id":2},{"text":"findings","start":22,"end":30,"id":3},{"text":".","start":30,"end":31,"id":4}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Immediate opening for Senior Researcher.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-967625311,"_task_hash":-104205247,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Senior","start":22,"end":28,"id":3},{"text":"Researcher","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Cloud Native Security Engineer needed for enterprise security team.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":2089569885,"_task_hash":-1192066720,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Native","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"needed","start":31,"end":37,"id":4},{"text":"for","start":38,"end":41,"id":5},{"text":"enterprise","start":42,"end":52,"id":6},{"text":"security","start":53,"end":61,"id":7},{"text":"team","start":62,"end":66,"id":8},{"text":".","start":66,"end":67,"id":9}]} {"text":"SQL certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":780911264,"_task_hash":781967052,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Accomplished Full Stack Engineer specializing in Adversary Emulation and Email Gateway Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":49,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1598707621,"_task_hash":1142615348,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Full","start":13,"end":17,"id":1},{"text":"Stack","start":18,"end":23,"id":2},{"text":"Engineer","start":24,"end":32,"id":3},{"text":"specializing","start":33,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"Adversary","start":49,"end":58,"id":6},{"text":"Emulation","start":59,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"Email","start":73,"end":78,"id":9},{"text":"Gateway","start":79,"end":86,"id":10},{"text":"Security","start":87,"end":95,"id":11},{"text":".","start":95,"end":96,"id":12}]} {"text":"Director of Security role available: Test Reporting experience required, Network Security knowledge essential.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":37,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1097327693,"_task_hash":2109142387,"tokens":[{"text":"Director","start":0,"end":8,"id":0},{"text":"of","start":9,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"role","start":21,"end":25,"id":3},{"text":"available","start":26,"end":35,"id":4},{"text":":","start":35,"end":36,"id":5},{"text":"Test","start":37,"end":41,"id":6},{"text":"Reporting","start":42,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"required","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Network","start":73,"end":80,"id":11},{"text":"Security","start":81,"end":89,"id":12},{"text":"knowledge","start":90,"end":99,"id":13},{"text":"essential","start":100,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} {"text":"Expert in Incident Response best practices.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":926967021,"_task_hash":349472690,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Incident","start":10,"end":18,"id":2},{"text":"Response","start":19,"end":27,"id":3},{"text":"best","start":28,"end":32,"id":4},{"text":"practices","start":33,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Join our team as Social Engineering Consultant!","spans":[{"start":17,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1022941716,"_task_hash":1307155354,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Social","start":17,"end":23,"id":4},{"text":"Engineering","start":24,"end":35,"id":5},{"text":"Consultant","start":36,"end":46,"id":6},{"text":"!","start":46,"end":47,"id":7}]} {"text":"Hiring AI/ML Security Specialist for Wireless Networks and Zero-Day detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":59,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1082441489,"_task_hash":-2071247084,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Security","start":13,"end":21,"id":4},{"text":"Specialist","start":22,"end":32,"id":5},{"text":"for","start":33,"end":36,"id":6},{"text":"Wireless","start":37,"end":45,"id":7},{"text":"Networks","start":46,"end":54,"id":8},{"text":"and","start":55,"end":58,"id":9},{"text":"Zero","start":59,"end":63,"id":10},{"text":"-","start":63,"end":64,"id":11},{"text":"Day","start":64,"end":67,"id":12},{"text":"detection","start":68,"end":77,"id":13},{"text":".","start":77,"end":78,"id":14}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Red Team Operator with expertise in OWASP Top 10 compliance and Network Detection and Response operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":64,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1254181518,"_task_hash":1875807319,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Operator","start":9,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"OWASP","start":36,"end":41,"id":6},{"text":"Top","start":42,"end":45,"id":7},{"text":"10","start":46,"end":48,"id":8},{"text":"compliance","start":49,"end":59,"id":9},{"text":"and","start":60,"end":63,"id":10},{"text":"Network","start":64,"end":71,"id":11},{"text":"Detection","start":72,"end":81,"id":12},{"text":"and","start":82,"end":85,"id":13},{"text":"Response","start":86,"end":94,"id":14},{"text":"operations","start":95,"end":105,"id":15},{"text":".","start":105,"end":106,"id":16}]} {"text":"Senior Data Privacy Analyst skilled in Compliance Knowledge, Recovery Planning, and Enterprise Security.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":84,"end":103,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1325057291,"_task_hash":-585643543,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Data","start":7,"end":11,"id":1},{"text":"Privacy","start":12,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"skilled","start":28,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"Compliance","start":39,"end":49,"id":6},{"text":"Knowledge","start":50,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Recovery","start":61,"end":69,"id":9},{"text":"Planning","start":70,"end":78,"id":10},{"text":",","start":78,"end":79,"id":11},{"text":"and","start":80,"end":83,"id":12},{"text":"Enterprise","start":84,"end":94,"id":13},{"text":"Security","start":95,"end":103,"id":14},{"text":".","start":103,"end":104,"id":15}]} {"text":"Recovered systems after spyware attack.","spans":[{"start":24,"end":31,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1852795677,"_task_hash":998697902,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"spyware","start":24,"end":31,"id":3},{"text":"attack","start":32,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Analyzed Buffer Overflow samples in malware lab.","spans":[{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1372323071,"_task_hash":602268230,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"Buffer","start":9,"end":15,"id":1},{"text":"Overflow","start":16,"end":24,"id":2},{"text":"samples","start":25,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"malware","start":36,"end":43,"id":5},{"text":"lab","start":44,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"We need a Cloud Security Engineer skilled in Password Spraying prevention and worm analysis using SIEM Operations.","spans":[{"start":10,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":45,"end":62,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":78,"end":82,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":98,"end":113,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":576118117,"_task_hash":-769202103,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cloud","start":10,"end":15,"id":3},{"text":"Security","start":16,"end":24,"id":4},{"text":"Engineer","start":25,"end":33,"id":5},{"text":"skilled","start":34,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Password","start":45,"end":53,"id":8},{"text":"Spraying","start":54,"end":62,"id":9},{"text":"prevention","start":63,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"worm","start":78,"end":82,"id":12},{"text":"analysis","start":83,"end":91,"id":13},{"text":"using","start":92,"end":97,"id":14},{"text":"SIEM","start":98,"end":102,"id":15},{"text":"Operations","start":103,"end":113,"id":16},{"text":".","start":113,"end":114,"id":17}]} {"text":"Accomplished Cryptography Expert specializing in Falco and Security Policies.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":59,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1670982590,"_task_hash":408628101,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cryptography","start":13,"end":25,"id":1},{"text":"Expert","start":26,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Falco","start":49,"end":54,"id":5},{"text":"and","start":55,"end":58,"id":6},{"text":"Security","start":59,"end":67,"id":7},{"text":"Policies","start":68,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} {"text":"Senior Azure Architect skilled in Machine Learning, AWS/Azure/GCP, and Supply Chain Security.","spans":[{"start":7,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":12},{"start":71,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1202969269,"_task_hash":1822001490,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Azure","start":7,"end":12,"id":1},{"text":"Architect","start":13,"end":22,"id":2},{"text":"skilled","start":23,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"Machine","start":34,"end":41,"id":5},{"text":"Learning","start":42,"end":50,"id":6},{"text":",","start":50,"end":51,"id":7},{"text":"AWS","start":52,"end":55,"id":8},{"text":"/","start":55,"end":56,"id":9},{"text":"Azure","start":56,"end":61,"id":10},{"text":"/","start":61,"end":62,"id":11},{"text":"GCP","start":62,"end":65,"id":12},{"text":",","start":65,"end":66,"id":13},{"text":"and","start":67,"end":70,"id":14},{"text":"Supply","start":71,"end":77,"id":15},{"text":"Chain","start":78,"end":83,"id":16},{"text":"Security","start":84,"end":92,"id":17},{"text":".","start":92,"end":93,"id":18}]} {"text":"Led FERPA compliance program.","spans":[{"start":4,"end":9,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":415917702,"_task_hash":591586308,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"FERPA","start":4,"end":9,"id":1},{"text":"compliance","start":10,"end":20,"id":2},{"text":"program","start":21,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Holds IDS/IPS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-851111634,"_task_hash":1084501406,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"OSCP Certification certified.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-481927897,"_task_hash":1165315794,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"certified","start":19,"end":28,"id":2},{"text":".","start":28,"end":29,"id":3}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Threat Detection Specialist with expertise in NIST Framework compliance and Routing operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1526645360,"_task_hash":391983850,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Detection","start":7,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"expertise","start":33,"end":42,"id":4},{"text":"in","start":43,"end":45,"id":5},{"text":"NIST","start":46,"end":50,"id":6},{"text":"Framework","start":51,"end":60,"id":7},{"text":"compliance","start":61,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Routing","start":76,"end":83,"id":10},{"text":"operations","start":84,"end":94,"id":11},{"text":".","start":94,"end":95,"id":12}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Remediated gaps identified in ISO 27001 A.10.1 assessment.","spans":[{"start":30,"end":46,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1102136922,"_task_hash":-1703763226,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"ISO","start":30,"end":33,"id":4},{"text":"27001","start":34,"end":39,"id":5},{"text":"A.10.1","start":40,"end":46,"id":6},{"text":"assessment","start":47,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} {"text":"Experienced Fullstack Engineer specializing in Security Hardening.","spans":[{"start":12,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":47,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1652462150,"_task_hash":-1963872609,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Fullstack","start":12,"end":21,"id":1},{"text":"Engineer","start":22,"end":30,"id":2},{"text":"specializing","start":31,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"Security","start":47,"end":55,"id":5},{"text":"Hardening","start":56,"end":65,"id":6},{"text":".","start":65,"end":66,"id":7}]} {"text":"Hiring Database Administrator for Manual Testing and ransomware detection.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":63,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":174236935,"_task_hash":854765829,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Database","start":7,"end":15,"id":1},{"text":"Administrator","start":16,"end":29,"id":2},{"text":"for","start":30,"end":33,"id":3},{"text":"Manual","start":34,"end":40,"id":4},{"text":"Testing","start":41,"end":48,"id":5},{"text":"and","start":49,"end":52,"id":6},{"text":"ransomware","start":53,"end":63,"id":7},{"text":"detection","start":64,"end":73,"id":8},{"text":".","start":73,"end":74,"id":9}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Published research on Zero Trust trends.","spans":[{"start":22,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1011680809,"_task_hash":1175126059,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Zero","start":22,"end":26,"id":3},{"text":"Trust","start":27,"end":32,"id":4},{"text":"trends","start":33,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Must know SIEM Operations, CrowdStrike, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":44,"end":56,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1647001861,"_task_hash":-146854362,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"CrowdStrike","start":27,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"and","start":40,"end":43,"id":7},{"text":"OWASP","start":44,"end":49,"id":8},{"text":"Top","start":50,"end":53,"id":9},{"text":"10","start":54,"end":56,"id":10},{"text":".","start":56,"end":57,"id":11}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Hiring Endpoint Security Engineer for Testing Libraries and trojan detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":66,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":308691446,"_task_hash":-2104830212,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Endpoint","start":7,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Testing","start":38,"end":45,"id":5},{"text":"Libraries","start":46,"end":55,"id":6},{"text":"and","start":56,"end":59,"id":7},{"text":"trojan","start":60,"end":66,"id":8},{"text":"detection","start":67,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} {"text":"Responded to APT incident affecting 1000+ users.","spans":[{"start":13,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":912544278,"_task_hash":426781050,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"APT","start":13,"end":16,"id":2},{"text":"incident","start":17,"end":25,"id":3},{"text":"affecting","start":26,"end":35,"id":4},{"text":"1000","start":36,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"users","start":42,"end":47,"id":7},{"text":".","start":47,"end":48,"id":8}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Immediate opening for Cyber Risk Insurance Specialist.","spans":[{"start":22,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":247252234,"_task_hash":166003880,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cyber","start":22,"end":27,"id":3},{"text":"Risk","start":28,"end":32,"id":4},{"text":"Insurance","start":33,"end":42,"id":5},{"text":"Specialist","start":43,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Proficient in Nessus and CrowdStrike.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1834187126,"_task_hash":-614937920,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"CrowdStrike","start":25,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Hiring Security Awareness Specialist for Sketch and rootkit detection.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1806641871,"_task_hash":288333503,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"Sketch","start":41,"end":47,"id":5},{"text":"and","start":48,"end":51,"id":6},{"text":"rootkit","start":52,"end":59,"id":7},{"text":"detection","start":60,"end":69,"id":8},{"text":".","start":69,"end":70,"id":9}]} {"text":"GCP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1956614200,"_task_hash":-459084267,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Game Developer with 3+ years experience in Indicators of Compromise, Test Frameworks, and Technical Writing.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":69,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":90,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-919150364,"_task_hash":-2107080634,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Developer","start":5,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"3","start":20,"end":21,"id":3},{"text":"+","start":21,"end":22,"id":4},{"text":"years","start":23,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"Indicators","start":43,"end":53,"id":8},{"text":"of","start":54,"end":56,"id":9},{"text":"Compromise","start":57,"end":67,"id":10},{"text":",","start":67,"end":68,"id":11},{"text":"Test","start":69,"end":73,"id":12},{"text":"Frameworks","start":74,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"and","start":86,"end":89,"id":15},{"text":"Technical","start":90,"end":99,"id":16},{"text":"Writing","start":100,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} {"text":"Senior IT Operations Manager position: 3+ years minimum, expert in Behavioral Analysis, CCTV Systems, and Security Champions Program.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":88,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":106,"end":132,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":22}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-643159214,"_task_hash":-1594219659,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IT","start":7,"end":9,"id":1},{"text":"Operations","start":10,"end":20,"id":2},{"text":"Manager","start":21,"end":28,"id":3},{"text":"position","start":29,"end":37,"id":4},{"text":":","start":37,"end":38,"id":5},{"text":"3","start":39,"end":40,"id":6},{"text":"+","start":40,"end":41,"id":7},{"text":"years","start":42,"end":47,"id":8},{"text":"minimum","start":48,"end":55,"id":9},{"text":",","start":55,"end":56,"id":10},{"text":"expert","start":57,"end":63,"id":11},{"text":"in","start":64,"end":66,"id":12},{"text":"Behavioral","start":67,"end":77,"id":13},{"text":"Analysis","start":78,"end":86,"id":14},{"text":",","start":86,"end":87,"id":15},{"text":"CCTV","start":88,"end":92,"id":16},{"text":"Systems","start":93,"end":100,"id":17},{"text":",","start":100,"end":101,"id":18},{"text":"and","start":102,"end":105,"id":19},{"text":"Security","start":106,"end":114,"id":20},{"text":"Champions","start":115,"end":124,"id":21},{"text":"Program","start":125,"end":132,"id":22},{"text":".","start":132,"end":133,"id":23}]} {"text":"SPF/DKIM/DMARC certification a plus.","spans":[{"start":0,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":293516817,"_task_hash":-35156834,"tokens":[{"text":"SPF","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DKIM","start":4,"end":8,"id":2},{"text":"/","start":8,"end":9,"id":3},{"text":"DMARC","start":9,"end":14,"id":4},{"text":"certification","start":15,"end":28,"id":5},{"text":"a","start":29,"end":30,"id":6},{"text":"plus","start":31,"end":35,"id":7},{"text":".","start":35,"end":36,"id":8}]} {"text":"Tech Support Specialist with 10 years experience in Risk Assessment, Secure SDLC, and Dark Web Monitoring.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":86,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":430498534,"_task_hash":-1052397575,"tokens":[{"text":"Tech","start":0,"end":4,"id":0},{"text":"Support","start":5,"end":12,"id":1},{"text":"Specialist","start":13,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"10","start":29,"end":31,"id":4},{"text":"years","start":32,"end":37,"id":5},{"text":"experience","start":38,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Risk","start":52,"end":56,"id":8},{"text":"Assessment","start":57,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Secure","start":69,"end":75,"id":11},{"text":"SDLC","start":76,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"and","start":82,"end":85,"id":14},{"text":"Dark","start":86,"end":90,"id":15},{"text":"Web","start":91,"end":94,"id":16},{"text":"Monitoring","start":95,"end":105,"id":17},{"text":".","start":105,"end":106,"id":18}]} {"text":"Accomplished Cryptography Expert specializing in OpenVAS and Building Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":61,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-938451149,"_task_hash":-599323517,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cryptography","start":13,"end":25,"id":1},{"text":"Expert","start":26,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"OpenVAS","start":49,"end":56,"id":5},{"text":"and","start":57,"end":60,"id":6},{"text":"Building","start":61,"end":69,"id":7},{"text":"Security","start":70,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} {"text":"Responsible for SIEM operations and maintenance.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":698638251,"_task_hash":585147298,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"SIEM","start":16,"end":20,"id":2},{"text":"operations","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"maintenance","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Database Manager role available: User Management experience required, Container Registry Security knowledge essential.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":700113122,"_task_hash":-1940952594,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"role","start":17,"end":21,"id":2},{"text":"available","start":22,"end":31,"id":3},{"text":":","start":31,"end":32,"id":4},{"text":"User","start":33,"end":37,"id":5},{"text":"Management","start":38,"end":48,"id":6},{"text":"experience","start":49,"end":59,"id":7},{"text":"required","start":60,"end":68,"id":8},{"text":",","start":68,"end":69,"id":9},{"text":"Container","start":70,"end":79,"id":10},{"text":"Registry","start":80,"end":88,"id":11},{"text":"Security","start":89,"end":97,"id":12},{"text":"knowledge","start":98,"end":107,"id":13},{"text":"essential","start":108,"end":117,"id":14},{"text":".","start":117,"end":118,"id":15}]} {"text":"Hiring Identity Management Engineer for Mobile Testing and ransomware detection.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":69,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":952000648,"_task_hash":-1044159994,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Identity","start":7,"end":15,"id":1},{"text":"Management","start":16,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"Mobile","start":40,"end":46,"id":5},{"text":"Testing","start":47,"end":54,"id":6},{"text":"and","start":55,"end":58,"id":7},{"text":"ransomware","start":59,"end":69,"id":8},{"text":"detection","start":70,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} {"text":"Assessed OT Security maturity using industry frameworks.","spans":[{"start":9,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":20,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2138528030,"_task_hash":1431192295,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"OT","start":9,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"maturity","start":21,"end":29,"id":3},{"text":"using","start":30,"end":35,"id":4},{"text":"industry","start":36,"end":44,"id":5},{"text":"frameworks","start":45,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Content Writer role available: Figma experience required, Network Security knowledge essential.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":586887002,"_task_hash":1338489601,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Writer","start":8,"end":14,"id":1},{"text":"role","start":15,"end":19,"id":2},{"text":"available","start":20,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"Figma","start":31,"end":36,"id":5},{"text":"experience","start":37,"end":47,"id":6},{"text":"required","start":48,"end":56,"id":7},{"text":",","start":56,"end":57,"id":8},{"text":"Network","start":58,"end":65,"id":9},{"text":"Security","start":66,"end":74,"id":10},{"text":"knowledge","start":75,"end":84,"id":11},{"text":"essential","start":85,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} {"text":"Expert in Security Engineering best practices.","spans":[{"start":10,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1756228643,"_task_hash":-2099036827,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"Engineering","start":19,"end":30,"id":3},{"text":"best","start":31,"end":35,"id":4},{"text":"practices","start":36,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Led Privacy Act compliance program.","spans":[{"start":4,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1332103440,"_task_hash":1720469377,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Privacy","start":4,"end":11,"id":1},{"text":"Act","start":12,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":"program","start":27,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Lead IT Project Manager managing Device Integration and Firewall Management initiatives.","spans":[{"start":5,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":33,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":807665500,"_task_hash":-1327089938,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"IT","start":5,"end":7,"id":1},{"text":"Project","start":8,"end":15,"id":2},{"text":"Manager","start":16,"end":23,"id":3},{"text":"managing","start":24,"end":32,"id":4},{"text":"Device","start":33,"end":39,"id":5},{"text":"Integration","start":40,"end":51,"id":6},{"text":"and","start":52,"end":55,"id":7},{"text":"Firewall","start":56,"end":64,"id":8},{"text":"Management","start":65,"end":75,"id":9},{"text":"initiatives","start":76,"end":87,"id":10},{"text":".","start":87,"end":88,"id":11}]} {"text":"Developed SOC 2 policies and procedures.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1402756114,"_task_hash":908570790,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"SOC","start":10,"end":13,"id":1},{"text":"2","start":14,"end":15,"id":2},{"text":"policies","start":16,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"procedures","start":29,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Holds SPF/DKIM/DMARC.","spans":[{"start":6,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1913135987,"_task_hash":1543218771,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SPF","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DKIM","start":10,"end":14,"id":3},{"text":"/","start":14,"end":15,"id":4},{"text":"DMARC","start":15,"end":20,"id":5},{"text":".","start":20,"end":21,"id":6}]} {"text":"RBAC certification a plus.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":479536652,"_task_hash":-1704214098,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"certification","start":5,"end":18,"id":1},{"text":"a","start":19,"end":20,"id":2},{"text":"plus","start":21,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Proficient in SIEM Operations and Wireshark.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1713862332,"_task_hash":-425363729,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"Wireshark","start":34,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Risk Analyst with GCP Security certification, expert in BloodHound.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":18,"end":30,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":56,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1334450066,"_task_hash":-1014846384,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"GCP","start":18,"end":21,"id":3},{"text":"Security","start":22,"end":30,"id":4},{"text":"certification","start":31,"end":44,"id":5},{"text":",","start":44,"end":45,"id":6},{"text":"expert","start":46,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"BloodHound","start":56,"end":66,"id":9},{"text":".","start":66,"end":67,"id":10}]} {"text":"Holds IAM.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-2085623792,"_task_hash":610740032,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IAM","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Experienced Incident Manager specializing in Cloud Security Architecture.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1147176313,"_task_hash":2064941348,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Incident","start":12,"end":20,"id":1},{"text":"Manager","start":21,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Cloud","start":45,"end":50,"id":5},{"text":"Security","start":51,"end":59,"id":6},{"text":"Architecture","start":60,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} {"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Senior Technical Support Engineer skilled in Social Media Content, Deep Learning, and Supply Chain Security.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":45,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":86,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1407658899,"_task_hash":436116684,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technical","start":7,"end":16,"id":1},{"text":"Support","start":17,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"skilled","start":34,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"Social","start":45,"end":51,"id":6},{"text":"Media","start":52,"end":57,"id":7},{"text":"Content","start":58,"end":65,"id":8},{"text":",","start":65,"end":66,"id":9},{"text":"Deep","start":67,"end":71,"id":10},{"text":"Learning","start":72,"end":80,"id":11},{"text":",","start":80,"end":81,"id":12},{"text":"and","start":82,"end":85,"id":13},{"text":"Supply","start":86,"end":92,"id":14},{"text":"Chain","start":93,"end":98,"id":15},{"text":"Security","start":99,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Mentored junior engineers in DevSecOps.","spans":[{"start":29,"end":38,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-208478624,"_task_hash":36863201,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"DevSecOps","start":29,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Join our team as Azure Architect!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1765962906,"_task_hash":794117656,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Azure","start":17,"end":22,"id":4},{"text":"Architect","start":23,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Certified NIST RMF working as Security Tester, focused on Physical Security and XXE prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":58,"end":75,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":80,"end":83,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-779515662,"_task_hash":2120551588,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Security","start":30,"end":38,"id":5},{"text":"Tester","start":39,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"focused","start":47,"end":54,"id":8},{"text":"on","start":55,"end":57,"id":9},{"text":"Physical","start":58,"end":66,"id":10},{"text":"Security","start":67,"end":75,"id":11},{"text":"and","start":76,"end":79,"id":12},{"text":"XXE","start":80,"end":83,"id":13},{"text":"prevention","start":84,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} {"text":"Implemented Purple Team controls and monitoring.","spans":[{"start":12,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1963746080,"_task_hash":-551396780,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Purple","start":12,"end":18,"id":1},{"text":"Team","start":19,"end":23,"id":2},{"text":"controls","start":24,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"monitoring","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"VP of Security with CGEIT certification, expert in Metasploit.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":25,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-323790184,"_task_hash":1384871684,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"CGEIT","start":20,"end":25,"id":4},{"text":"certification","start":26,"end":39,"id":5},{"text":",","start":39,"end":40,"id":6},{"text":"expert","start":41,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"Metasploit","start":51,"end":61,"id":9},{"text":".","start":61,"end":62,"id":10}]} {"text":"Hiring UI Designer for Cost Optimization and worm detection.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":23,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":45,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":2136785600,"_task_hash":380521804,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"UI","start":7,"end":9,"id":1},{"text":"Designer","start":10,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Cost","start":23,"end":27,"id":4},{"text":"Optimization","start":28,"end":40,"id":5},{"text":"and","start":41,"end":44,"id":6},{"text":"worm","start":45,"end":49,"id":7},{"text":"detection","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Automated SOC 2 compliance monitoring.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-603981603,"_task_hash":1988602221,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"SOC","start":10,"end":13,"id":1},{"text":"2","start":14,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":"monitoring","start":27,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} {"text":"HIPAA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-484932612,"_task_hash":-1879933100,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Holds TOGAF.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1596309033,"_task_hash":-980631001,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"Reported HIPAA compliance status to board.","spans":[{"start":9,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1363132700,"_task_hash":1570457542,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"HIPAA","start":9,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"status","start":26,"end":32,"id":3},{"text":"to","start":33,"end":35,"id":4},{"text":"board","start":36,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"Holds VPN.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-258694512,"_task_hash":-2076495719,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"VPN","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Certified VR/AR working as Enterprise Cloud Architect, focused on Cloud Native Security and Remote Code Execution prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":66,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14},{"start":92,"end":113,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":16,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-181541900,"_task_hash":-1311644276,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"VR","start":10,"end":12,"id":1},{"text":"/","start":12,"end":13,"id":2},{"text":"AR","start":13,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Enterprise","start":27,"end":37,"id":6},{"text":"Cloud","start":38,"end":43,"id":7},{"text":"Architect","start":44,"end":53,"id":8},{"text":",","start":53,"end":54,"id":9},{"text":"focused","start":55,"end":62,"id":10},{"text":"on","start":63,"end":65,"id":11},{"text":"Cloud","start":66,"end":71,"id":12},{"text":"Native","start":72,"end":78,"id":13},{"text":"Security","start":79,"end":87,"id":14},{"text":"and","start":88,"end":91,"id":15},{"text":"Remote","start":92,"end":98,"id":16},{"text":"Code","start":99,"end":103,"id":17},{"text":"Execution","start":104,"end":113,"id":18},{"text":"prevention","start":114,"end":124,"id":19},{"text":".","start":124,"end":125,"id":20}]} {"text":"Must know SIEM Operations, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":44,"end":58,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-840925056,"_task_hash":-254852487,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"CrowdStrike","start":27,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"and","start":40,"end":43,"id":7},{"text":"NIST","start":44,"end":48,"id":8},{"text":"Framework","start":49,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"Senior Code Reviewer position: 10 years minimum, expert in Back End, MLflow, and Mobile Security.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":59,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":69,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":81,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1332852240,"_task_hash":1129419724,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Code","start":7,"end":11,"id":1},{"text":"Reviewer","start":12,"end":20,"id":2},{"text":"position","start":21,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"10","start":31,"end":33,"id":5},{"text":"years","start":34,"end":39,"id":6},{"text":"minimum","start":40,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"expert","start":49,"end":55,"id":9},{"text":"in","start":56,"end":58,"id":10},{"text":"Back","start":59,"end":63,"id":11},{"text":"End","start":64,"end":67,"id":12},{"text":",","start":67,"end":68,"id":13},{"text":"MLflow","start":69,"end":75,"id":14},{"text":",","start":75,"end":76,"id":15},{"text":"and","start":77,"end":80,"id":16},{"text":"Mobile","start":81,"end":87,"id":17},{"text":"Security","start":88,"end":96,"id":18},{"text":".","start":96,"end":97,"id":19}]} {"text":"Hiring Defensive Security Analyst for User Research and Zero-Day detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":505728225,"_task_hash":-441697243,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Defensive","start":7,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"User","start":38,"end":42,"id":5},{"text":"Research","start":43,"end":51,"id":6},{"text":"and","start":52,"end":55,"id":7},{"text":"Zero","start":56,"end":60,"id":8},{"text":"-","start":60,"end":61,"id":9},{"text":"Day","start":61,"end":64,"id":10},{"text":"detection","start":65,"end":74,"id":11},{"text":".","start":74,"end":75,"id":12}]} {"text":"Cloud Native Security Engineer with expertise in OWASP Top 10 compliance and Asset Lifecycle operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":49,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":77,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1546904013,"_task_hash":983283359,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Native","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"with","start":31,"end":35,"id":4},{"text":"expertise","start":36,"end":45,"id":5},{"text":"in","start":46,"end":48,"id":6},{"text":"OWASP","start":49,"end":54,"id":7},{"text":"Top","start":55,"end":58,"id":8},{"text":"10","start":59,"end":61,"id":9},{"text":"compliance","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Asset","start":77,"end":82,"id":12},{"text":"Lifecycle","start":83,"end":92,"id":13},{"text":"operations","start":93,"end":103,"id":14},{"text":".","start":103,"end":104,"id":15}]} {"text":"Admin professional with 10++ years implementing EDR Tools and managing War Room Management programs.","spans":[{"start":0,"end":5,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":48,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":7},{"start":71,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-86866202,"_task_hash":716794971,"tokens":[{"text":"Admin","start":0,"end":5,"id":0},{"text":"professional","start":6,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"10++","start":24,"end":28,"id":3},{"text":"years","start":29,"end":34,"id":4},{"text":"implementing","start":35,"end":47,"id":5},{"text":"EDR","start":48,"end":51,"id":6},{"text":"Tools","start":52,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"managing","start":62,"end":70,"id":9},{"text":"War","start":71,"end":74,"id":10},{"text":"Room","start":75,"end":79,"id":11},{"text":"Management","start":80,"end":90,"id":12},{"text":"programs","start":91,"end":99,"id":13},{"text":".","start":99,"end":100,"id":14}]} {"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"GLBA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1561603999,"_task_hash":-1822236823,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"RBAC required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1198453295,"_task_hash":1243055279,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Must have Wireshark experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-365965101,"_task_hash":69203069,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"OWASP","start":35,"end":40,"id":5},{"text":"Top","start":41,"end":44,"id":6},{"text":"10","start":45,"end":47,"id":7},{"text":"knowledge","start":48,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} {"text":"Seeking Anti-Phishing Specialist with 10++ years experience in AI Regulation and Forensic Tools.","spans":[{"start":8,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":63,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":706341291,"_task_hash":239091592,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Anti","start":8,"end":12,"id":1},{"text":"-","start":12,"end":13,"id":2},{"text":"Phishing","start":13,"end":21,"id":3},{"text":"Specialist","start":22,"end":32,"id":4},{"text":"with","start":33,"end":37,"id":5},{"text":"10++","start":38,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"experience","start":49,"end":59,"id":8},{"text":"in","start":60,"end":62,"id":9},{"text":"AI","start":63,"end":65,"id":10},{"text":"Regulation","start":66,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Forensic","start":81,"end":89,"id":13},{"text":"Tools","start":90,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Required: NLP, Burp Suite, and NIST Framework expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1359268070,"_task_hash":-259492956,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"NLP","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"Burp","start":15,"end":19,"id":4},{"text":"Suite","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} {"text":"GRC Analyst with expertise in NIST Framework compliance and Device Integration operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1118314810,"_task_hash":260138306,"tokens":[{"text":"GRC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"expertise","start":17,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"compliance","start":45,"end":55,"id":7},{"text":"and","start":56,"end":59,"id":8},{"text":"Device","start":60,"end":66,"id":9},{"text":"Integration","start":67,"end":78,"id":10},{"text":"operations","start":79,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} {"text":"Assessed PKI Management maturity using industry frameworks.","spans":[{"start":9,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1899067814,"_task_hash":978744918,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"PKI","start":9,"end":12,"id":1},{"text":"Management","start":13,"end":23,"id":2},{"text":"maturity","start":24,"end":32,"id":3},{"text":"using","start":33,"end":38,"id":4},{"text":"industry","start":39,"end":47,"id":5},{"text":"frameworks","start":48,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Proficient in SIEM and SIEM.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":811880091,"_task_hash":-1035915711,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"SIEM","start":23,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Network Administrator experienced in detecting botnet attacks using EDR Platforms.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1073499172,"_task_hash":563094436,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Administrator","start":8,"end":21,"id":1},{"text":"experienced","start":22,"end":33,"id":2},{"text":"in","start":34,"end":36,"id":3},{"text":"detecting","start":37,"end":46,"id":4},{"text":"botnet","start":47,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"EDR","start":68,"end":71,"id":8},{"text":"Platforms","start":72,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} {"text":"Developed detection for Credential Dumping attacks.","spans":[{"start":24,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1932565357,"_task_hash":1473158967,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Credential","start":24,"end":34,"id":3},{"text":"Dumping","start":35,"end":42,"id":4},{"text":"attacks","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Holds TOGAF.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1596309033,"_task_hash":-980631001,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Accomplished Principal Engineer specializing in Push Notifications and Model Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-70246204,"_task_hash":428726276,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Principal","start":13,"end":22,"id":1},{"text":"Engineer","start":23,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Push","start":48,"end":52,"id":5},{"text":"Notifications","start":53,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"Model","start":71,"end":76,"id":8},{"text":"Security","start":77,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} {"text":"Test Automation Specialist professional with 10++ years implementing SIEM Operations and managing Computer Vision programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":69,"end":84,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":98,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-182286876,"_task_hash":-538120536,"tokens":[{"text":"Test","start":0,"end":4,"id":0},{"text":"Automation","start":5,"end":15,"id":1},{"text":"Specialist","start":16,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"10++","start":45,"end":49,"id":5},{"text":"years","start":50,"end":55,"id":6},{"text":"implementing","start":56,"end":68,"id":7},{"text":"SIEM","start":69,"end":73,"id":8},{"text":"Operations","start":74,"end":84,"id":9},{"text":"and","start":85,"end":88,"id":10},{"text":"managing","start":89,"end":97,"id":11},{"text":"Computer","start":98,"end":106,"id":12},{"text":"Vision","start":107,"end":113,"id":13},{"text":"programs","start":114,"end":122,"id":14},{"text":".","start":122,"end":123,"id":15}]} {"text":"Published threat intel report on DDoS trends.","spans":[{"start":33,"end":37,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1896853384,"_task_hash":-291946518,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"DDoS","start":33,"end":37,"id":5},{"text":"trends","start":38,"end":44,"id":6},{"text":".","start":44,"end":45,"id":7}]} {"text":"Required: OSCP Certification, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":30,"end":39,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1224765620,"_task_hash":-1703529489,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"OSCP","start":10,"end":14,"id":2},{"text":"Certification","start":15,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"ELK","start":30,"end":33,"id":5},{"text":"Stack","start":34,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"and","start":41,"end":44,"id":8},{"text":"OWASP","start":45,"end":50,"id":9},{"text":"Top","start":51,"end":54,"id":10},{"text":"10","start":55,"end":57,"id":11},{"text":"expertise","start":58,"end":67,"id":12},{"text":".","start":67,"end":68,"id":13}]} {"text":"Holds IDS/IPS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-851111634,"_task_hash":1084501406,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Experience with ZTNA platforms and integration.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":182583255,"_task_hash":-1416733657,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"ZTNA","start":16,"end":20,"id":2},{"text":"platforms","start":21,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"integration","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Business Intelligence Developer with expertise in OWASP Top 10 compliance and Responsive Design operations.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":62,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":78,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-390213284,"_task_hash":515086785,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Intelligence","start":9,"end":21,"id":1},{"text":"Developer","start":22,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"expertise","start":37,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"OWASP","start":50,"end":55,"id":6},{"text":"Top","start":56,"end":59,"id":7},{"text":"10","start":60,"end":62,"id":8},{"text":"compliance","start":63,"end":73,"id":9},{"text":"and","start":74,"end":77,"id":10},{"text":"Responsive","start":78,"end":88,"id":11},{"text":"Design","start":89,"end":95,"id":12},{"text":"operations","start":96,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} {"text":"Full Stack Software Engineer with expertise in OWASP Top 10 compliance and Infrastructure Design operations.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":47,"end":59,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9},{"start":75,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-399800212,"_task_hash":-1705545277,"tokens":[{"text":"Full","start":0,"end":4,"id":0},{"text":"Stack","start":5,"end":10,"id":1},{"text":"Software","start":11,"end":19,"id":2},{"text":"Engineer","start":20,"end":28,"id":3},{"text":"with","start":29,"end":33,"id":4},{"text":"expertise","start":34,"end":43,"id":5},{"text":"in","start":44,"end":46,"id":6},{"text":"OWASP","start":47,"end":52,"id":7},{"text":"Top","start":53,"end":56,"id":8},{"text":"10","start":57,"end":59,"id":9},{"text":"compliance","start":60,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"Infrastructure","start":75,"end":89,"id":12},{"text":"Design","start":90,"end":96,"id":13},{"text":"operations","start":97,"end":107,"id":14},{"text":".","start":107,"end":108,"id":15}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Lead Cloud Security Analyst managing Quantitative Research and Kinematics initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1741886891,"_task_hash":-534428039,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cloud","start":5,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"managing","start":28,"end":36,"id":4},{"text":"Quantitative","start":37,"end":49,"id":5},{"text":"Research","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Kinematics","start":63,"end":73,"id":8},{"text":"initiatives","start":74,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} {"text":"Holds PMP Certification certification.","spans":[{"start":6,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":2030040309,"_task_hash":-323248320,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PMP","start":6,"end":9,"id":1},{"text":"Certification","start":10,"end":23,"id":2},{"text":"certification","start":24,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"We need a Automation Engineer skilled in Path Traversal prevention and spyware analysis using EDR Platforms.","spans":[{"start":10,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":41,"end":55,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":71,"end":78,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":94,"end":107,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-96889716,"_task_hash":-2133098035,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Automation","start":10,"end":20,"id":3},{"text":"Engineer","start":21,"end":29,"id":4},{"text":"skilled","start":30,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"Path","start":41,"end":45,"id":7},{"text":"Traversal","start":46,"end":55,"id":8},{"text":"prevention","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"spyware","start":71,"end":78,"id":11},{"text":"analysis","start":79,"end":87,"id":12},{"text":"using","start":88,"end":93,"id":13},{"text":"EDR","start":94,"end":97,"id":14},{"text":"Platforms","start":98,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"Configured IAM policies for least privilege.","spans":[{"start":11,"end":14,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1665071167,"_task_hash":1296283707,"tokens":[{"text":"Configured","start":0,"end":10,"id":0},{"text":"IAM","start":11,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"least","start":28,"end":33,"id":4},{"text":"privilege","start":34,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Join our team as Crisis Management Specialist!","spans":[{"start":17,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1592356676,"_task_hash":-2053007466,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Crisis","start":17,"end":23,"id":4},{"text":"Management","start":24,"end":34,"id":5},{"text":"Specialist","start":35,"end":45,"id":6},{"text":"!","start":45,"end":46,"id":7}]} {"text":"Join our team as Systems Administrator!","spans":[{"start":17,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1423444543,"_task_hash":-155329908,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Systems","start":17,"end":24,"id":4},{"text":"Administrator","start":25,"end":38,"id":5},{"text":"!","start":38,"end":39,"id":6}]} {"text":"Tested WAF rules against Integer Overflow payloads.","spans":[{"start":25,"end":41,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1876662347,"_task_hash":701111621,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Integer","start":25,"end":32,"id":4},{"text":"Overflow","start":33,"end":41,"id":5},{"text":"payloads","start":42,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Created detection rules for CVE-2020-1472 exploitation attempts.","spans":[{"start":28,"end":41,"label":"CVE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1470253467,"_task_hash":-941631260,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"detection","start":8,"end":17,"id":1},{"text":"rules","start":18,"end":23,"id":2},{"text":"for","start":24,"end":27,"id":3},{"text":"CVE-2020","start":28,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"1472","start":37,"end":41,"id":6},{"text":"exploitation","start":42,"end":54,"id":7},{"text":"attempts","start":55,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Mitigated Reflective DLL Loading through code remediation.","spans":[{"start":10,"end":32,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1296010376,"_task_hash":989524945,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Reflective","start":10,"end":20,"id":1},{"text":"DLL","start":21,"end":24,"id":2},{"text":"Loading","start":25,"end":32,"id":3},{"text":"through","start":33,"end":40,"id":4},{"text":"code","start":41,"end":45,"id":5},{"text":"remediation","start":46,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Automated CCPA compliance monitoring.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":412034061,"_task_hash":-2078262947,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"CCPA","start":10,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"monitoring","start":26,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Specialized in Key Management for enterprise environments.","spans":[{"start":15,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":15,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1862683411,"_task_hash":-1010022874,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Key","start":15,"end":18,"id":2},{"text":"Management","start":19,"end":29,"id":3},{"text":"for","start":30,"end":33,"id":4},{"text":"enterprise","start":34,"end":44,"id":5},{"text":"environments","start":45,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Holds NIST RMF.","spans":[{"start":6,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1769087407,"_task_hash":-23255768,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"NIST","start":6,"end":10,"id":1},{"text":"RMF","start":11,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Required skills: Metasploit, Secure Coding, AI UX certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1067198922,"_task_hash":-1320139762,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"Secure","start":29,"end":35,"id":5},{"text":"Coding","start":36,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"AI","start":44,"end":46,"id":8},{"text":"UX","start":47,"end":49,"id":9},{"text":"certification","start":50,"end":63,"id":10},{"text":".","start":63,"end":64,"id":11}]} {"text":"Briefed executives on BEC risks.","spans":[{"start":22,"end":25,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":25,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":29195622,"_task_hash":-74068914,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"BEC","start":22,"end":25,"id":3},{"text":"risks","start":26,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Expert in GLBA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1495699365,"_task_hash":435438006,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GLBA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Led IAM modernization initiative.","spans":[{"start":4,"end":7,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":372342738,"_task_hash":198870299,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"IAM","start":4,"end":7,"id":1},{"text":"modernization","start":8,"end":21,"id":2},{"text":"initiative","start":22,"end":32,"id":3},{"text":".","start":32,"end":33,"id":4}]} {"text":"SDET with 3 years experience in Incident Management Tools, Phishing Ops, and C#.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":59,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":77,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":720921048,"_task_hash":1061813357,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"with","start":5,"end":9,"id":1},{"text":"3","start":10,"end":11,"id":2},{"text":"years","start":12,"end":17,"id":3},{"text":"experience","start":18,"end":28,"id":4},{"text":"in","start":29,"end":31,"id":5},{"text":"Incident","start":32,"end":40,"id":6},{"text":"Management","start":41,"end":51,"id":7},{"text":"Tools","start":52,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"Phishing","start":59,"end":67,"id":10},{"text":"Ops","start":68,"end":71,"id":11},{"text":",","start":71,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"C","start":77,"end":78,"id":14},{"text":"#","start":78,"end":79,"id":15},{"text":".","start":79,"end":80,"id":16}]} {"text":"Required skills: Metasploit, Deployment, SLAM certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":41,"end":45,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1597690886,"_task_hash":-570256320,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"Deployment","start":29,"end":39,"id":5},{"text":",","start":39,"end":40,"id":6},{"text":"SLAM","start":41,"end":45,"id":7},{"text":"certification","start":46,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"OPA certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1792304265,"_task_hash":-919128943,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Vulnerability Assessment Analyst needed for enterprise security team.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-332314955,"_task_hash":-1160132157,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Assessment","start":14,"end":24,"id":1},{"text":"Analyst","start":25,"end":32,"id":2},{"text":"needed","start":33,"end":39,"id":3},{"text":"for","start":40,"end":43,"id":4},{"text":"enterprise","start":44,"end":54,"id":5},{"text":"security","start":55,"end":63,"id":6},{"text":"team","start":64,"end":68,"id":7},{"text":".","start":68,"end":69,"id":8}]} {"text":"Developed detection for Silver Ticket attacks.","spans":[{"start":24,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1323748625,"_task_hash":1856251943,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Silver","start":24,"end":30,"id":3},{"text":"Ticket","start":31,"end":37,"id":4},{"text":"attacks","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Senior Research Analyst skilled in Consent Management, HR Collaboration, and Kubernetes Security.","spans":[{"start":7,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":35,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":77,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":902184263,"_task_hash":1408534617,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Research","start":7,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"skilled","start":24,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"Consent","start":35,"end":42,"id":5},{"text":"Management","start":43,"end":53,"id":6},{"text":",","start":53,"end":54,"id":7},{"text":"HR","start":55,"end":57,"id":8},{"text":"Collaboration","start":58,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Kubernetes","start":77,"end":87,"id":12},{"text":"Security","start":88,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"Certified SOC 2 working as Automation Engineer, focused on Security Scanning and XXE prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":27,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":84,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-738918112,"_task_hash":-190190513,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SOC","start":10,"end":13,"id":1},{"text":"2","start":14,"end":15,"id":2},{"text":"working","start":16,"end":23,"id":3},{"text":"as","start":24,"end":26,"id":4},{"text":"Automation","start":27,"end":37,"id":5},{"text":"Engineer","start":38,"end":46,"id":6},{"text":",","start":46,"end":47,"id":7},{"text":"focused","start":48,"end":55,"id":8},{"text":"on","start":56,"end":58,"id":9},{"text":"Security","start":59,"end":67,"id":10},{"text":"Scanning","start":68,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"XXE","start":81,"end":84,"id":13},{"text":"prevention","start":85,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} {"text":"Proficient in Wireshark and Splunk.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-599984068,"_task_hash":937635778,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"Splunk","start":28,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"IT Manager role available: Coverage Analysis experience required, Kubernetes Security knowledge essential.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":27,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":70417682,"_task_hash":863908192,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"role","start":11,"end":15,"id":2},{"text":"available","start":16,"end":25,"id":3},{"text":":","start":25,"end":26,"id":4},{"text":"Coverage","start":27,"end":35,"id":5},{"text":"Analysis","start":36,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"required","start":56,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"Kubernetes","start":66,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"knowledge","start":86,"end":95,"id":12},{"text":"essential","start":96,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Solutions Architect with 10 years experience in React Native, AI Governance, and Microsoft Defender.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":62,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1997214003,"_task_hash":-896181077,"tokens":[{"text":"Solutions","start":0,"end":9,"id":0},{"text":"Architect","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"10","start":25,"end":27,"id":3},{"text":"years","start":28,"end":33,"id":4},{"text":"experience","start":34,"end":44,"id":5},{"text":"in","start":45,"end":47,"id":6},{"text":"React","start":48,"end":53,"id":7},{"text":"Native","start":54,"end":60,"id":8},{"text":",","start":60,"end":61,"id":9},{"text":"AI","start":62,"end":64,"id":10},{"text":"Governance","start":65,"end":75,"id":11},{"text":",","start":75,"end":76,"id":12},{"text":"and","start":77,"end":80,"id":13},{"text":"Microsoft","start":81,"end":90,"id":14},{"text":"Defender","start":91,"end":99,"id":15},{"text":".","start":99,"end":100,"id":16}]} {"text":"Hiring Director of Security for SEO Writing and botnet detection.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":48,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":158248260,"_task_hash":636341718,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Director","start":7,"end":15,"id":1},{"text":"of","start":16,"end":18,"id":2},{"text":"Security","start":19,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"SEO","start":32,"end":35,"id":5},{"text":"Writing","start":36,"end":43,"id":6},{"text":"and","start":44,"end":47,"id":7},{"text":"botnet","start":48,"end":54,"id":8},{"text":"detection","start":55,"end":64,"id":9},{"text":".","start":64,"end":65,"id":10}]} {"text":"Reported SOX compliance status to board.","spans":[{"start":9,"end":12,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":12,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1819456292,"_task_hash":2143100023,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"SOX","start":9,"end":12,"id":1},{"text":"compliance","start":13,"end":23,"id":2},{"text":"status","start":24,"end":30,"id":3},{"text":"to","start":31,"end":33,"id":4},{"text":"board","start":34,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Expert in Vulnerability Management best practices.","spans":[{"start":10,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-544560634,"_task_hash":-125404128,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Vulnerability","start":10,"end":23,"id":2},{"text":"Management","start":24,"end":34,"id":3},{"text":"best","start":35,"end":39,"id":4},{"text":"practices","start":40,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Security Assessment Analyst professional with 3+ years implementing Nessus and managing CI/CD for ML programs.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":88,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-757179131,"_task_hash":1842214287,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Assessment","start":9,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"professional","start":28,"end":40,"id":3},{"text":"with","start":41,"end":45,"id":4},{"text":"3","start":46,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"Nessus","start":68,"end":74,"id":9},{"text":"and","start":75,"end":78,"id":10},{"text":"managing","start":79,"end":87,"id":11},{"text":"CI","start":88,"end":90,"id":12},{"text":"/","start":90,"end":91,"id":13},{"text":"CD","start":91,"end":93,"id":14},{"text":"for","start":94,"end":97,"id":15},{"text":"ML","start":98,"end":100,"id":16},{"text":"programs","start":101,"end":109,"id":17},{"text":".","start":109,"end":110,"id":18}]} {"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Experienced Service Incident Manager specializing in Hardware Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":165046819,"_task_hash":-1662115456,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Service","start":12,"end":19,"id":1},{"text":"Incident","start":20,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Hardware","start":53,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Expert in SCADA Security best practices.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":945388333,"_task_hash":623779651,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SCADA","start":10,"end":15,"id":2},{"text":"Security","start":16,"end":24,"id":3},{"text":"best","start":25,"end":29,"id":4},{"text":"practices","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Expert in HIPAA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-768324278,"_task_hash":-2027532621,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"HIPAA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Published threat intel report on ransomware trends.","spans":[{"start":33,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":372024579,"_task_hash":-380788499,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"ransomware","start":33,"end":43,"id":5},{"text":"trends","start":44,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Responded to cryptominer incident affecting 1000+ users.","spans":[{"start":13,"end":24,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1388842662,"_task_hash":1751048465,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"cryptominer","start":13,"end":24,"id":2},{"text":"incident","start":25,"end":33,"id":3},{"text":"affecting","start":34,"end":43,"id":4},{"text":"1000","start":44,"end":48,"id":5},{"text":"+","start":48,"end":49,"id":6},{"text":"users","start":50,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"Proficient in Burp Suite and QRadar.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1755028953,"_task_hash":-2065105252,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"QRadar","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Created YARA rules for DCShadow detection.","spans":[{"start":23,"end":31,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1754285385,"_task_hash":-548902140,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"DCShadow","start":23,"end":31,"id":4},{"text":"detection","start":32,"end":41,"id":5},{"text":".","start":41,"end":42,"id":6}]} {"text":"Integrated IAM with SIEM for monitoring.","spans":[{"start":11,"end":14,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1290804536,"_task_hash":549383958,"tokens":[{"text":"Integrated","start":0,"end":10,"id":0},{"text":"IAM","start":11,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"SIEM","start":20,"end":24,"id":3},{"text":"for","start":25,"end":28,"id":4},{"text":"monitoring","start":29,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Developed Management Review methodology and procedures.","spans":[{"start":10,"end":27,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":311609673,"_task_hash":-727124601,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Management","start":10,"end":20,"id":1},{"text":"Review","start":21,"end":27,"id":2},{"text":"methodology","start":28,"end":39,"id":3},{"text":"and","start":40,"end":43,"id":4},{"text":"procedures","start":44,"end":54,"id":5},{"text":".","start":54,"end":55,"id":6}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Network Security Architect opportunity: Lead Security Culture Building program, implement NIST Framework, manage Playbook Development operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":90,"end":104,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":113,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-867673426,"_task_hash":1230241513,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"Culture","start":54,"end":61,"id":7},{"text":"Building","start":62,"end":70,"id":8},{"text":"program","start":71,"end":78,"id":9},{"text":",","start":78,"end":79,"id":10},{"text":"implement","start":80,"end":89,"id":11},{"text":"NIST","start":90,"end":94,"id":12},{"text":"Framework","start":95,"end":104,"id":13},{"text":",","start":104,"end":105,"id":14},{"text":"manage","start":106,"end":112,"id":15},{"text":"Playbook","start":113,"end":121,"id":16},{"text":"Development","start":122,"end":133,"id":17},{"text":"operations","start":134,"end":144,"id":18},{"text":".","start":144,"end":145,"id":19}]} {"text":"Briefed executives on botnet risks.","spans":[{"start":22,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3},{"start":22,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-241117063,"_task_hash":-492527284,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"botnet","start":22,"end":28,"id":3},{"text":"risks","start":29,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Expert in IoT Security best practices.","spans":[{"start":10,"end":22,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1974584834,"_task_hash":-1094091170,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"IoT","start":10,"end":13,"id":2},{"text":"Security","start":14,"end":22,"id":3},{"text":"best","start":23,"end":27,"id":4},{"text":"practices","start":28,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"Troubleshot AES performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1693374752,"_task_hash":2051619869,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"AES","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"Led LDAP implementation project.","spans":[{"start":4,"end":8,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1267512809,"_task_hash":921780230,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"LDAP","start":4,"end":8,"id":1},{"text":"implementation","start":9,"end":23,"id":2},{"text":"project","start":24,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"Principal Engineer experienced in detecting Man-in-the-Middle attacks using Nessus.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":11},{"start":76,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1782970608,"_task_hash":-352703201,"tokens":[{"text":"Principal","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"experienced","start":19,"end":30,"id":2},{"text":"in","start":31,"end":33,"id":3},{"text":"detecting","start":34,"end":43,"id":4},{"text":"Man","start":44,"end":47,"id":5},{"text":"-","start":47,"end":48,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"-","start":50,"end":51,"id":8},{"text":"the","start":51,"end":54,"id":9},{"text":"-","start":54,"end":55,"id":10},{"text":"Middle","start":55,"end":61,"id":11},{"text":"attacks","start":62,"end":69,"id":12},{"text":"using","start":70,"end":75,"id":13},{"text":"Nessus","start":76,"end":82,"id":14},{"text":".","start":82,"end":83,"id":15}]} {"text":"Software Tester experienced in detecting Zero-Day attacks using Nessus.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":916216565,"_task_hash":405524325,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Tester","start":9,"end":15,"id":1},{"text":"experienced","start":16,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"detecting","start":31,"end":40,"id":4},{"text":"Zero","start":41,"end":45,"id":5},{"text":"-","start":45,"end":46,"id":6},{"text":"Day","start":46,"end":49,"id":7},{"text":"attacks","start":50,"end":57,"id":8},{"text":"using","start":58,"end":63,"id":9},{"text":"Nessus","start":64,"end":70,"id":10},{"text":".","start":70,"end":71,"id":11}]} {"text":"We need a Disaster Recovery Specialist skilled in SQL Injection prevention and spyware analysis using Splunk.","spans":[{"start":10,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":50,"end":63,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":86,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":102,"end":108,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1964696388,"_task_hash":662300423,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Disaster","start":10,"end":18,"id":3},{"text":"Recovery","start":19,"end":27,"id":4},{"text":"Specialist","start":28,"end":38,"id":5},{"text":"skilled","start":39,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"SQL","start":50,"end":53,"id":8},{"text":"Injection","start":54,"end":63,"id":9},{"text":"prevention","start":64,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"spyware","start":79,"end":86,"id":12},{"text":"analysis","start":87,"end":95,"id":13},{"text":"using","start":96,"end":101,"id":14},{"text":"Splunk","start":102,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"Holds JIRA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1763277601,"_task_hash":440957306,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"JIRA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Hiring Risk Analyst for UEBA Tools and APT detection.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":24,"end":34,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":39,"end":42,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1745793283,"_task_hash":-1037340783,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"for","start":20,"end":23,"id":3},{"text":"UEBA","start":24,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":"and","start":35,"end":38,"id":6},{"text":"APT","start":39,"end":42,"id":7},{"text":"detection","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} {"text":"Hiring Product Security Engineer for Qualitative Research and botnet detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":68,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1477450299,"_task_hash":404197368,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Product","start":7,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Engineer","start":24,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"Qualitative","start":37,"end":48,"id":5},{"text":"Research","start":49,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"botnet","start":62,"end":68,"id":8},{"text":"detection","start":69,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Research Specialist with expertise in OWASP Top 10 compliance and SOC Operations operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":66,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-453437487,"_task_hash":-1772460496,"tokens":[{"text":"Research","start":0,"end":8,"id":0},{"text":"Specialist","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"OWASP","start":38,"end":43,"id":5},{"text":"Top","start":44,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"SOC","start":66,"end":69,"id":10},{"text":"Operations","start":70,"end":80,"id":11},{"text":"operations","start":81,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Security Training Specialist with hands-on experience in Wireshark, SIEM Operations, and Security Hardening.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":68,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":89,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1641978919,"_task_hash":1476002731,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Training","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"hands","start":34,"end":39,"id":4},{"text":"-","start":39,"end":40,"id":5},{"text":"on","start":40,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"Wireshark","start":57,"end":66,"id":9},{"text":",","start":66,"end":67,"id":10},{"text":"SIEM","start":68,"end":72,"id":11},{"text":"Operations","start":73,"end":83,"id":12},{"text":",","start":83,"end":84,"id":13},{"text":"and","start":85,"end":88,"id":14},{"text":"Security","start":89,"end":97,"id":15},{"text":"Hardening","start":98,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} {"text":"Required: C++, Nessus, and OWASP Top 10 expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":27,"end":39,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1941766433,"_task_hash":-1106436642,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"C++","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"Nessus","start":15,"end":21,"id":4},{"text":",","start":21,"end":22,"id":5},{"text":"and","start":23,"end":26,"id":6},{"text":"OWASP","start":27,"end":32,"id":7},{"text":"Top","start":33,"end":36,"id":8},{"text":"10","start":37,"end":39,"id":9},{"text":"expertise","start":40,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} {"text":"Tested WAF rules against Remote Code Execution payloads.","spans":[{"start":25,"end":46,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1522755645,"_task_hash":-1734850368,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Remote","start":25,"end":31,"id":4},{"text":"Code","start":32,"end":36,"id":5},{"text":"Execution","start":37,"end":46,"id":6},{"text":"payloads","start":47,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"Cybersecurity Threat Hunter with 10 years experience in Database, Android, and OpenSSL.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":66,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":79,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1475720510,"_task_hash":1681554322,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Threat","start":14,"end":20,"id":1},{"text":"Hunter","start":21,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10","start":33,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Database","start":56,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"Android","start":66,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"OpenSSL","start":79,"end":86,"id":13},{"text":".","start":86,"end":87,"id":14}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Certified PCI DSS working as Insider Threat Specialist, focused on Docker Security and Privilege Escalation prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":54,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":87,"end":107,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-553902545,"_task_hash":-1860675201,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PCI","start":10,"end":13,"id":1},{"text":"DSS","start":14,"end":17,"id":2},{"text":"working","start":18,"end":25,"id":3},{"text":"as","start":26,"end":28,"id":4},{"text":"Insider","start":29,"end":36,"id":5},{"text":"Threat","start":37,"end":43,"id":6},{"text":"Specialist","start":44,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"focused","start":56,"end":63,"id":9},{"text":"on","start":64,"end":66,"id":10},{"text":"Docker","start":67,"end":73,"id":11},{"text":"Security","start":74,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"Privilege","start":87,"end":96,"id":14},{"text":"Escalation","start":97,"end":107,"id":15},{"text":"prevention","start":108,"end":118,"id":16},{"text":".","start":118,"end":119,"id":17}]} {"text":"Cyber Insurance Specialist with hands-on experience in ELK Stack, SIEM Operations, and Enterprise Security.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":66,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":13},{"start":87,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-486561539,"_task_hash":-1010938360,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Insurance","start":6,"end":15,"id":1},{"text":"Specialist","start":16,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"hands","start":32,"end":37,"id":4},{"text":"-","start":37,"end":38,"id":5},{"text":"on","start":38,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"ELK","start":55,"end":58,"id":9},{"text":"Stack","start":59,"end":64,"id":10},{"text":",","start":64,"end":65,"id":11},{"text":"SIEM","start":66,"end":70,"id":12},{"text":"Operations","start":71,"end":81,"id":13},{"text":",","start":81,"end":82,"id":14},{"text":"and","start":83,"end":86,"id":15},{"text":"Enterprise","start":87,"end":97,"id":16},{"text":"Security","start":98,"end":106,"id":17},{"text":".","start":106,"end":107,"id":18}]} {"text":"Content Marketing Specialist needed for enterprise security team.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1184693823,"_task_hash":696041599,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"needed","start":29,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"enterprise","start":40,"end":50,"id":5},{"text":"security","start":51,"end":59,"id":6},{"text":"team","start":60,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} {"text":"Senior Cyber Threat Hunter position: 7 years minimum, expert in GDPR, Critical Thinking, and BYOD Security.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":70,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":93,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1325779348,"_task_hash":1187695402,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Threat","start":13,"end":19,"id":2},{"text":"Hunter","start":20,"end":26,"id":3},{"text":"position","start":27,"end":35,"id":4},{"text":":","start":35,"end":36,"id":5},{"text":"7","start":37,"end":38,"id":6},{"text":"years","start":39,"end":44,"id":7},{"text":"minimum","start":45,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"expert","start":54,"end":60,"id":10},{"text":"in","start":61,"end":63,"id":11},{"text":"GDPR","start":64,"end":68,"id":12},{"text":",","start":68,"end":69,"id":13},{"text":"Critical","start":70,"end":78,"id":14},{"text":"Thinking","start":79,"end":87,"id":15},{"text":",","start":87,"end":88,"id":16},{"text":"and","start":89,"end":92,"id":17},{"text":"BYOD","start":93,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} {"text":"Risk Analyst with GCIH certification, expert in Hashcat.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":18,"end":22,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":48,"end":55,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-612183756,"_task_hash":-1490591261,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"GCIH","start":18,"end":22,"id":3},{"text":"certification","start":23,"end":36,"id":4},{"text":",","start":36,"end":37,"id":5},{"text":"expert","start":38,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Hashcat","start":48,"end":55,"id":8},{"text":".","start":55,"end":56,"id":9}]} {"text":"Malware Specialist role available: Prometheus experience required, Mobile App Security knowledge essential.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":35,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":67,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-722052951,"_task_hash":-1433308558,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Specialist","start":8,"end":18,"id":1},{"text":"role","start":19,"end":23,"id":2},{"text":"available","start":24,"end":33,"id":3},{"text":":","start":33,"end":34,"id":4},{"text":"Prometheus","start":35,"end":45,"id":5},{"text":"experience","start":46,"end":56,"id":6},{"text":"required","start":57,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Mobile","start":67,"end":73,"id":9},{"text":"App","start":74,"end":77,"id":10},{"text":"Security","start":78,"end":86,"id":11},{"text":"knowledge","start":87,"end":96,"id":12},{"text":"essential","start":97,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} {"text":"Required: SPF/DKIM/DMARC, QRadar, and OWASP Top 10 expertise.","spans":[{"start":10,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":6},{"start":26,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-984397935,"_task_hash":-1448236976,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"SPF","start":10,"end":13,"id":2},{"text":"/","start":13,"end":14,"id":3},{"text":"DKIM","start":14,"end":18,"id":4},{"text":"/","start":18,"end":19,"id":5},{"text":"DMARC","start":19,"end":24,"id":6},{"text":",","start":24,"end":25,"id":7},{"text":"QRadar","start":26,"end":32,"id":8},{"text":",","start":32,"end":33,"id":9},{"text":"and","start":34,"end":37,"id":10},{"text":"OWASP","start":38,"end":43,"id":11},{"text":"Top","start":44,"end":47,"id":12},{"text":"10","start":48,"end":50,"id":13},{"text":"expertise","start":51,"end":60,"id":14},{"text":".","start":60,"end":61,"id":15}]} {"text":"Senior Content Strategist position: 5 years minimum, expert in 3D Mathematics, Tableau, and Security Culture.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":63,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":79,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":92,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":2042343197,"_task_hash":-1666829200,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Content","start":7,"end":14,"id":1},{"text":"Strategist","start":15,"end":25,"id":2},{"text":"position","start":26,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"5","start":36,"end":37,"id":5},{"text":"years","start":38,"end":43,"id":6},{"text":"minimum","start":44,"end":51,"id":7},{"text":",","start":51,"end":52,"id":8},{"text":"expert","start":53,"end":59,"id":9},{"text":"in","start":60,"end":62,"id":10},{"text":"3D","start":63,"end":65,"id":11},{"text":"Mathematics","start":66,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"Tableau","start":79,"end":86,"id":14},{"text":",","start":86,"end":87,"id":15},{"text":"and","start":88,"end":91,"id":16},{"text":"Security","start":92,"end":100,"id":17},{"text":"Culture","start":101,"end":108,"id":18},{"text":".","start":108,"end":109,"id":19}]} {"text":"Vulnerability Assessment Analyst opportunity: Lead Terraform Security program, implement NIST Framework, manage Data Synchronization operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":112,"end":132,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1987686193,"_task_hash":-1698901697,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Assessment","start":14,"end":24,"id":1},{"text":"Analyst","start":25,"end":32,"id":2},{"text":"opportunity","start":33,"end":44,"id":3},{"text":":","start":44,"end":45,"id":4},{"text":"Lead","start":46,"end":50,"id":5},{"text":"Terraform","start":51,"end":60,"id":6},{"text":"Security","start":61,"end":69,"id":7},{"text":"program","start":70,"end":77,"id":8},{"text":",","start":77,"end":78,"id":9},{"text":"implement","start":79,"end":88,"id":10},{"text":"NIST","start":89,"end":93,"id":11},{"text":"Framework","start":94,"end":103,"id":12},{"text":",","start":103,"end":104,"id":13},{"text":"manage","start":105,"end":111,"id":14},{"text":"Data","start":112,"end":116,"id":15},{"text":"Synchronization","start":117,"end":132,"id":16},{"text":"operations","start":133,"end":143,"id":17},{"text":".","start":143,"end":144,"id":18}]} {"text":"Holds ISO 22301 certification.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1924465609,"_task_hash":-1241287928,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"22301","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} {"text":"Proficient in Splunk and EDR Tools.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1003087028,"_task_hash":1250982942,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"EDR","start":25,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"Looking for Compliance Manager to lead Security Standards initiatives.","spans":[{"start":12,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-86445939,"_task_hash":-1792987952,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Compliance","start":12,"end":22,"id":2},{"text":"Manager","start":23,"end":30,"id":3},{"text":"to","start":31,"end":33,"id":4},{"text":"lead","start":34,"end":38,"id":5},{"text":"Security","start":39,"end":47,"id":6},{"text":"Standards","start":48,"end":57,"id":7},{"text":"initiatives","start":58,"end":69,"id":8},{"text":".","start":69,"end":70,"id":9}]} {"text":"OSINT certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1903586176,"_task_hash":1692638379,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"SOC Analyst detected SQL Injection attempts via EDR.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":21,"end":34,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4},{"start":48,"end":51,"label":"ACRONYM","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-769757463,"_task_hash":-1507776362,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"detected","start":12,"end":20,"id":2},{"text":"SQL","start":21,"end":24,"id":3},{"text":"Injection","start":25,"end":34,"id":4},{"text":"attempts","start":35,"end":43,"id":5},{"text":"via","start":44,"end":47,"id":6},{"text":"EDR","start":48,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"Looking for Cybersecurity Analyst to lead Security Training initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":42,"end":59,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":17044578,"_task_hash":-930159634,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Cybersecurity","start":12,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"to","start":34,"end":36,"id":4},{"text":"lead","start":37,"end":41,"id":5},{"text":"Security","start":42,"end":50,"id":6},{"text":"Training","start":51,"end":59,"id":7},{"text":"initiatives","start":60,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"Holds ETL.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":582823180,"_task_hash":-1693571280,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ETL","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Developed GDPR policies and procedures.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1288717813,"_task_hash":1972110774,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"GDPR","start":10,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"procedures","start":28,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Required skills: CrowdStrike, Version Control, SAML certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":47,"end":51,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1561091014,"_task_hash":469557931,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Version","start":30,"end":37,"id":5},{"text":"Control","start":38,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"SAML","start":47,"end":51,"id":8},{"text":"certification","start":52,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Detected watering hole activity using behavioral analytics.","spans":[{"start":9,"end":22,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1508992671,"_task_hash":1487583313,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"watering","start":9,"end":17,"id":1},{"text":"hole","start":18,"end":22,"id":2},{"text":"activity","start":23,"end":31,"id":3},{"text":"using","start":32,"end":37,"id":4},{"text":"behavioral","start":38,"end":48,"id":5},{"text":"analytics","start":49,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Unity Developer professional with 3++ years implementing CrowdStrike and managing Transparency programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":199479432,"_task_hash":-1071167892,"tokens":[{"text":"Unity","start":0,"end":5,"id":0},{"text":"Developer","start":6,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3++","start":34,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"CrowdStrike","start":57,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Transparency","start":82,"end":94,"id":10},{"text":"programs","start":95,"end":103,"id":11},{"text":".","start":103,"end":104,"id":12}]} {"text":"Seeking Cyber Threat Intelligence Analyst with 10+ years experience in Mentoring and Sass/SCSS.","spans":[{"start":8,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":85,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1498746376,"_task_hash":1261694452,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Cyber","start":8,"end":13,"id":1},{"text":"Threat","start":14,"end":20,"id":2},{"text":"Intelligence","start":21,"end":33,"id":3},{"text":"Analyst","start":34,"end":41,"id":4},{"text":"with","start":42,"end":46,"id":5},{"text":"10","start":47,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"Mentoring","start":71,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Sass","start":85,"end":89,"id":13},{"text":"/","start":89,"end":90,"id":14},{"text":"SCSS","start":90,"end":94,"id":15},{"text":".","start":94,"end":95,"id":16}]} {"text":"Infrastructure Security Engineer with 3+ years experience in Network Forensics, Scripting, and Key Management.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":61,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":80,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":95,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1951085741,"_task_hash":-491216734,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"with","start":33,"end":37,"id":3},{"text":"3","start":38,"end":39,"id":4},{"text":"+","start":39,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"experience","start":47,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"Network","start":61,"end":68,"id":9},{"text":"Forensics","start":69,"end":78,"id":10},{"text":",","start":78,"end":79,"id":11},{"text":"Scripting","start":80,"end":89,"id":12},{"text":",","start":89,"end":90,"id":13},{"text":"and","start":91,"end":94,"id":14},{"text":"Key","start":95,"end":98,"id":15},{"text":"Management","start":99,"end":109,"id":16},{"text":".","start":109,"end":110,"id":17}]} {"text":"Led annual Management Review program.","spans":[{"start":11,"end":28,"label":"AUDIT_TERM","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":951506254,"_task_hash":-1657796599,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"annual","start":4,"end":10,"id":1},{"text":"Management","start":11,"end":21,"id":2},{"text":"Review","start":22,"end":28,"id":3},{"text":"program","start":29,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Holds TOGAF certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1058317034,"_task_hash":2099672658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":"certification","start":12,"end":25,"id":2},{"text":".","start":25,"end":26,"id":3}]} {"text":"Security Awareness Specialist opportunity: Lead Cisco Security program, implement OWASP Top 10, manage Compliance Knowledge operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":48,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":94,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":103,"end":123,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1838473517,"_task_hash":-372452023,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"opportunity","start":30,"end":41,"id":3},{"text":":","start":41,"end":42,"id":4},{"text":"Lead","start":43,"end":47,"id":5},{"text":"Cisco","start":48,"end":53,"id":6},{"text":"Security","start":54,"end":62,"id":7},{"text":"program","start":63,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"implement","start":72,"end":81,"id":10},{"text":"OWASP","start":82,"end":87,"id":11},{"text":"Top","start":88,"end":91,"id":12},{"text":"10","start":92,"end":94,"id":13},{"text":",","start":94,"end":95,"id":14},{"text":"manage","start":96,"end":102,"id":15},{"text":"Compliance","start":103,"end":113,"id":16},{"text":"Knowledge","start":114,"end":123,"id":17},{"text":"operations","start":124,"end":134,"id":18},{"text":".","start":134,"end":135,"id":19}]} {"text":"Documented Preventive Action results and recommendations.","spans":[{"start":11,"end":28,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1099648685,"_task_hash":1933886479,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"Preventive","start":11,"end":21,"id":1},{"text":"Action","start":22,"end":28,"id":2},{"text":"results","start":29,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"recommendations","start":41,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} {"text":"IT Compliance Specialist with 7 years experience in Anonymization, Mobile Testing, and Encryption.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":67,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":87,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1573162556,"_task_hash":-46076884,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Compliance","start":3,"end":13,"id":1},{"text":"Specialist","start":14,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"7","start":30,"end":31,"id":4},{"text":"years","start":32,"end":37,"id":5},{"text":"experience","start":38,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Anonymization","start":52,"end":65,"id":8},{"text":",","start":65,"end":66,"id":9},{"text":"Mobile","start":67,"end":73,"id":10},{"text":"Testing","start":74,"end":81,"id":11},{"text":",","start":81,"end":82,"id":12},{"text":"and","start":83,"end":86,"id":13},{"text":"Encryption","start":87,"end":97,"id":14},{"text":".","start":97,"end":98,"id":15}]} {"text":"Tested WAF rules against Credential Dumping payloads.","spans":[{"start":25,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":834887833,"_task_hash":1110308408,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Credential","start":25,"end":35,"id":4},{"text":"Dumping","start":36,"end":43,"id":5},{"text":"payloads","start":44,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Built Red Team team from ground up.","spans":[{"start":6,"end":14,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1370809963,"_task_hash":972722515,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Red","start":6,"end":9,"id":1},{"text":"Team","start":10,"end":14,"id":2},{"text":"team","start":15,"end":19,"id":3},{"text":"from","start":20,"end":24,"id":4},{"text":"ground","start":25,"end":31,"id":5},{"text":"up","start":32,"end":34,"id":6},{"text":".","start":34,"end":35,"id":7}]} {"text":"SQL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":206140740,"_task_hash":-284236833,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Blue Team Lead with GCP Security certification, expert in BloodHound.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":32,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1048748517,"_task_hash":-1914845717,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Lead","start":10,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"GCP","start":20,"end":23,"id":4},{"text":"Security","start":24,"end":32,"id":5},{"text":"certification","start":33,"end":46,"id":6},{"text":",","start":46,"end":47,"id":7},{"text":"expert","start":48,"end":54,"id":8},{"text":"in","start":55,"end":57,"id":9},{"text":"BloodHound","start":58,"end":68,"id":10},{"text":".","start":68,"end":69,"id":11}]} {"text":"Required skills: CrowdStrike, Solution Architecture, PRINCE2 certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":53,"end":60,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1054653285,"_task_hash":300786099,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Solution","start":30,"end":38,"id":5},{"text":"Architecture","start":39,"end":51,"id":6},{"text":",","start":51,"end":52,"id":7},{"text":"PRINCE2","start":53,"end":60,"id":8},{"text":"certification","start":61,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} {"text":"Exploited Process Hollowing vulnerability in web application.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1120528290,"_task_hash":283006360,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Process","start":10,"end":17,"id":1},{"text":"Hollowing","start":18,"end":27,"id":2},{"text":"vulnerability","start":28,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"web","start":45,"end":48,"id":5},{"text":"application","start":49,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Developed NERC CIP policies and procedures.","spans":[{"start":10,"end":18,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1970270126,"_task_hash":-1801576343,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"NERC","start":10,"end":14,"id":1},{"text":"CIP","start":15,"end":18,"id":2},{"text":"policies","start":19,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"procedures","start":32,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Assessed Patch Management maturity using industry frameworks.","spans":[{"start":9,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-25327319,"_task_hash":-625289365,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Patch","start":9,"end":14,"id":1},{"text":"Management","start":15,"end":25,"id":2},{"text":"maturity","start":26,"end":34,"id":3},{"text":"using","start":35,"end":40,"id":4},{"text":"industry","start":41,"end":49,"id":5},{"text":"frameworks","start":50,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Technology Manager with 10 years experience in Graphics, Wireless Networks, and Technical Product Management.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":57,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":80,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1435672710,"_task_hash":-309051144,"tokens":[{"text":"Technology","start":0,"end":10,"id":0},{"text":"Manager","start":11,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"10","start":24,"end":26,"id":3},{"text":"years","start":27,"end":32,"id":4},{"text":"experience","start":33,"end":43,"id":5},{"text":"in","start":44,"end":46,"id":6},{"text":"Graphics","start":47,"end":55,"id":7},{"text":",","start":55,"end":56,"id":8},{"text":"Wireless","start":57,"end":65,"id":9},{"text":"Networks","start":66,"end":74,"id":10},{"text":",","start":74,"end":75,"id":11},{"text":"and","start":76,"end":79,"id":12},{"text":"Technical","start":80,"end":89,"id":13},{"text":"Product","start":90,"end":97,"id":14},{"text":"Management","start":98,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"Built Infrastructure Security team from ground up.","spans":[{"start":6,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":6,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-809250404,"_task_hash":-641629360,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Infrastructure","start":6,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"team","start":30,"end":34,"id":3},{"text":"from","start":35,"end":39,"id":4},{"text":"ground","start":40,"end":46,"id":5},{"text":"up","start":47,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Looking for Product Designer to lead Database Security initiatives.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":37,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-2077145253,"_task_hash":-1502659568,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Product","start":12,"end":19,"id":2},{"text":"Designer","start":20,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"lead","start":32,"end":36,"id":5},{"text":"Database","start":37,"end":45,"id":6},{"text":"Security","start":46,"end":54,"id":7},{"text":"initiatives","start":55,"end":66,"id":8},{"text":".","start":66,"end":67,"id":9}]} {"text":"The new CISO implemented zero trust architecture.","spans":[{"start":8,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2129916059,"_task_hash":2065407373,"tokens":[{"text":"The","start":0,"end":3,"id":0},{"text":"new","start":4,"end":7,"id":1},{"text":"CISO","start":8,"end":12,"id":2},{"text":"implemented","start":13,"end":24,"id":3},{"text":"zero","start":25,"end":29,"id":4},{"text":"trust","start":30,"end":35,"id":5},{"text":"architecture","start":36,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Cybersecurity Insurance Expert with expertise in NIST Framework compliance and Data Warehousing operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":63,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":79,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-418566009,"_task_hash":1304415344,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Insurance","start":14,"end":23,"id":1},{"text":"Expert","start":24,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"expertise","start":36,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"NIST","start":49,"end":53,"id":6},{"text":"Framework","start":54,"end":63,"id":7},{"text":"compliance","start":64,"end":74,"id":8},{"text":"and","start":75,"end":78,"id":9},{"text":"Data","start":79,"end":83,"id":10},{"text":"Warehousing","start":84,"end":95,"id":11},{"text":"operations","start":96,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} {"text":"Implemented Identity Security controls and monitoring.","spans":[{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":497328132,"_task_hash":370564847,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Identity","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"controls","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"monitoring","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"CCPA certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2126018288,"_task_hash":-1395112851,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Security Monitoring Manager role available: Physics Engines experience required, Security Awareness knowledge essential.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-453117919,"_task_hash":1007726286,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Monitoring","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"role","start":28,"end":32,"id":3},{"text":"available","start":33,"end":42,"id":4},{"text":":","start":42,"end":43,"id":5},{"text":"Physics","start":44,"end":51,"id":6},{"text":"Engines","start":52,"end":59,"id":7},{"text":"experience","start":60,"end":70,"id":8},{"text":"required","start":71,"end":79,"id":9},{"text":",","start":79,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":"Awareness","start":90,"end":99,"id":12},{"text":"knowledge","start":100,"end":109,"id":13},{"text":"essential","start":110,"end":119,"id":14},{"text":".","start":119,"end":120,"id":15}]} {"text":"Head of InfoSec with 10 years experience in Network Traffic Analysis, Business Intelligence, and Statistical Analysis.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":70,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":97,"end":117,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-710543820,"_task_hash":-854392295,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"InfoSec","start":8,"end":15,"id":2},{"text":"with","start":16,"end":20,"id":3},{"text":"10","start":21,"end":23,"id":4},{"text":"years","start":24,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Network","start":44,"end":51,"id":8},{"text":"Traffic","start":52,"end":59,"id":9},{"text":"Analysis","start":60,"end":68,"id":10},{"text":",","start":68,"end":69,"id":11},{"text":"Business","start":70,"end":78,"id":12},{"text":"Intelligence","start":79,"end":91,"id":13},{"text":",","start":91,"end":92,"id":14},{"text":"and","start":93,"end":96,"id":15},{"text":"Statistical","start":97,"end":108,"id":16},{"text":"Analysis","start":109,"end":117,"id":17},{"text":".","start":117,"end":118,"id":18}]} {"text":"Simulated Format String during red team exercise.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":819604478,"_task_hash":-1163945490,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Format","start":10,"end":16,"id":1},{"text":"String","start":17,"end":23,"id":2},{"text":"during","start":24,"end":30,"id":3},{"text":"red","start":31,"end":34,"id":4},{"text":"team","start":35,"end":39,"id":5},{"text":"exercise","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Led SAML implementation project.","spans":[{"start":4,"end":8,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1069215034,"_task_hash":-48954340,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"SAML","start":4,"end":8,"id":1},{"text":"implementation","start":9,"end":23,"id":2},{"text":"project","start":24,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"We need a Cryptography Expert skilled in Credential Stuffing prevention and worm analysis using Metasploit.","spans":[{"start":10,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":41,"end":60,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":76,"end":80,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":96,"end":106,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-555978296,"_task_hash":326215511,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cryptography","start":10,"end":22,"id":3},{"text":"Expert","start":23,"end":29,"id":4},{"text":"skilled","start":30,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"Credential","start":41,"end":51,"id":7},{"text":"Stuffing","start":52,"end":60,"id":8},{"text":"prevention","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"worm","start":76,"end":80,"id":11},{"text":"analysis","start":81,"end":89,"id":12},{"text":"using","start":90,"end":95,"id":13},{"text":"Metasploit","start":96,"end":106,"id":14},{"text":".","start":106,"end":107,"id":15}]} {"text":"Led annual Root Cause Analysis program.","spans":[{"start":11,"end":30,"label":"AUDIT_TERM","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1295998494,"_task_hash":465044621,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"annual","start":4,"end":10,"id":1},{"text":"Root","start":11,"end":15,"id":2},{"text":"Cause","start":16,"end":21,"id":3},{"text":"Analysis","start":22,"end":30,"id":4},{"text":"program","start":31,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Simulated Buffer Overflow during red team exercise.","spans":[{"start":10,"end":25,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":872668289,"_task_hash":1049974599,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Buffer","start":10,"end":16,"id":1},{"text":"Overflow","start":17,"end":25,"id":2},{"text":"during","start":26,"end":32,"id":3},{"text":"red","start":33,"end":36,"id":4},{"text":"team","start":37,"end":41,"id":5},{"text":"exercise","start":42,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Certified IDS/IPS working as Facility Security Consultant, focused on Security Standards and Cross-Site Scripting prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":57,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":70,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13},{"start":93,"end":113,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":995420722,"_task_hash":597204728,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Facility","start":29,"end":37,"id":6},{"text":"Security","start":38,"end":46,"id":7},{"text":"Consultant","start":47,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"focused","start":59,"end":66,"id":10},{"text":"on","start":67,"end":69,"id":11},{"text":"Security","start":70,"end":78,"id":12},{"text":"Standards","start":79,"end":88,"id":13},{"text":"and","start":89,"end":92,"id":14},{"text":"Cross","start":93,"end":98,"id":15},{"text":"-","start":98,"end":99,"id":16},{"text":"Site","start":99,"end":103,"id":17},{"text":"Scripting","start":104,"end":113,"id":18},{"text":"prevention","start":114,"end":124,"id":19},{"text":".","start":124,"end":125,"id":20}]} {"text":"Mitigated Process Hollowing through code remediation.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1523014663,"_task_hash":1310085590,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Process","start":10,"end":17,"id":1},{"text":"Hollowing","start":18,"end":27,"id":2},{"text":"through","start":28,"end":35,"id":3},{"text":"code","start":36,"end":40,"id":4},{"text":"remediation","start":41,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Certified IDS/IPS working as Cloud Architect, focused on Perimeter Security and Password Spraying prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":57,"end":75,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":80,"end":97,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-169960284,"_task_hash":671443591,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Cloud","start":29,"end":34,"id":6},{"text":"Architect","start":35,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"focused","start":46,"end":53,"id":9},{"text":"on","start":54,"end":56,"id":10},{"text":"Perimeter","start":57,"end":66,"id":11},{"text":"Security","start":67,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"Password","start":80,"end":88,"id":14},{"text":"Spraying","start":89,"end":97,"id":15},{"text":"prevention","start":98,"end":108,"id":16},{"text":".","start":108,"end":109,"id":17}]} {"text":"Documented evidence for ISO 27001 A.9.1 audit.","spans":[{"start":24,"end":39,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2042046815,"_task_hash":1440427525,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"evidence","start":11,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"ISO","start":24,"end":27,"id":3},{"text":"27001","start":28,"end":33,"id":4},{"text":"A.9.1","start":34,"end":39,"id":5},{"text":"audit","start":40,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Digital Forensics Analyst with hands-on experience in Metasploit, Burp Suite, and Hardware Security Modules.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":66,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-753956316,"_task_hash":982146729,"tokens":[{"text":"Digital","start":0,"end":7,"id":0},{"text":"Forensics","start":8,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"hands","start":31,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"on","start":37,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"Metasploit","start":54,"end":64,"id":9},{"text":",","start":64,"end":65,"id":10},{"text":"Burp","start":66,"end":70,"id":11},{"text":"Suite","start":71,"end":76,"id":12},{"text":",","start":76,"end":77,"id":13},{"text":"and","start":78,"end":81,"id":14},{"text":"Hardware","start":82,"end":90,"id":15},{"text":"Security","start":91,"end":99,"id":16},{"text":"Modules","start":100,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} {"text":"Cloud Security Engineer with GIAC certification, expert in Fortinet.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":33,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":59,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-841286751,"_task_hash":288261528,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"GIAC","start":29,"end":33,"id":4},{"text":"certification","start":34,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"expert","start":49,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Fortinet","start":59,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} {"text":"Analyzed LLMNR Poisoning samples in malware lab.","spans":[{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-533883484,"_task_hash":-1935261487,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"LLMNR","start":9,"end":14,"id":1},{"text":"Poisoning","start":15,"end":24,"id":2},{"text":"samples","start":25,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"malware","start":36,"end":43,"id":5},{"text":"lab","start":44,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Presented Vulnerability Management updates to leadership.","spans":[{"start":10,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-39258406,"_task_hash":-1108460338,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Vulnerability","start":10,"end":23,"id":1},{"text":"Management","start":24,"end":34,"id":2},{"text":"updates","start":35,"end":42,"id":3},{"text":"to","start":43,"end":45,"id":4},{"text":"leadership","start":46,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} {"text":"Certified MITRE ATT&CK working as Service Incident Manager, focused on Container Registry Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":22,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":34,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":71,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":103,"end":123,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-461416484,"_task_hash":-1919454858,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"MITRE","start":10,"end":15,"id":1},{"text":"ATT&CK","start":16,"end":22,"id":2},{"text":"working","start":23,"end":30,"id":3},{"text":"as","start":31,"end":33,"id":4},{"text":"Service","start":34,"end":41,"id":5},{"text":"Incident","start":42,"end":50,"id":6},{"text":"Manager","start":51,"end":58,"id":7},{"text":",","start":58,"end":59,"id":8},{"text":"focused","start":60,"end":67,"id":9},{"text":"on","start":68,"end":70,"id":10},{"text":"Container","start":71,"end":80,"id":11},{"text":"Registry","start":81,"end":89,"id":12},{"text":"Security","start":90,"end":98,"id":13},{"text":"and","start":99,"end":102,"id":14},{"text":"Cross","start":103,"end":108,"id":15},{"text":"-","start":108,"end":109,"id":16},{"text":"Site","start":109,"end":113,"id":17},{"text":"Scripting","start":114,"end":123,"id":18},{"text":"prevention","start":124,"end":134,"id":19},{"text":".","start":134,"end":135,"id":20}]} {"text":"Exploited Buffer Overflow vulnerability in web application.","spans":[{"start":10,"end":25,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1247700731,"_task_hash":1296463995,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Buffer","start":10,"end":16,"id":1},{"text":"Overflow","start":17,"end":25,"id":2},{"text":"vulnerability","start":26,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"web","start":43,"end":46,"id":5},{"text":"application","start":47,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Coordinated with law enforcement on rootkit case.","spans":[{"start":36,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":480904240,"_task_hash":-713578566,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"rootkit","start":36,"end":43,"id":5},{"text":"case","start":44,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Created YARA rules for Memory Injection detection.","spans":[{"start":23,"end":39,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-259199236,"_task_hash":-1610257638,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Memory","start":23,"end":29,"id":4},{"text":"Injection","start":30,"end":39,"id":5},{"text":"detection","start":40,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Lead Creative Content Strategist managing Python Scripting and Secure SDLC initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1980535690,"_task_hash":-1656303265,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Creative","start":5,"end":13,"id":1},{"text":"Content","start":14,"end":21,"id":2},{"text":"Strategist","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Python","start":42,"end":48,"id":5},{"text":"Scripting","start":49,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Secure","start":63,"end":69,"id":8},{"text":"SDLC","start":70,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} {"text":"Looking for Mobile Developer to lead Application Security Architecture initiatives.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":37,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1834051431,"_task_hash":1428522370,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Mobile","start":12,"end":18,"id":2},{"text":"Developer","start":19,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"lead","start":32,"end":36,"id":5},{"text":"Application","start":37,"end":48,"id":6},{"text":"Security","start":49,"end":57,"id":7},{"text":"Architecture","start":58,"end":70,"id":8},{"text":"initiatives","start":71,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} {"text":"Accomplished MLOps Engineer specializing in Unity and IoT Security.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":54,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":395980485,"_task_hash":-79396078,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"MLOps","start":13,"end":18,"id":1},{"text":"Engineer","start":19,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Unity","start":44,"end":49,"id":5},{"text":"and","start":50,"end":53,"id":6},{"text":"IoT","start":54,"end":57,"id":7},{"text":"Security","start":58,"end":66,"id":8},{"text":".","start":66,"end":67,"id":9}]} {"text":"MFA & SSO certification a plus.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":771046618,"_task_hash":-1899894933,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"certification","start":10,"end":23,"id":3},{"text":"a","start":24,"end":25,"id":4},{"text":"plus","start":26,"end":30,"id":5},{"text":".","start":30,"end":31,"id":6}]} {"text":"Specialized in Infrastructure Security for enterprise environments.","spans":[{"start":15,"end":38,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-478872277,"_task_hash":-1693163946,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Infrastructure","start":15,"end":29,"id":2},{"text":"Security","start":30,"end":38,"id":3},{"text":"for","start":39,"end":42,"id":4},{"text":"enterprise","start":43,"end":53,"id":5},{"text":"environments","start":54,"end":66,"id":6},{"text":".","start":66,"end":67,"id":7}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Assessed third-party vendors for Privacy Act compliance.","spans":[{"start":33,"end":44,"label":"REGULATION","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":950306377,"_task_hash":-1321132306,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"Privacy","start":33,"end":40,"id":6},{"text":"Act","start":41,"end":44,"id":7},{"text":"compliance","start":45,"end":55,"id":8},{"text":".","start":55,"end":56,"id":9}]} {"text":"Incident Manager role available: Financial Analysis experience required, Azure Security knowledge essential.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1495618479,"_task_hash":571138081,"tokens":[{"text":"Incident","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"role","start":17,"end":21,"id":2},{"text":"available","start":22,"end":31,"id":3},{"text":":","start":31,"end":32,"id":4},{"text":"Financial","start":33,"end":42,"id":5},{"text":"Analysis","start":43,"end":51,"id":6},{"text":"experience","start":52,"end":62,"id":7},{"text":"required","start":63,"end":71,"id":8},{"text":",","start":71,"end":72,"id":9},{"text":"Azure","start":73,"end":78,"id":10},{"text":"Security","start":79,"end":87,"id":11},{"text":"knowledge","start":88,"end":97,"id":12},{"text":"essential","start":98,"end":107,"id":13},{"text":".","start":107,"end":108,"id":14}]} {"text":"Created YARA rules for CSRF detection.","spans":[{"start":23,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1423640648,"_task_hash":-1664779051,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"CSRF","start":23,"end":27,"id":4},{"text":"detection","start":28,"end":37,"id":5},{"text":".","start":37,"end":38,"id":6}]} {"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Holds VR/AR certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1153803298,"_task_hash":-822599087,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"VR","start":6,"end":8,"id":1},{"text":"/","start":8,"end":9,"id":2},{"text":"AR","start":9,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Intelligence Analyst professional with 10++ years implementing Splunk and managing Assembly Language programs.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":63,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":83,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1127598262,"_task_hash":1399993266,"tokens":[{"text":"Intelligence","start":0,"end":12,"id":0},{"text":"Analyst","start":13,"end":20,"id":1},{"text":"professional","start":21,"end":33,"id":2},{"text":"with","start":34,"end":38,"id":3},{"text":"10++","start":39,"end":43,"id":4},{"text":"years","start":44,"end":49,"id":5},{"text":"implementing","start":50,"end":62,"id":6},{"text":"Splunk","start":63,"end":69,"id":7},{"text":"and","start":70,"end":73,"id":8},{"text":"managing","start":74,"end":82,"id":9},{"text":"Assembly","start":83,"end":91,"id":10},{"text":"Language","start":92,"end":100,"id":11},{"text":"programs","start":101,"end":109,"id":12},{"text":".","start":109,"end":110,"id":13}]} {"text":"Holds SLAM certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1691756040,"_task_hash":-1592429569,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SLAM","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Implemented controls for FedRAMP audit.","spans":[{"start":25,"end":32,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":366937444,"_task_hash":1409332427,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"FedRAMP","start":25,"end":32,"id":3},{"text":"audit","start":33,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"VP of Security with expertise in OWASP Top 10 compliance and Data Visualization operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":61,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":2020979325,"_task_hash":1649166612,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"expertise","start":20,"end":29,"id":4},{"text":"in","start":30,"end":32,"id":5},{"text":"OWASP","start":33,"end":38,"id":6},{"text":"Top","start":39,"end":42,"id":7},{"text":"10","start":43,"end":45,"id":8},{"text":"compliance","start":46,"end":56,"id":9},{"text":"and","start":57,"end":60,"id":10},{"text":"Data","start":61,"end":65,"id":11},{"text":"Visualization","start":66,"end":79,"id":12},{"text":"operations","start":80,"end":90,"id":13},{"text":".","start":90,"end":91,"id":14}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Required: VR/AR, Splunk, and NIST Framework expertise.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":29,"end":43,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1066521472,"_task_hash":-114683948,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"VR","start":10,"end":12,"id":2},{"text":"/","start":12,"end":13,"id":3},{"text":"AR","start":13,"end":15,"id":4},{"text":",","start":15,"end":16,"id":5},{"text":"Splunk","start":17,"end":23,"id":6},{"text":",","start":23,"end":24,"id":7},{"text":"and","start":25,"end":28,"id":8},{"text":"NIST","start":29,"end":33,"id":9},{"text":"Framework","start":34,"end":43,"id":10},{"text":"expertise","start":44,"end":53,"id":11},{"text":".","start":53,"end":54,"id":12}]} {"text":"Proficient in CrowdStrike and Nessus.","spans":[{"start":14,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1837103489,"_task_hash":693235503,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"CrowdStrike","start":14,"end":25,"id":2},{"text":"and","start":26,"end":29,"id":3},{"text":"Nessus","start":30,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"GLBA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1328244680,"_task_hash":-1510078390,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Application Security Engineer with CISSP certification, expert in Burp Suite.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":66,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1660968538,"_task_hash":-310651396,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"CISSP","start":35,"end":40,"id":4},{"text":"certification","start":41,"end":54,"id":5},{"text":",","start":54,"end":55,"id":6},{"text":"expert","start":56,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Burp","start":66,"end":70,"id":9},{"text":"Suite","start":71,"end":76,"id":10},{"text":".","start":76,"end":77,"id":11}]} {"text":"Must know CrowdStrike, Metasploit, and NIST Framework.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":33,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1465865011,"_task_hash":606415892,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Metasploit","start":23,"end":33,"id":4},{"text":",","start":33,"end":34,"id":5},{"text":"and","start":35,"end":38,"id":6},{"text":"NIST","start":39,"end":43,"id":7},{"text":"Framework","start":44,"end":53,"id":8},{"text":".","start":53,"end":54,"id":9}]} {"text":"Specialized in Risk Management for enterprise environments.","spans":[{"start":15,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1002791867,"_task_hash":-1433860500,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Risk","start":15,"end":19,"id":2},{"text":"Management","start":20,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"environments","start":46,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"Certified PMP Certification working as Forensic Investigator, focused on Security Scanning Tools and XSS prevention.","spans":[{"start":10,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":39,"end":60,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":101,"end":104,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1817342076,"_task_hash":-410741473,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PMP","start":10,"end":13,"id":1},{"text":"Certification","start":14,"end":27,"id":2},{"text":"working","start":28,"end":35,"id":3},{"text":"as","start":36,"end":38,"id":4},{"text":"Forensic","start":39,"end":47,"id":5},{"text":"Investigator","start":48,"end":60,"id":6},{"text":",","start":60,"end":61,"id":7},{"text":"focused","start":62,"end":69,"id":8},{"text":"on","start":70,"end":72,"id":9},{"text":"Security","start":73,"end":81,"id":10},{"text":"Scanning","start":82,"end":90,"id":11},{"text":"Tools","start":91,"end":96,"id":12},{"text":"and","start":97,"end":100,"id":13},{"text":"XSS","start":101,"end":104,"id":14},{"text":"prevention","start":105,"end":115,"id":15},{"text":".","start":115,"end":116,"id":16}]} {"text":"Looking for Security Monitoring Analyst to lead Security Awareness Platforms initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1840277540,"_task_hash":-1287669587,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Monitoring","start":21,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Security","start":48,"end":56,"id":7},{"text":"Awareness","start":57,"end":66,"id":8},{"text":"Platforms","start":67,"end":76,"id":9},{"text":"initiatives","start":77,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} {"text":"Join our team as IT Incident Manager!","spans":[{"start":17,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1898086970,"_task_hash":-1402998369,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"IT","start":17,"end":19,"id":4},{"text":"Incident","start":20,"end":28,"id":5},{"text":"Manager","start":29,"end":36,"id":6},{"text":"!","start":36,"end":37,"id":7}]} {"text":"Join our team as GRC Manager!","spans":[{"start":17,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-353593199,"_task_hash":-604455425,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"GRC","start":17,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"!","start":28,"end":29,"id":6}]} {"text":"Holds SPF/DKIM/DMARC certification.","spans":[{"start":6,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1094651715,"_task_hash":994877923,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SPF","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DKIM","start":10,"end":14,"id":3},{"text":"/","start":14,"end":15,"id":4},{"text":"DMARC","start":15,"end":20,"id":5},{"text":"certification","start":21,"end":34,"id":6},{"text":".","start":34,"end":35,"id":7}]} {"text":"Certified CI/CD working as Phishing Analyst, focused on API Security and Clickjacking prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":27,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":56,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":73,"end":85,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":173455825,"_task_hash":-714636310,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CI","start":10,"end":12,"id":1},{"text":"/","start":12,"end":13,"id":2},{"text":"CD","start":13,"end":15,"id":3},{"text":"working","start":16,"end":23,"id":4},{"text":"as","start":24,"end":26,"id":5},{"text":"Phishing","start":27,"end":35,"id":6},{"text":"Analyst","start":36,"end":43,"id":7},{"text":",","start":43,"end":44,"id":8},{"text":"focused","start":45,"end":52,"id":9},{"text":"on","start":53,"end":55,"id":10},{"text":"API","start":56,"end":59,"id":11},{"text":"Security","start":60,"end":68,"id":12},{"text":"and","start":69,"end":72,"id":13},{"text":"Clickjacking","start":73,"end":85,"id":14},{"text":"prevention","start":86,"end":96,"id":15},{"text":".","start":96,"end":97,"id":16}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Briefed executives on business email compromise risks.","spans":[{"start":22,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1715198040,"_task_hash":1309446328,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"business","start":22,"end":30,"id":3},{"text":"email","start":31,"end":36,"id":4},{"text":"compromise","start":37,"end":47,"id":5},{"text":"risks","start":48,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Proficient in Splunk and QRadar.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2099641598,"_task_hash":1711077533,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"QRadar","start":25,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Expert in Data Security best practices.","spans":[{"start":10,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":497523262,"_task_hash":-2093998200,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Data","start":10,"end":14,"id":2},{"text":"Security","start":15,"end":23,"id":3},{"text":"best","start":24,"end":28,"id":4},{"text":"practices","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Responsible for NGFW operations and maintenance.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1080770095,"_task_hash":1350974695,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"NGFW","start":16,"end":20,"id":2},{"text":"operations","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"maintenance","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Technical Support Engineer experienced in detecting DDoS attacks using SIEM Operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":52,"end":56,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":71,"end":86,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1286026648,"_task_hash":-352829712,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"experienced","start":27,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"detecting","start":42,"end":51,"id":5},{"text":"DDoS","start":52,"end":56,"id":6},{"text":"attacks","start":57,"end":64,"id":7},{"text":"using","start":65,"end":70,"id":8},{"text":"SIEM","start":71,"end":75,"id":9},{"text":"Operations","start":76,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} {"text":"Senior Information Specialist skilled in Reinforcement Learning, Digital Forensics, and Cloud Security Testing.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":88,"end":110,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-210607438,"_task_hash":-513952164,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Information","start":7,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"skilled","start":30,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Reinforcement","start":41,"end":54,"id":5},{"text":"Learning","start":55,"end":63,"id":6},{"text":",","start":63,"end":64,"id":7},{"text":"Digital","start":65,"end":72,"id":8},{"text":"Forensics","start":73,"end":82,"id":9},{"text":",","start":82,"end":83,"id":10},{"text":"and","start":84,"end":87,"id":11},{"text":"Cloud","start":88,"end":93,"id":12},{"text":"Security","start":94,"end":102,"id":13},{"text":"Testing","start":103,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} {"text":"Holds IAM certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1016620606,"_task_hash":-1098112748,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IAM","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"CISO responsibilities include board reporting.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":577181892,"_task_hash":-1924711051,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"responsibilities","start":5,"end":21,"id":1},{"text":"include","start":22,"end":29,"id":2},{"text":"board","start":30,"end":35,"id":3},{"text":"reporting","start":36,"end":45,"id":4},{"text":".","start":45,"end":46,"id":5}]} {"text":"Security Consultant with Azure Security certification, expert in Ghidra.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":25,"end":39,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":4},{"start":65,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-481738188,"_task_hash":1507703528,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Consultant","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"Azure","start":25,"end":30,"id":3},{"text":"Security","start":31,"end":39,"id":4},{"text":"certification","start":40,"end":53,"id":5},{"text":",","start":53,"end":54,"id":6},{"text":"expert","start":55,"end":61,"id":7},{"text":"in","start":62,"end":64,"id":8},{"text":"Ghidra","start":65,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"Senior Asset Manager skilled in Coverage Analysis, Risk Frameworks, and Hardware Security Modules.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":72,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-56475268,"_task_hash":-220887084,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Asset","start":7,"end":12,"id":1},{"text":"Manager","start":13,"end":20,"id":2},{"text":"skilled","start":21,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"Coverage","start":32,"end":40,"id":5},{"text":"Analysis","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Risk","start":51,"end":55,"id":8},{"text":"Frameworks","start":56,"end":66,"id":9},{"text":",","start":66,"end":67,"id":10},{"text":"and","start":68,"end":71,"id":11},{"text":"Hardware","start":72,"end":80,"id":12},{"text":"Security","start":81,"end":89,"id":13},{"text":"Modules","start":90,"end":97,"id":14},{"text":".","start":97,"end":98,"id":15}]} {"text":"Implemented controls to prevent phishing attacks.","spans":[{"start":32,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1141588114,"_task_hash":1808737074,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"phishing","start":32,"end":40,"id":4},{"text":"attacks","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Network Admin with hands-on experience in EDR Tools, CrowdStrike, and Security Policies.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":53,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":70,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":728715300,"_task_hash":1817834207,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Admin","start":8,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"hands","start":19,"end":24,"id":3},{"text":"-","start":24,"end":25,"id":4},{"text":"on","start":25,"end":27,"id":5},{"text":"experience","start":28,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"EDR","start":42,"end":45,"id":8},{"text":"Tools","start":46,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"CrowdStrike","start":53,"end":64,"id":11},{"text":",","start":64,"end":65,"id":12},{"text":"and","start":66,"end":69,"id":13},{"text":"Security","start":70,"end":78,"id":14},{"text":"Policies","start":79,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"Looking for CSO to lead Security Architecture initiatives.","spans":[{"start":12,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2},{"start":24,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1505978511,"_task_hash":939789560,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"CSO","start":12,"end":15,"id":2},{"text":"to","start":16,"end":18,"id":3},{"text":"lead","start":19,"end":23,"id":4},{"text":"Security","start":24,"end":32,"id":5},{"text":"Architecture","start":33,"end":45,"id":6},{"text":"initiatives","start":46,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Experienced Data Analyst specializing in Terraform Security.","spans":[{"start":12,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":59,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1444032782,"_task_hash":1411401627,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Data","start":12,"end":16,"id":1},{"text":"Analyst","start":17,"end":24,"id":2},{"text":"specializing","start":25,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Terraform","start":41,"end":50,"id":5},{"text":"Security","start":51,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Published research on Network Security trends.","spans":[{"start":22,"end":38,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1042106275,"_task_hash":-593195410,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Network","start":22,"end":29,"id":3},{"text":"Security","start":30,"end":38,"id":4},{"text":"trends","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Detected Memory Injection attack in production environment.","spans":[{"start":9,"end":25,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1436744305,"_task_hash":-1821974275,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Memory","start":9,"end":15,"id":1},{"text":"Injection","start":16,"end":25,"id":2},{"text":"attack","start":26,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"production","start":36,"end":46,"id":5},{"text":"environment","start":47,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Senior Tech Support Specialist position: 7 years minimum, expert in Python, Compliance Knowledge, and Security Protocols.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":68,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":76,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":102,"end":120,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1339473402,"_task_hash":311850553,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Tech","start":7,"end":11,"id":1},{"text":"Support","start":12,"end":19,"id":2},{"text":"Specialist","start":20,"end":30,"id":3},{"text":"position","start":31,"end":39,"id":4},{"text":":","start":39,"end":40,"id":5},{"text":"7","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"minimum","start":49,"end":56,"id":8},{"text":",","start":56,"end":57,"id":9},{"text":"expert","start":58,"end":64,"id":10},{"text":"in","start":65,"end":67,"id":11},{"text":"Python","start":68,"end":74,"id":12},{"text":",","start":74,"end":75,"id":13},{"text":"Compliance","start":76,"end":86,"id":14},{"text":"Knowledge","start":87,"end":96,"id":15},{"text":",","start":96,"end":97,"id":16},{"text":"and","start":98,"end":101,"id":17},{"text":"Security","start":102,"end":110,"id":18},{"text":"Protocols","start":111,"end":120,"id":19},{"text":".","start":120,"end":121,"id":20}]} {"text":"Required: SAML, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-834458072,"_task_hash":1254298991,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"SAML","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Metasploit","start":16,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"and","start":28,"end":31,"id":6},{"text":"OWASP","start":32,"end":37,"id":7},{"text":"Top","start":38,"end":41,"id":8},{"text":"10","start":42,"end":44,"id":9},{"text":"expertise","start":45,"end":54,"id":10},{"text":".","start":54,"end":55,"id":11}]} {"text":"Senior IAM Engineer skilled in Build Tools, Windows/Mac Support, and Application Security Architecture.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11},{"start":69,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1203031739,"_task_hash":1793382399,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"skilled","start":20,"end":27,"id":3},{"text":"in","start":28,"end":30,"id":4},{"text":"Build","start":31,"end":36,"id":5},{"text":"Tools","start":37,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"Windows","start":44,"end":51,"id":8},{"text":"/","start":51,"end":52,"id":9},{"text":"Mac","start":52,"end":55,"id":10},{"text":"Support","start":56,"end":63,"id":11},{"text":",","start":63,"end":64,"id":12},{"text":"and","start":65,"end":68,"id":13},{"text":"Application","start":69,"end":80,"id":14},{"text":"Security","start":81,"end":89,"id":15},{"text":"Architecture","start":90,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} {"text":"Published research on Security Operations trends.","spans":[{"start":22,"end":41,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":41,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1488056682,"_task_hash":1557845109,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Operations","start":31,"end":41,"id":4},{"text":"trends","start":42,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Network Engineer with hands-on experience in SIEM Operations, CrowdStrike, and Cloud Security Posture Management.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":62,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":112,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-2040333848,"_task_hash":959567011,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Engineer","start":8,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"hands","start":22,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"on","start":28,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"SIEM","start":45,"end":49,"id":8},{"text":"Operations","start":50,"end":60,"id":9},{"text":",","start":60,"end":61,"id":10},{"text":"CrowdStrike","start":62,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Cloud","start":79,"end":84,"id":14},{"text":"Security","start":85,"end":93,"id":15},{"text":"Posture","start":94,"end":101,"id":16},{"text":"Management","start":102,"end":112,"id":17},{"text":".","start":112,"end":113,"id":18}]} {"text":"Implemented controls for Cyber Resilience Act audit.","spans":[{"start":25,"end":45,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5},{"start":25,"end":45,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5},{"start":25,"end":45,"label":"REGULATION","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":927749510,"_task_hash":1650584272,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"Cyber","start":25,"end":30,"id":3},{"text":"Resilience","start":31,"end":41,"id":4},{"text":"Act","start":42,"end":45,"id":5},{"text":"audit","start":46,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Certified PMP Certification working as DPO, focused on GCP Security and SQL Injection prevention.","spans":[{"start":10,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":39,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":5},{"start":55,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":72,"end":85,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1113339224,"_task_hash":1662017710,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PMP","start":10,"end":13,"id":1},{"text":"Certification","start":14,"end":27,"id":2},{"text":"working","start":28,"end":35,"id":3},{"text":"as","start":36,"end":38,"id":4},{"text":"DPO","start":39,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"GCP","start":55,"end":58,"id":9},{"text":"Security","start":59,"end":67,"id":10},{"text":"and","start":68,"end":71,"id":11},{"text":"SQL","start":72,"end":75,"id":12},{"text":"Injection","start":76,"end":85,"id":13},{"text":"prevention","start":86,"end":96,"id":14},{"text":".","start":96,"end":97,"id":15}]} {"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} {"text":"TOGAF required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":190519494,"_task_hash":-1135331299,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Business Data Analyst professional with 10+ years implementing Wireshark and managing APIs programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":86,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1904999344,"_task_hash":-1849862142,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Data","start":9,"end":13,"id":1},{"text":"Analyst","start":14,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"10","start":40,"end":42,"id":5},{"text":"+","start":42,"end":43,"id":6},{"text":"years","start":44,"end":49,"id":7},{"text":"implementing","start":50,"end":62,"id":8},{"text":"Wireshark","start":63,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"managing","start":77,"end":85,"id":11},{"text":"APIs","start":86,"end":90,"id":12},{"text":"programs","start":91,"end":99,"id":13},{"text":".","start":99,"end":100,"id":14}]} {"text":"Data Analyst experienced in detecting DDoS attacks using Splunk.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":42,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":57,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":290763455,"_task_hash":-1780774042,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"experienced","start":13,"end":24,"id":2},{"text":"in","start":25,"end":27,"id":3},{"text":"detecting","start":28,"end":37,"id":4},{"text":"DDoS","start":38,"end":42,"id":5},{"text":"attacks","start":43,"end":50,"id":6},{"text":"using","start":51,"end":56,"id":7},{"text":"Splunk","start":57,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Must know EDR Tools, EDR Tools, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-301050741,"_task_hash":-83257733,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"EDR","start":21,"end":24,"id":5},{"text":"Tools","start":25,"end":30,"id":6},{"text":",","start":30,"end":31,"id":7},{"text":"and","start":32,"end":35,"id":8},{"text":"NIST","start":36,"end":40,"id":9},{"text":"Framework","start":41,"end":50,"id":10},{"text":".","start":50,"end":51,"id":11}]} {"text":"VR/AR required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1837477982,"_task_hash":-1254758870,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} {"text":"Ensured compliance with SOX requirements.","spans":[{"start":24,"end":27,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":24,"end":27,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-314420248,"_task_hash":-1053481664,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"SOX","start":24,"end":27,"id":3},{"text":"requirements","start":28,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} {"text":"Immediate opening for Computer Forensics Investigator.","spans":[{"start":22,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1057215689,"_task_hash":1910914194,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Computer","start":22,"end":30,"id":3},{"text":"Forensics","start":31,"end":40,"id":4},{"text":"Investigator","start":41,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Frontend Engineer needed for enterprise security team.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":210397117,"_task_hash":561890270,"tokens":[{"text":"Frontend","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"security","start":40,"end":48,"id":5},{"text":"team","start":49,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Experienced Insider Threat Analyst specializing in Cloud Security.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":51,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1063993427,"_task_hash":836063337,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Insider","start":12,"end":19,"id":1},{"text":"Threat","start":20,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"specializing","start":35,"end":47,"id":4},{"text":"in","start":48,"end":50,"id":5},{"text":"Cloud","start":51,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} {"text":"Published advisory for CVE-2020-1472 with remediation steps.","spans":[{"start":23,"end":36,"label":"CVE","answer":"accept","token_start":3,"token_end":5},{"start":23,"end":36,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":126874269,"_task_hash":227573880,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"advisory","start":10,"end":18,"id":1},{"text":"for","start":19,"end":22,"id":2},{"text":"CVE-2020","start":23,"end":31,"id":3},{"text":"-","start":31,"end":32,"id":4},{"text":"1472","start":32,"end":36,"id":5},{"text":"with","start":37,"end":41,"id":6},{"text":"remediation","start":42,"end":53,"id":7},{"text":"steps","start":54,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Defensive Security Analyst with 10+ years experience in Physics Engines, Neural Architectures, and Test Case Design.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":73,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":99,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1719913615,"_task_hash":-1269737678,"tokens":[{"text":"Defensive","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Analyst","start":19,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"10","start":32,"end":34,"id":4},{"text":"+","start":34,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"Physics","start":56,"end":63,"id":9},{"text":"Engines","start":64,"end":71,"id":10},{"text":",","start":71,"end":72,"id":11},{"text":"Neural","start":73,"end":79,"id":12},{"text":"Architectures","start":80,"end":93,"id":13},{"text":",","start":93,"end":94,"id":14},{"text":"and","start":95,"end":98,"id":15},{"text":"Test","start":99,"end":103,"id":16},{"text":"Case","start":104,"end":108,"id":17},{"text":"Design","start":109,"end":115,"id":18},{"text":".","start":115,"end":116,"id":19}]} {"text":"Join our team as Container Security Specialist!","spans":[{"start":17,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1482389099,"_task_hash":-32688422,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Container","start":17,"end":26,"id":4},{"text":"Security","start":27,"end":35,"id":5},{"text":"Specialist","start":36,"end":46,"id":6},{"text":"!","start":46,"end":47,"id":7}]} {"text":"We need a Cyber Insurance Specialist skilled in Remote Code Execution prevention and Man-in-the-Middle analysis using Burp Suite.","spans":[{"start":10,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":48,"end":69,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":10},{"start":85,"end":102,"label":"THREAT_TYPE","answer":"accept","token_start":13,"token_end":19},{"start":118,"end":128,"label":"SECURITY_TOOL","answer":"accept","token_start":22,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1608045562,"_task_hash":1566168191,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cyber","start":10,"end":15,"id":3},{"text":"Insurance","start":16,"end":25,"id":4},{"text":"Specialist","start":26,"end":36,"id":5},{"text":"skilled","start":37,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Remote","start":48,"end":54,"id":8},{"text":"Code","start":55,"end":59,"id":9},{"text":"Execution","start":60,"end":69,"id":10},{"text":"prevention","start":70,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Man","start":85,"end":88,"id":13},{"text":"-","start":88,"end":89,"id":14},{"text":"in","start":89,"end":91,"id":15},{"text":"-","start":91,"end":92,"id":16},{"text":"the","start":92,"end":95,"id":17},{"text":"-","start":95,"end":96,"id":18},{"text":"Middle","start":96,"end":102,"id":19},{"text":"analysis","start":103,"end":111,"id":20},{"text":"using","start":112,"end":117,"id":21},{"text":"Burp","start":118,"end":122,"id":22},{"text":"Suite","start":123,"end":128,"id":23},{"text":".","start":128,"end":129,"id":24}]} {"text":"Detected Kerberoasting attack in production environment.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1035037741,"_task_hash":1756308966,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Kerberoasting","start":9,"end":22,"id":1},{"text":"attack","start":23,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"production","start":33,"end":43,"id":4},{"text":"environment","start":44,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"Proficient in Nessus and SIEM Operations.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-118921986,"_task_hash":1901973906,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":"Operations","start":30,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Must have SIEM experience and NIST Framework knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1703965436,"_task_hash":1407445997,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"knowledge","start":45,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Pen Tester role available: Data Science Collaboration experience required, Security Assessment knowledge essential.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":27,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":75,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-856375911,"_task_hash":1059426067,"tokens":[{"text":"Pen","start":0,"end":3,"id":0},{"text":"Tester","start":4,"end":10,"id":1},{"text":"role","start":11,"end":15,"id":2},{"text":"available","start":16,"end":25,"id":3},{"text":":","start":25,"end":26,"id":4},{"text":"Data","start":27,"end":31,"id":5},{"text":"Science","start":32,"end":39,"id":6},{"text":"Collaboration","start":40,"end":53,"id":7},{"text":"experience","start":54,"end":64,"id":8},{"text":"required","start":65,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"Security","start":75,"end":83,"id":11},{"text":"Assessment","start":84,"end":94,"id":12},{"text":"knowledge","start":95,"end":104,"id":13},{"text":"essential","start":105,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} {"text":"Cloud Security team implemented Zero Trust per NIST CSF.","spans":[{"start":0,"end":14,"label":"SECURITY_DOMAIN","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":42,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5},{"start":47,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1385906985,"_task_hash":-1456036204,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"team","start":15,"end":19,"id":2},{"text":"implemented","start":20,"end":31,"id":3},{"text":"Zero","start":32,"end":36,"id":4},{"text":"Trust","start":37,"end":42,"id":5},{"text":"per","start":43,"end":46,"id":6},{"text":"NIST","start":47,"end":51,"id":7},{"text":"CSF","start":52,"end":55,"id":8},{"text":".","start":55,"end":56,"id":9}]} {"text":"Tested WAF rules against DNS Hijacking payloads.","spans":[{"start":25,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1870305299,"_task_hash":410163645,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"DNS","start":25,"end":28,"id":4},{"text":"Hijacking","start":29,"end":38,"id":5},{"text":"payloads","start":39,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Coordinated with law enforcement on adware case.","spans":[{"start":36,"end":42,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1484902204,"_task_hash":-978241638,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"adware","start":36,"end":42,"id":5},{"text":"case","start":43,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Lead UX Designer managing Subnetting and Claims Management initiatives.","spans":[{"start":5,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":26,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-804567754,"_task_hash":-2128142015,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"UX","start":5,"end":7,"id":1},{"text":"Designer","start":8,"end":16,"id":2},{"text":"managing","start":17,"end":25,"id":3},{"text":"Subnetting","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Claims","start":41,"end":47,"id":6},{"text":"Management","start":48,"end":58,"id":7},{"text":"initiatives","start":59,"end":70,"id":8},{"text":".","start":70,"end":71,"id":9}]} {"text":"Lead Mobile App Developer managing Policy Development and Cloud Networking initiatives.","spans":[{"start":5,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":58,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1060970649,"_task_hash":299984799,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Mobile","start":5,"end":11,"id":1},{"text":"App","start":12,"end":15,"id":2},{"text":"Developer","start":16,"end":25,"id":3},{"text":"managing","start":26,"end":34,"id":4},{"text":"Policy","start":35,"end":41,"id":5},{"text":"Development","start":42,"end":53,"id":6},{"text":"and","start":54,"end":57,"id":7},{"text":"Cloud","start":58,"end":63,"id":8},{"text":"Networking","start":64,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} {"text":"Enterprise Cloud Architect professional with 7+ years implementing EDR Platforms and managing YARA Rules programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":67,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":94,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1318026610,"_task_hash":467244188,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"7","start":45,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"implementing","start":54,"end":66,"id":8},{"text":"EDR","start":67,"end":70,"id":9},{"text":"Platforms","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"managing","start":85,"end":93,"id":12},{"text":"YARA","start":94,"end":98,"id":13},{"text":"Rules","start":99,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} {"text":"Certified JIRA working as Firmware Engineer, focused on Cloud Security and SSRF prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":56,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":75,"end":79,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1012953653,"_task_hash":665370984,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"JIRA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Firmware","start":26,"end":34,"id":4},{"text":"Engineer","start":35,"end":43,"id":5},{"text":",","start":43,"end":44,"id":6},{"text":"focused","start":45,"end":52,"id":7},{"text":"on","start":53,"end":55,"id":8},{"text":"Cloud","start":56,"end":61,"id":9},{"text":"Security","start":62,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"SSRF","start":75,"end":79,"id":12},{"text":"prevention","start":80,"end":90,"id":13},{"text":".","start":90,"end":91,"id":14}]} {"text":"Analyzed DNS Hijacking samples in malware lab.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":966847028,"_task_hash":161930533,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"DNS","start":9,"end":12,"id":1},{"text":"Hijacking","start":13,"end":22,"id":2},{"text":"samples","start":23,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"malware","start":34,"end":41,"id":5},{"text":"lab","start":42,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Help Desk Technician role available: Vulnerability Scanning experience required, Azure Security knowledge essential.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":37,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2104335826,"_task_hash":508429623,"tokens":[{"text":"Help","start":0,"end":4,"id":0},{"text":"Desk","start":5,"end":9,"id":1},{"text":"Technician","start":10,"end":20,"id":2},{"text":"role","start":21,"end":25,"id":3},{"text":"available","start":26,"end":35,"id":4},{"text":":","start":35,"end":36,"id":5},{"text":"Vulnerability","start":37,"end":50,"id":6},{"text":"Scanning","start":51,"end":59,"id":7},{"text":"experience","start":60,"end":70,"id":8},{"text":"required","start":71,"end":79,"id":9},{"text":",","start":79,"end":80,"id":10},{"text":"Azure","start":81,"end":86,"id":11},{"text":"Security","start":87,"end":95,"id":12},{"text":"knowledge","start":96,"end":105,"id":13},{"text":"essential","start":106,"end":115,"id":14},{"text":".","start":115,"end":116,"id":15}]} {"text":"Head of Security with hands-on experience in CrowdStrike, CrowdStrike, and Pod Security.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":75,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-330263635,"_task_hash":1576506800,"tokens":[{"text":"Head","start":0,"end":4,"id":0},{"text":"of","start":5,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"with","start":17,"end":21,"id":3},{"text":"hands","start":22,"end":27,"id":4},{"text":"-","start":27,"end":28,"id":5},{"text":"on","start":28,"end":30,"id":6},{"text":"experience","start":31,"end":41,"id":7},{"text":"in","start":42,"end":44,"id":8},{"text":"CrowdStrike","start":45,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"CrowdStrike","start":58,"end":69,"id":11},{"text":",","start":69,"end":70,"id":12},{"text":"and","start":71,"end":74,"id":13},{"text":"Pod","start":75,"end":78,"id":14},{"text":"Security","start":79,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"Content Writer with expertise in OWASP Top 10 compliance and Simulation operations.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":61,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-890018249,"_task_hash":2005822691,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Writer","start":8,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"expertise","start":20,"end":29,"id":3},{"text":"in","start":30,"end":32,"id":4},{"text":"OWASP","start":33,"end":38,"id":5},{"text":"Top","start":39,"end":42,"id":6},{"text":"10","start":43,"end":45,"id":7},{"text":"compliance","start":46,"end":56,"id":8},{"text":"and","start":57,"end":60,"id":9},{"text":"Simulation","start":61,"end":71,"id":10},{"text":"operations","start":72,"end":82,"id":11},{"text":".","start":82,"end":83,"id":12}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Senior Network Security Specialist position: 10 years minimum, expert in Network Traffic Analysis, Analytics, and Wireless Security.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":73,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14},{"start":99,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16},{"start":114,"end":131,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":20}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-601892052,"_task_hash":1692421719,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Network","start":7,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Specialist","start":24,"end":34,"id":3},{"text":"position","start":35,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"10","start":45,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"minimum","start":54,"end":61,"id":8},{"text":",","start":61,"end":62,"id":9},{"text":"expert","start":63,"end":69,"id":10},{"text":"in","start":70,"end":72,"id":11},{"text":"Network","start":73,"end":80,"id":12},{"text":"Traffic","start":81,"end":88,"id":13},{"text":"Analysis","start":89,"end":97,"id":14},{"text":",","start":97,"end":98,"id":15},{"text":"Analytics","start":99,"end":108,"id":16},{"text":",","start":108,"end":109,"id":17},{"text":"and","start":110,"end":113,"id":18},{"text":"Wireless","start":114,"end":122,"id":19},{"text":"Security","start":123,"end":131,"id":20},{"text":".","start":131,"end":132,"id":21}]} {"text":"Game Engineer with hands-on experience in ELK Stack, EDR Tools, and Supply Chain Security.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":42,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":53,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":68,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1746157217,"_task_hash":419960794,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Engineer","start":5,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"hands","start":19,"end":24,"id":3},{"text":"-","start":24,"end":25,"id":4},{"text":"on","start":25,"end":27,"id":5},{"text":"experience","start":28,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"ELK","start":42,"end":45,"id":8},{"text":"Stack","start":46,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"EDR","start":53,"end":56,"id":11},{"text":"Tools","start":57,"end":62,"id":12},{"text":",","start":62,"end":63,"id":13},{"text":"and","start":64,"end":67,"id":14},{"text":"Supply","start":68,"end":74,"id":15},{"text":"Chain","start":75,"end":80,"id":16},{"text":"Security","start":81,"end":89,"id":17},{"text":".","start":89,"end":90,"id":18}]} {"text":"Insider Risk Specialist with expertise in OWASP Top 10 compliance and Investigations operations.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":54,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":70,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-224499989,"_task_hash":1151601196,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Risk","start":8,"end":12,"id":1},{"text":"Specialist","start":13,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"expertise","start":29,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"OWASP","start":42,"end":47,"id":6},{"text":"Top","start":48,"end":51,"id":7},{"text":"10","start":52,"end":54,"id":8},{"text":"compliance","start":55,"end":65,"id":9},{"text":"and","start":66,"end":69,"id":10},{"text":"Investigations","start":70,"end":84,"id":11},{"text":"operations","start":85,"end":95,"id":12},{"text":".","start":95,"end":96,"id":13}]} {"text":"Seeking Chief Privacy Officer with 3+ years experience in Fast Comebacks and Threat Intelligence Platforms.","spans":[{"start":8,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":77,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-899792198,"_task_hash":-78844028,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Chief","start":8,"end":13,"id":1},{"text":"Privacy","start":14,"end":21,"id":2},{"text":"Officer","start":22,"end":29,"id":3},{"text":"with","start":30,"end":34,"id":4},{"text":"3","start":35,"end":36,"id":5},{"text":"+","start":36,"end":37,"id":6},{"text":"years","start":38,"end":43,"id":7},{"text":"experience","start":44,"end":54,"id":8},{"text":"in","start":55,"end":57,"id":9},{"text":"Fast","start":58,"end":62,"id":10},{"text":"Comebacks","start":63,"end":72,"id":11},{"text":"and","start":73,"end":76,"id":12},{"text":"Threat","start":77,"end":83,"id":13},{"text":"Intelligence","start":84,"end":96,"id":14},{"text":"Platforms","start":97,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Seeking Enterprise Risk Analyst with 3+ years experience in Content Development and Tabletop Exercises.","spans":[{"start":8,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":60,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":84,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1717543027,"_task_hash":-839137830,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Enterprise","start":8,"end":18,"id":1},{"text":"Risk","start":19,"end":23,"id":2},{"text":"Analyst","start":24,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"3","start":37,"end":38,"id":5},{"text":"+","start":38,"end":39,"id":6},{"text":"years","start":40,"end":45,"id":7},{"text":"experience","start":46,"end":56,"id":8},{"text":"in","start":57,"end":59,"id":9},{"text":"Content","start":60,"end":67,"id":10},{"text":"Development","start":68,"end":79,"id":11},{"text":"and","start":80,"end":83,"id":12},{"text":"Tabletop","start":84,"end":92,"id":13},{"text":"Exercises","start":93,"end":102,"id":14},{"text":".","start":102,"end":103,"id":15}]} {"text":"Holds ETL certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-137892975,"_task_hash":1096979253,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ETL","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Immediate opening for Security Defense Analyst.","spans":[{"start":22,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1001710535,"_task_hash":-1103079237,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Defense","start":31,"end":38,"id":4},{"text":"Analyst","start":39,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"NIST RMF certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1708361409,"_task_hash":252404575,"tokens":[{"text":"NIST","start":0,"end":4,"id":0},{"text":"RMF","start":5,"end":8,"id":1},{"text":"certification","start":9,"end":22,"id":2},{"text":"a","start":23,"end":24,"id":3},{"text":"plus","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"Accomplished Cybersecurity Threat Hunter specializing in User Education and Security Hardening.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":418988603,"_task_hash":284649465,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cybersecurity","start":13,"end":26,"id":1},{"text":"Threat","start":27,"end":33,"id":2},{"text":"Hunter","start":34,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"User","start":57,"end":61,"id":6},{"text":"Education","start":62,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":"Hardening","start":85,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} {"text":"Detected trojan activity using behavioral analytics.","spans":[{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":15,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-183556102,"_task_hash":-1429547961,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"trojan","start":9,"end":15,"id":1},{"text":"activity","start":16,"end":24,"id":2},{"text":"using","start":25,"end":30,"id":3},{"text":"behavioral","start":31,"end":41,"id":4},{"text":"analytics","start":42,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Required skills: Metasploit, HTML/CSS, ROS certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":37,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":39,"end":42,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1945672750,"_task_hash":1843872717,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"HTML","start":29,"end":33,"id":5},{"text":"/","start":33,"end":34,"id":6},{"text":"CSS","start":34,"end":37,"id":7},{"text":",","start":37,"end":38,"id":8},{"text":"ROS","start":39,"end":42,"id":9},{"text":"certification","start":43,"end":56,"id":10},{"text":".","start":56,"end":57,"id":11}]} {"text":"Red Team Operator opportunity: Lead Supply Chain Security program, implement NIST Framework, manage Vulnerability Management Platforms operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":91,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":100,"end":134,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":635751935,"_task_hash":2063556712,"tokens":[{"text":"Red","start":0,"end":3,"id":0},{"text":"Team","start":4,"end":8,"id":1},{"text":"Operator","start":9,"end":17,"id":2},{"text":"opportunity","start":18,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"Lead","start":31,"end":35,"id":5},{"text":"Supply","start":36,"end":42,"id":6},{"text":"Chain","start":43,"end":48,"id":7},{"text":"Security","start":49,"end":57,"id":8},{"text":"program","start":58,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"implement","start":67,"end":76,"id":11},{"text":"NIST","start":77,"end":81,"id":12},{"text":"Framework","start":82,"end":91,"id":13},{"text":",","start":91,"end":92,"id":14},{"text":"manage","start":93,"end":99,"id":15},{"text":"Vulnerability","start":100,"end":113,"id":16},{"text":"Management","start":114,"end":124,"id":17},{"text":"Platforms","start":125,"end":134,"id":18},{"text":"operations","start":135,"end":145,"id":19},{"text":".","start":145,"end":146,"id":20}]} {"text":"Responded to worm incident affecting 1000+ users.","spans":[{"start":13,"end":17,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2},{"start":13,"end":17,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1315724032,"_task_hash":479010212,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"worm","start":13,"end":17,"id":2},{"text":"incident","start":18,"end":26,"id":3},{"text":"affecting","start":27,"end":36,"id":4},{"text":"1000","start":37,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"users","start":43,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"PCI DSS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-622427497,"_task_hash":1606374258,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"DSS","start":4,"end":7,"id":1},{"text":"certified","start":8,"end":17,"id":2},{"text":".","start":17,"end":18,"id":3}]} {"text":"Simulated Lateral Movement during red team exercise.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2077810007,"_task_hash":-211377829,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Lateral","start":10,"end":17,"id":1},{"text":"Movement","start":18,"end":26,"id":2},{"text":"during","start":27,"end":33,"id":3},{"text":"red","start":34,"end":37,"id":4},{"text":"team","start":38,"end":42,"id":5},{"text":"exercise","start":43,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"Experienced Security Operations Lead specializing in Security Strategy.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":448234392,"_task_hash":553612563,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Operations","start":21,"end":31,"id":2},{"text":"Lead","start":32,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Security","start":53,"end":61,"id":6},{"text":"Strategy","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} {"text":"Detected credential stuffing activity using behavioral analytics.","spans":[{"start":9,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2034057119,"_task_hash":-1487793195,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"credential","start":9,"end":19,"id":1},{"text":"stuffing","start":20,"end":28,"id":2},{"text":"activity","start":29,"end":37,"id":3},{"text":"using","start":38,"end":43,"id":4},{"text":"behavioral","start":44,"end":54,"id":5},{"text":"analytics","start":55,"end":64,"id":6},{"text":".","start":64,"end":65,"id":7}]} {"text":"Required: LDAP, SIEM, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":26,"end":38,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1782546672,"_task_hash":-2034984587,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"LDAP","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"SIEM","start":16,"end":20,"id":4},{"text":",","start":20,"end":21,"id":5},{"text":"and","start":22,"end":25,"id":6},{"text":"OWASP","start":26,"end":31,"id":7},{"text":"Top","start":32,"end":35,"id":8},{"text":"10","start":36,"end":38,"id":9},{"text":"expertise","start":39,"end":48,"id":10},{"text":".","start":48,"end":49,"id":11}]} {"text":"Detected ransomware activity using behavioral analytics.","spans":[{"start":9,"end":19,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1534920508,"_task_hash":1014981119,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"ransomware","start":9,"end":19,"id":1},{"text":"activity","start":20,"end":28,"id":2},{"text":"using","start":29,"end":34,"id":3},{"text":"behavioral","start":35,"end":45,"id":4},{"text":"analytics","start":46,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"PCI DSS required.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1624047420,"_task_hash":1330394467,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"DSS","start":4,"end":7,"id":1},{"text":"required","start":8,"end":16,"id":2},{"text":".","start":16,"end":17,"id":3}]} {"text":"Published research on Incident Response trends.","spans":[{"start":22,"end":39,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1405963628,"_task_hash":-1005763590,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Incident","start":22,"end":30,"id":3},{"text":"Response","start":31,"end":39,"id":4},{"text":"trends","start":40,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Looking for Security Risk Analyst to lead API Security initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":42,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":946343582,"_task_hash":-977530514,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Risk","start":21,"end":25,"id":3},{"text":"Analyst","start":26,"end":33,"id":4},{"text":"to","start":34,"end":36,"id":5},{"text":"lead","start":37,"end":41,"id":6},{"text":"API","start":42,"end":45,"id":7},{"text":"Security","start":46,"end":54,"id":8},{"text":"initiatives","start":55,"end":66,"id":9},{"text":".","start":66,"end":67,"id":10}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Specialized in Security Engineering for enterprise environments.","spans":[{"start":15,"end":35,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":15,"end":35,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":383289117,"_task_hash":-1424694052,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Engineering","start":24,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"enterprise","start":40,"end":50,"id":5},{"text":"environments","start":51,"end":63,"id":6},{"text":".","start":63,"end":64,"id":7}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Immediate opening for Social Engineering Specialist.","spans":[{"start":22,"end":51,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1164588858,"_task_hash":411675023,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Social","start":22,"end":28,"id":3},{"text":"Engineering","start":29,"end":40,"id":4},{"text":"Specialist","start":41,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Security Architect with CCSP certification, expert in Check Point.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1677440570,"_task_hash":1793398041,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CCSP","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Check","start":54,"end":59,"id":8},{"text":"Point","start":60,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"SABSA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":953533127,"_task_hash":482991972,"tokens":[{"text":"SABSA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Seeking VP Information Security with 5++ years experience in Technology Strategy and Unreal.","spans":[{"start":8,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1085413242,"_task_hash":-1026359513,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"VP","start":8,"end":10,"id":1},{"text":"Information","start":11,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"experience","start":47,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"Technology","start":61,"end":71,"id":9},{"text":"Strategy","start":72,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Unreal","start":85,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Lead Security Operations Analyst managing Sass/SCSS and Transformers initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":56,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1339136181,"_task_hash":-2020174889,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Operations","start":14,"end":24,"id":2},{"text":"Analyst","start":25,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Sass","start":42,"end":46,"id":5},{"text":"/","start":46,"end":47,"id":6},{"text":"SCSS","start":47,"end":51,"id":7},{"text":"and","start":52,"end":55,"id":8},{"text":"Transformers","start":56,"end":68,"id":9},{"text":"initiatives","start":69,"end":80,"id":10},{"text":".","start":80,"end":81,"id":11}]} {"text":"Expert in GLBA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1495699365,"_task_hash":435438006,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GLBA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Proficient in SIEM and ELK Stack.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1325037787,"_task_hash":524191896,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"ELK","start":23,"end":26,"id":4},{"text":"Stack","start":27,"end":32,"id":5},{"text":".","start":32,"end":33,"id":6}]} {"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} {"text":"C/C++ required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":699091344,"_task_hash":1704612957,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} {"text":"Accomplished Help Desk Technician specializing in Fortinet and Building Security.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":63,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1344057659,"_task_hash":-1065010127,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Help","start":13,"end":17,"id":1},{"text":"Desk","start":18,"end":22,"id":2},{"text":"Technician","start":23,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Fortinet","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Building","start":63,"end":71,"id":8},{"text":"Security","start":72,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Looking for IT Administrator to lead Security Architecture initiatives.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":37,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":131927704,"_task_hash":-1745698767,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"IT","start":12,"end":14,"id":2},{"text":"Administrator","start":15,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"lead","start":32,"end":36,"id":5},{"text":"Security","start":37,"end":45,"id":6},{"text":"Architecture","start":46,"end":58,"id":7},{"text":"initiatives","start":59,"end":70,"id":8},{"text":".","start":70,"end":71,"id":9}]} {"text":"Implemented Digital Forensics controls and monitoring.","spans":[{"start":12,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-678532801,"_task_hash":1909567699,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Digital","start":12,"end":19,"id":1},{"text":"Forensics","start":20,"end":29,"id":2},{"text":"controls","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"monitoring","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Required: ITIL, EDR Platforms, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1779037606,"_task_hash":2106693844,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ITIL","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Platforms","start":20,"end":29,"id":5},{"text":",","start":29,"end":30,"id":6},{"text":"and","start":31,"end":34,"id":7},{"text":"NIST","start":35,"end":39,"id":8},{"text":"Framework","start":40,"end":49,"id":9},{"text":"expertise","start":50,"end":59,"id":10},{"text":".","start":59,"end":60,"id":11}]} {"text":"Responded to DDoS incident affecting 1000+ users.","spans":[{"start":13,"end":17,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":395286388,"_task_hash":637164789,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"DDoS","start":13,"end":17,"id":2},{"text":"incident","start":18,"end":26,"id":3},{"text":"affecting","start":27,"end":36,"id":4},{"text":"1000","start":37,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"users","start":43,"end":48,"id":7},{"text":".","start":48,"end":49,"id":8}]} {"text":"Developed Blue Team strategy and roadmap.","spans":[{"start":10,"end":19,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1089026168,"_task_hash":-2050059063,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Blue","start":10,"end":14,"id":1},{"text":"Team","start":15,"end":19,"id":2},{"text":"strategy","start":20,"end":28,"id":3},{"text":"and","start":29,"end":32,"id":4},{"text":"roadmap","start":33,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Holds PCI DSS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-638098235,"_task_hash":1614876755,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PCI","start":6,"end":9,"id":1},{"text":"DSS","start":10,"end":13,"id":2},{"text":"certification","start":14,"end":27,"id":3},{"text":".","start":27,"end":28,"id":4}]} {"text":"Developed detection for Golden Ticket attacks.","spans":[{"start":24,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1061633538,"_task_hash":-1136636822,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Golden","start":24,"end":30,"id":3},{"text":"Ticket","start":31,"end":37,"id":4},{"text":"attacks","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Seeking Machine Learning Product Manager with 10+ years experience in Physics and Data Minimization.","spans":[{"start":8,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":70,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":82,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1182872735,"_task_hash":1218108865,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Machine","start":8,"end":15,"id":1},{"text":"Learning","start":16,"end":24,"id":2},{"text":"Product","start":25,"end":32,"id":3},{"text":"Manager","start":33,"end":40,"id":4},{"text":"with","start":41,"end":45,"id":5},{"text":"10","start":46,"end":48,"id":6},{"text":"+","start":48,"end":49,"id":7},{"text":"years","start":50,"end":55,"id":8},{"text":"experience","start":56,"end":66,"id":9},{"text":"in","start":67,"end":69,"id":10},{"text":"Physics","start":70,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Data","start":82,"end":86,"id":13},{"text":"Minimization","start":87,"end":99,"id":14},{"text":".","start":99,"end":100,"id":15}]} {"text":"Lead VP Security managing Model Serving and Data Governance initiatives.","spans":[{"start":5,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":26,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":44,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":856846443,"_task_hash":-1299252664,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"VP","start":5,"end":7,"id":1},{"text":"Security","start":8,"end":16,"id":2},{"text":"managing","start":17,"end":25,"id":3},{"text":"Model","start":26,"end":31,"id":4},{"text":"Serving","start":32,"end":39,"id":5},{"text":"and","start":40,"end":43,"id":6},{"text":"Data","start":44,"end":48,"id":7},{"text":"Governance","start":49,"end":59,"id":8},{"text":"initiatives","start":60,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"Looking for AI/ML Security Specialist to lead Database Security initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":6},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":636089356,"_task_hash":-1660686896,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"AI","start":12,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"ML","start":15,"end":17,"id":4},{"text":"Security","start":18,"end":26,"id":5},{"text":"Specialist","start":27,"end":37,"id":6},{"text":"to","start":38,"end":40,"id":7},{"text":"lead","start":41,"end":45,"id":8},{"text":"Database","start":46,"end":54,"id":9},{"text":"Security","start":55,"end":63,"id":10},{"text":"initiatives","start":64,"end":75,"id":11},{"text":".","start":75,"end":76,"id":12}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Seeking AI Research Scientist with 3++ years experience in GRC Platforms and Editing.","spans":[{"start":8,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":59,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1260909177,"_task_hash":-927296092,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Research","start":11,"end":19,"id":2},{"text":"Scientist","start":20,"end":29,"id":3},{"text":"with","start":30,"end":34,"id":4},{"text":"3++","start":35,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"GRC","start":59,"end":62,"id":9},{"text":"Platforms","start":63,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Editing","start":77,"end":84,"id":12},{"text":".","start":84,"end":85,"id":13}]} {"text":"Cloud Security Engineer with GPEN certification, expert in Mimikatz.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":33,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":59,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1553544920,"_task_hash":1832765067,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"GPEN","start":29,"end":33,"id":4},{"text":"certification","start":34,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"expert","start":49,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Mimikatz","start":59,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} {"text":"Lead EDR Specialist managing Mobile Forensics and Sprint Planning initiatives.","spans":[{"start":5,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":50,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1372497071,"_task_hash":-823703421,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"EDR","start":5,"end":8,"id":1},{"text":"Specialist","start":9,"end":19,"id":2},{"text":"managing","start":20,"end":28,"id":3},{"text":"Mobile","start":29,"end":35,"id":4},{"text":"Forensics","start":36,"end":45,"id":5},{"text":"and","start":46,"end":49,"id":6},{"text":"Sprint","start":50,"end":56,"id":7},{"text":"Planning","start":57,"end":65,"id":8},{"text":"initiatives","start":66,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} {"text":"Required: ISO 31000, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-23046429,"_task_hash":1737669960,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"31000","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"ELK","start":21,"end":24,"id":5},{"text":"Stack","start":25,"end":30,"id":6},{"text":",","start":30,"end":31,"id":7},{"text":"and","start":32,"end":35,"id":8},{"text":"OWASP","start":36,"end":41,"id":9},{"text":"Top","start":42,"end":45,"id":10},{"text":"10","start":46,"end":48,"id":11},{"text":"expertise","start":49,"end":58,"id":12},{"text":".","start":58,"end":59,"id":13}]} {"text":"PKI certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":843245551,"_task_hash":-225831804,"tokens":[{"text":"PKI","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Implemented OT Security controls and monitoring.","spans":[{"start":12,"end":23,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1541725405,"_task_hash":476886883,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OT","start":12,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"controls","start":24,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"monitoring","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Developed Security Engineering strategy and roadmap.","spans":[{"start":10,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1520177537,"_task_hash":-269745955,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Engineering","start":19,"end":30,"id":2},{"text":"strategy","start":31,"end":39,"id":3},{"text":"and","start":40,"end":43,"id":4},{"text":"roadmap","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Certified SLAM working as Software Architect, focused on CI/CD Security and Buffer Overflow prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12},{"start":76,"end":91,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":946016187,"_task_hash":-2075681759,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SLAM","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Software","start":26,"end":34,"id":4},{"text":"Architect","start":35,"end":44,"id":5},{"text":",","start":44,"end":45,"id":6},{"text":"focused","start":46,"end":53,"id":7},{"text":"on","start":54,"end":56,"id":8},{"text":"CI","start":57,"end":59,"id":9},{"text":"/","start":59,"end":60,"id":10},{"text":"CD","start":60,"end":62,"id":11},{"text":"Security","start":63,"end":71,"id":12},{"text":"and","start":72,"end":75,"id":13},{"text":"Buffer","start":76,"end":82,"id":14},{"text":"Overflow","start":83,"end":91,"id":15},{"text":"prevention","start":92,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} {"text":"SABSA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":953533127,"_task_hash":482991972,"tokens":[{"text":"SABSA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Immediate opening for IT Administrator.","spans":[{"start":22,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-914620696,"_task_hash":826409544,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"IT","start":22,"end":24,"id":3},{"text":"Administrator","start":25,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Immediate opening for Emergency Response Manager.","spans":[{"start":22,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1735848622,"_task_hash":-209580525,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Emergency","start":22,"end":31,"id":3},{"text":"Response","start":32,"end":40,"id":4},{"text":"Manager","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Expert in HIPAA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-768324278,"_task_hash":-2027532621,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"HIPAA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Join our team as Social Engineering Tester!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1577165343,"_task_hash":-1784659638,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Social","start":17,"end":23,"id":4},{"text":"Engineering","start":24,"end":35,"id":5},{"text":"Tester","start":36,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} {"text":"Experienced Security Risk Analyst specializing in Security Frameworks.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":557571320,"_task_hash":126580802,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Risk","start":21,"end":25,"id":2},{"text":"Analyst","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Frameworks","start":59,"end":69,"id":7},{"text":".","start":69,"end":70,"id":8}]} {"text":"Looking for Server-Side Developer to lead API Security initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":5},{"start":42,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-687060429,"_task_hash":-613256071,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Server","start":12,"end":18,"id":2},{"text":"-","start":18,"end":19,"id":3},{"text":"Side","start":19,"end":23,"id":4},{"text":"Developer","start":24,"end":33,"id":5},{"text":"to","start":34,"end":36,"id":6},{"text":"lead","start":37,"end":41,"id":7},{"text":"API","start":42,"end":45,"id":8},{"text":"Security","start":46,"end":54,"id":9},{"text":"initiatives","start":55,"end":66,"id":10},{"text":".","start":66,"end":67,"id":11}]} {"text":"Developed playbooks for trojan response.","spans":[{"start":24,"end":30,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1476755427,"_task_hash":2050224916,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"trojan","start":24,"end":30,"id":3},{"text":"response","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Big Data Engineer with expertise in NIST Framework compliance and Product Strategy operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":66,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1683311862,"_task_hash":1049024728,"tokens":[{"text":"Big","start":0,"end":3,"id":0},{"text":"Data","start":4,"end":8,"id":1},{"text":"Engineer","start":9,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Product","start":66,"end":73,"id":10},{"text":"Strategy","start":74,"end":82,"id":11},{"text":"operations","start":83,"end":93,"id":12},{"text":".","start":93,"end":94,"id":13}]} {"text":"Join our team as Computer Forensics Investigator!","spans":[{"start":17,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":931199770,"_task_hash":1164981756,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Computer","start":17,"end":25,"id":4},{"text":"Forensics","start":26,"end":35,"id":5},{"text":"Investigator","start":36,"end":48,"id":6},{"text":"!","start":48,"end":49,"id":7}]} {"text":"AWS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":411302902,"_task_hash":-651527579,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Holds IDS/IPS.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1001366409,"_task_hash":-842152492,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":".","start":13,"end":14,"id":4}]} {"text":"Conducted Business Impact Analysis for enterprise systems.","spans":[{"start":10,"end":34,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1608344270,"_task_hash":-1534151499,"tokens":[{"text":"Conducted","start":0,"end":9,"id":0},{"text":"Business","start":10,"end":18,"id":1},{"text":"Impact","start":19,"end":25,"id":2},{"text":"Analysis","start":26,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"enterprise","start":39,"end":49,"id":5},{"text":"systems","start":50,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Analyzed ransomware campaign targeting financial sector.","spans":[{"start":9,"end":19,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1995162044,"_task_hash":1016545034,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"ransomware","start":9,"end":19,"id":1},{"text":"campaign","start":20,"end":28,"id":2},{"text":"targeting","start":29,"end":38,"id":3},{"text":"financial","start":39,"end":48,"id":4},{"text":"sector","start":49,"end":55,"id":5},{"text":".","start":55,"end":56,"id":6}]} {"text":"Expert in HIPAA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-768324278,"_task_hash":-2027532621,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"HIPAA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Join our team as Senior Security Architect!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2126158519,"_task_hash":-1506078452,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Senior","start":17,"end":23,"id":4},{"text":"Security","start":24,"end":32,"id":5},{"text":"Architect","start":33,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} {"text":"Senior Cloud Security Specialist position: 5 years minimum, expert in Secure Multi-Party Computation, Financial Analysis, and Security Frameworks.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":70,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":16},{"start":102,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":18,"token_end":19},{"start":126,"end":145,"label":"SECURITY_DOMAIN","answer":"accept","token_start":22,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1549225190,"_task_hash":-1011319881,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"position","start":33,"end":41,"id":4},{"text":":","start":41,"end":42,"id":5},{"text":"5","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"minimum","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"expert","start":60,"end":66,"id":10},{"text":"in","start":67,"end":69,"id":11},{"text":"Secure","start":70,"end":76,"id":12},{"text":"Multi","start":77,"end":82,"id":13},{"text":"-","start":82,"end":83,"id":14},{"text":"Party","start":83,"end":88,"id":15},{"text":"Computation","start":89,"end":100,"id":16},{"text":",","start":100,"end":101,"id":17},{"text":"Financial","start":102,"end":111,"id":18},{"text":"Analysis","start":112,"end":120,"id":19},{"text":",","start":120,"end":121,"id":20},{"text":"and","start":122,"end":125,"id":21},{"text":"Security","start":126,"end":134,"id":22},{"text":"Frameworks","start":135,"end":145,"id":23},{"text":".","start":145,"end":146,"id":24}]} {"text":"Performed Internal Audit for SOC 2 certification.","spans":[{"start":10,"end":24,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1750278577,"_task_hash":907781120,"tokens":[{"text":"Performed","start":0,"end":9,"id":0},{"text":"Internal","start":10,"end":18,"id":1},{"text":"Audit","start":19,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"SOC","start":29,"end":32,"id":4},{"text":"2","start":33,"end":34,"id":5},{"text":"certification","start":35,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Required skills: Splunk, Audit Coordination, ITIL certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1759538557,"_task_hash":-1019708283,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Audit","start":25,"end":30,"id":5},{"text":"Coordination","start":31,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"ITIL","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"Seeking SOC Analyst with 5+ years experience in Distributed Training and Network Policies.","spans":[{"start":8,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":73,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1613721710,"_task_hash":1879991166,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"SOC","start":8,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"with","start":20,"end":24,"id":3},{"text":"5","start":25,"end":26,"id":4},{"text":"+","start":26,"end":27,"id":5},{"text":"years","start":28,"end":33,"id":6},{"text":"experience","start":34,"end":44,"id":7},{"text":"in","start":45,"end":47,"id":8},{"text":"Distributed","start":48,"end":59,"id":9},{"text":"Training","start":60,"end":68,"id":10},{"text":"and","start":69,"end":72,"id":11},{"text":"Network","start":73,"end":80,"id":12},{"text":"Policies","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} {"text":"Expert in Security Awareness best practices.","spans":[{"start":10,"end":28,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":28,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-827039873,"_task_hash":-565508390,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"Awareness","start":19,"end":28,"id":3},{"text":"best","start":29,"end":33,"id":4},{"text":"practices","start":34,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"AI Policy Specialist with expertise in OWASP Top 10 compliance and Ethical Framework Development operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":2006460857,"_task_hash":1740363865,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Ethical","start":67,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":"Development","start":85,"end":96,"id":13},{"text":"operations","start":97,"end":107,"id":14},{"text":".","start":107,"end":108,"id":15}]} {"text":"Holds GDPR.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1954961026,"_task_hash":330250471,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GDPR","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Security Training Coordinator opportunity: Lead Cisco Security program, implement OWASP Top 10, manage Patch Management operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":48,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":94,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":103,"end":119,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":895470680,"_task_hash":54550487,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Training","start":9,"end":17,"id":1},{"text":"Coordinator","start":18,"end":29,"id":2},{"text":"opportunity","start":30,"end":41,"id":3},{"text":":","start":41,"end":42,"id":4},{"text":"Lead","start":43,"end":47,"id":5},{"text":"Cisco","start":48,"end":53,"id":6},{"text":"Security","start":54,"end":62,"id":7},{"text":"program","start":63,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"implement","start":72,"end":81,"id":10},{"text":"OWASP","start":82,"end":87,"id":11},{"text":"Top","start":88,"end":91,"id":12},{"text":"10","start":92,"end":94,"id":13},{"text":",","start":94,"end":95,"id":14},{"text":"manage","start":96,"end":102,"id":15},{"text":"Patch","start":103,"end":108,"id":16},{"text":"Management","start":109,"end":119,"id":17},{"text":"operations","start":120,"end":130,"id":18},{"text":".","start":130,"end":131,"id":19}]} {"text":"Senior Software Engineer experienced in detecting trojan attacks using QRadar.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":56,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1412905153,"_task_hash":1524679436,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Software","start":7,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"experienced","start":25,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"detecting","start":40,"end":49,"id":5},{"text":"trojan","start":50,"end":56,"id":6},{"text":"attacks","start":57,"end":64,"id":7},{"text":"using","start":65,"end":70,"id":8},{"text":"QRadar","start":71,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} {"text":"ML Security Architect with hands-on experience in QRadar, ELK Stack, and Security Hardening.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":73,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":149120343,"_task_hash":421203075,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"hands","start":27,"end":32,"id":4},{"text":"-","start":32,"end":33,"id":5},{"text":"on","start":33,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"QRadar","start":50,"end":56,"id":9},{"text":",","start":56,"end":57,"id":10},{"text":"ELK","start":58,"end":61,"id":11},{"text":"Stack","start":62,"end":67,"id":12},{"text":",","start":67,"end":68,"id":13},{"text":"and","start":69,"end":72,"id":14},{"text":"Security","start":73,"end":81,"id":15},{"text":"Hardening","start":82,"end":91,"id":16},{"text":".","start":91,"end":92,"id":17}]} {"text":"Holds AWS.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-502139060,"_task_hash":-1268847818,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"AWS","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Lead Security Director managing Product Strategy and Computer Vision initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1201132838,"_task_hash":2042293184,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Director","start":14,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"Product","start":32,"end":39,"id":4},{"text":"Strategy","start":40,"end":48,"id":5},{"text":"and","start":49,"end":52,"id":6},{"text":"Computer","start":53,"end":61,"id":7},{"text":"Vision","start":62,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} {"text":"Accomplished Server Administrator specializing in Cryptanalysis and Security Integration.","spans":[{"start":13,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-332751579,"_task_hash":-1001118927,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Server","start":13,"end":19,"id":1},{"text":"Administrator","start":20,"end":33,"id":2},{"text":"specializing","start":34,"end":46,"id":3},{"text":"in","start":47,"end":49,"id":4},{"text":"Cryptanalysis","start":50,"end":63,"id":5},{"text":"and","start":64,"end":67,"id":6},{"text":"Security","start":68,"end":76,"id":7},{"text":"Integration","start":77,"end":88,"id":8},{"text":".","start":88,"end":89,"id":9}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Holds AWS certification.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":277092091,"_task_hash":1025876926,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"AWS","start":6,"end":9,"id":1},{"text":"certification","start":10,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Exploited Heap Overflow vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-753153097,"_task_hash":315520752,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Heap","start":10,"end":14,"id":1},{"text":"Overflow","start":15,"end":23,"id":2},{"text":"vulnerability","start":24,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"web","start":41,"end":44,"id":5},{"text":"application","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"CCPA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1488203385,"_task_hash":-197078584,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"We need a ML Research Scientist skilled in SSRF prevention and phishing analysis using Metasploit.","spans":[{"start":10,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":43,"end":47,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":87,"end":97,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1766657166,"_task_hash":-1531337413,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Research","start":13,"end":21,"id":4},{"text":"Scientist","start":22,"end":31,"id":5},{"text":"skilled","start":32,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"SSRF","start":43,"end":47,"id":8},{"text":"prevention","start":48,"end":58,"id":9},{"text":"and","start":59,"end":62,"id":10},{"text":"phishing","start":63,"end":71,"id":11},{"text":"analysis","start":72,"end":80,"id":12},{"text":"using","start":81,"end":86,"id":13},{"text":"Metasploit","start":87,"end":97,"id":14},{"text":".","start":97,"end":98,"id":15}]} {"text":"Senior Technical Solutions Architect skilled in Ethics Training, AI Integration, and BYOD Security.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":65,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":98,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":924558406,"_task_hash":2112812468,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technical","start":7,"end":16,"id":1},{"text":"Solutions","start":17,"end":26,"id":2},{"text":"Architect","start":27,"end":36,"id":3},{"text":"skilled","start":37,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Ethics","start":48,"end":54,"id":6},{"text":"Training","start":55,"end":63,"id":7},{"text":",","start":63,"end":64,"id":8},{"text":"AI","start":65,"end":67,"id":9},{"text":"Integration","start":68,"end":79,"id":10},{"text":",","start":79,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"BYOD","start":85,"end":89,"id":13},{"text":"Security","start":90,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"SDET experienced in detecting adware attacks using QRadar.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":30,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1421940359,"_task_hash":-1250206968,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"experienced","start":5,"end":16,"id":1},{"text":"in","start":17,"end":19,"id":2},{"text":"detecting","start":20,"end":29,"id":3},{"text":"adware","start":30,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":"using","start":45,"end":50,"id":6},{"text":"QRadar","start":51,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Hiring Blue Team Analyst for Reporting and Supply Chain Attack detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":38,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":43,"end":62,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1881769981,"_task_hash":-787430505,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Blue","start":7,"end":11,"id":1},{"text":"Team","start":12,"end":16,"id":2},{"text":"Analyst","start":17,"end":24,"id":3},{"text":"for","start":25,"end":28,"id":4},{"text":"Reporting","start":29,"end":38,"id":5},{"text":"and","start":39,"end":42,"id":6},{"text":"Supply","start":43,"end":49,"id":7},{"text":"Chain","start":50,"end":55,"id":8},{"text":"Attack","start":56,"end":62,"id":9},{"text":"detection","start":63,"end":72,"id":10},{"text":".","start":72,"end":73,"id":11}]} {"text":"Required: GCP, Splunk, and OWASP Top 10 expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":27,"end":39,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1212500461,"_task_hash":417187242,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"GCP","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"Splunk","start":15,"end":21,"id":4},{"text":",","start":21,"end":22,"id":5},{"text":"and","start":23,"end":26,"id":6},{"text":"OWASP","start":27,"end":32,"id":7},{"text":"Top","start":33,"end":36,"id":8},{"text":"10","start":37,"end":39,"id":9},{"text":"expertise","start":40,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} {"text":"Accomplished Cyber Insurance Consultant specializing in Wireless Networks and Building Security.","spans":[{"start":13,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":78,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-2076684734,"_task_hash":1845015788,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cyber","start":13,"end":18,"id":1},{"text":"Insurance","start":19,"end":28,"id":2},{"text":"Consultant","start":29,"end":39,"id":3},{"text":"specializing","start":40,"end":52,"id":4},{"text":"in","start":53,"end":55,"id":5},{"text":"Wireless","start":56,"end":64,"id":6},{"text":"Networks","start":65,"end":73,"id":7},{"text":"and","start":74,"end":77,"id":8},{"text":"Building","start":78,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} {"text":"Required skills: EDR Tools, AI UX, ISO 22301 certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":33,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":35,"end":44,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1849496468,"_task_hash":-1653470392,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Tools","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"AI","start":28,"end":30,"id":6},{"text":"UX","start":31,"end":33,"id":7},{"text":",","start":33,"end":34,"id":8},{"text":"ISO","start":35,"end":38,"id":9},{"text":"22301","start":39,"end":44,"id":10},{"text":"certification","start":45,"end":58,"id":11},{"text":".","start":58,"end":59,"id":12}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Back\u2011End Developer opportunity: Lead Hardware Security Modules program, implement OWASP Top 10, manage Tailwind CSS operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7},{"start":82,"end":94,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":103,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1099260569,"_task_hash":-2033144983,"tokens":[{"text":"Back\u2011End","start":0,"end":8,"id":0},{"text":"Developer","start":9,"end":18,"id":1},{"text":"opportunity","start":19,"end":30,"id":2},{"text":":","start":30,"end":31,"id":3},{"text":"Lead","start":32,"end":36,"id":4},{"text":"Hardware","start":37,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Modules","start":55,"end":62,"id":7},{"text":"program","start":63,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"implement","start":72,"end":81,"id":10},{"text":"OWASP","start":82,"end":87,"id":11},{"text":"Top","start":88,"end":91,"id":12},{"text":"10","start":92,"end":94,"id":13},{"text":",","start":94,"end":95,"id":14},{"text":"manage","start":96,"end":102,"id":15},{"text":"Tailwind","start":103,"end":111,"id":16},{"text":"CSS","start":112,"end":115,"id":17},{"text":"operations","start":116,"end":126,"id":18},{"text":".","start":126,"end":127,"id":19}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"Cloud Architect with hands-on experience in Splunk, EDR Platforms, and Wireless Security.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":52,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":71,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":124512732,"_task_hash":-677473886,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Splunk","start":44,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"EDR","start":52,"end":55,"id":10},{"text":"Platforms","start":56,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Wireless","start":71,"end":79,"id":14},{"text":"Security","start":80,"end":88,"id":15},{"text":".","start":88,"end":89,"id":16}]} {"text":"Game Programmer opportunity: Lead API Security program, implement NIST Framework, manage Planning operations.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":34,"end":46,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":80,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":11},{"start":89,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-338702546,"_task_hash":-309390540,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Programmer","start":5,"end":15,"id":1},{"text":"opportunity","start":16,"end":27,"id":2},{"text":":","start":27,"end":28,"id":3},{"text":"Lead","start":29,"end":33,"id":4},{"text":"API","start":34,"end":37,"id":5},{"text":"Security","start":38,"end":46,"id":6},{"text":"program","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"implement","start":56,"end":65,"id":9},{"text":"NIST","start":66,"end":70,"id":10},{"text":"Framework","start":71,"end":80,"id":11},{"text":",","start":80,"end":81,"id":12},{"text":"manage","start":82,"end":88,"id":13},{"text":"Planning","start":89,"end":97,"id":14},{"text":"operations","start":98,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"Required skills: Nessus, VLAN Configuration, OSCP Certification certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":63,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-374245733,"_task_hash":-1442355147,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"VLAN","start":25,"end":29,"id":5},{"text":"Configuration","start":30,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"OSCP","start":45,"end":49,"id":8},{"text":"Certification","start":50,"end":63,"id":9},{"text":"certification","start":64,"end":77,"id":10},{"text":".","start":77,"end":78,"id":11}]} {"text":"Security Defense Analyst with expertise in OWASP Top 10 compliance and Phishing Ops operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":71,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":946099774,"_task_hash":-1889771119,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Analyst","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"OWASP","start":43,"end":48,"id":6},{"text":"Top","start":49,"end":52,"id":7},{"text":"10","start":53,"end":55,"id":8},{"text":"compliance","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"Phishing","start":71,"end":79,"id":11},{"text":"Ops","start":80,"end":83,"id":12},{"text":"operations","start":84,"end":94,"id":13},{"text":".","start":94,"end":95,"id":14}]} {"text":"Exploited Silver Ticket vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2068328618,"_task_hash":575568770,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Silver","start":10,"end":16,"id":1},{"text":"Ticket","start":17,"end":23,"id":2},{"text":"vulnerability","start":24,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"web","start":41,"end":44,"id":5},{"text":"application","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Immediate opening for User Experience Designer.","spans":[{"start":22,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":990773169,"_task_hash":-1303157688,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"User","start":22,"end":26,"id":3},{"text":"Experience","start":27,"end":37,"id":4},{"text":"Designer","start":38,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"DORA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1261348331,"_task_hash":-1599854490,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Senior Cloud Native Security Engineer position: 10 years minimum, expert in Content Management Systems, Ghidra, and Terraform Security.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":76,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15},{"start":104,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":17},{"start":116,"end":134,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-567450947,"_task_hash":858755741,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Native","start":13,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"position","start":38,"end":46,"id":5},{"text":":","start":46,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"minimum","start":57,"end":64,"id":9},{"text":",","start":64,"end":65,"id":10},{"text":"expert","start":66,"end":72,"id":11},{"text":"in","start":73,"end":75,"id":12},{"text":"Content","start":76,"end":83,"id":13},{"text":"Management","start":84,"end":94,"id":14},{"text":"Systems","start":95,"end":102,"id":15},{"text":",","start":102,"end":103,"id":16},{"text":"Ghidra","start":104,"end":110,"id":17},{"text":",","start":110,"end":111,"id":18},{"text":"and","start":112,"end":115,"id":19},{"text":"Terraform","start":116,"end":125,"id":20},{"text":"Security","start":126,"end":134,"id":21},{"text":".","start":134,"end":135,"id":22}]} {"text":"Holds TLS/SSL certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852002872,"_task_hash":-279170730,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} {"text":"Cryptographer with expertise in OWASP Top 10 compliance and React Native operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":4,"token_end":6},{"start":60,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":214367848,"_task_hash":591355039,"tokens":[{"text":"Cryptographer","start":0,"end":13,"id":0},{"text":"with","start":14,"end":18,"id":1},{"text":"expertise","start":19,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"OWASP","start":32,"end":37,"id":4},{"text":"Top","start":38,"end":41,"id":5},{"text":"10","start":42,"end":44,"id":6},{"text":"compliance","start":45,"end":55,"id":7},{"text":"and","start":56,"end":59,"id":8},{"text":"React","start":60,"end":65,"id":9},{"text":"Native","start":66,"end":72,"id":10},{"text":"operations","start":73,"end":83,"id":11},{"text":".","start":83,"end":84,"id":12}]} {"text":"Created YARA rules for Kerberoasting detection.","spans":[{"start":23,"end":36,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":927851940,"_task_hash":454006297,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Kerberoasting","start":23,"end":36,"id":4},{"text":"detection","start":37,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Lead Principal Engineer managing Malware Behavior Analysis and Design Systems initiatives.","spans":[{"start":5,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":33,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":63,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1843524718,"_task_hash":829923072,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Principal","start":5,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"managing","start":24,"end":32,"id":3},{"text":"Malware","start":33,"end":40,"id":4},{"text":"Behavior","start":41,"end":49,"id":5},{"text":"Analysis","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Design","start":63,"end":69,"id":8},{"text":"Systems","start":70,"end":77,"id":9},{"text":"initiatives","start":78,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"We need a Cryptographic Engineer skilled in CSRF prevention and spyware analysis using Metasploit.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":44,"end":48,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":64,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":87,"end":97,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-673593938,"_task_hash":-1050807372,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cryptographic","start":10,"end":23,"id":3},{"text":"Engineer","start":24,"end":32,"id":4},{"text":"skilled","start":33,"end":40,"id":5},{"text":"in","start":41,"end":43,"id":6},{"text":"CSRF","start":44,"end":48,"id":7},{"text":"prevention","start":49,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"spyware","start":64,"end":71,"id":10},{"text":"analysis","start":72,"end":80,"id":11},{"text":"using","start":81,"end":86,"id":12},{"text":"Metasploit","start":87,"end":97,"id":13},{"text":".","start":97,"end":98,"id":14}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"We need a Enterprise Cloud Architect skilled in Password Spraying prevention and ransomware analysis using Splunk.","spans":[{"start":10,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":48,"end":65,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":81,"end":91,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":107,"end":113,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":109211442,"_task_hash":131303894,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Enterprise","start":10,"end":20,"id":3},{"text":"Cloud","start":21,"end":26,"id":4},{"text":"Architect","start":27,"end":36,"id":5},{"text":"skilled","start":37,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Password","start":48,"end":56,"id":8},{"text":"Spraying","start":57,"end":65,"id":9},{"text":"prevention","start":66,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"ransomware","start":81,"end":91,"id":12},{"text":"analysis","start":92,"end":100,"id":13},{"text":"using","start":101,"end":106,"id":14},{"text":"Splunk","start":107,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} {"text":"Solutions Architect with hands-on experience in Wireshark, EDR Platforms, and Network Security.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":59,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":78,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1478419192,"_task_hash":1126203874,"tokens":[{"text":"Solutions","start":0,"end":9,"id":0},{"text":"Architect","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"hands","start":25,"end":30,"id":3},{"text":"-","start":30,"end":31,"id":4},{"text":"on","start":31,"end":33,"id":5},{"text":"experience","start":34,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Wireshark","start":48,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"EDR","start":59,"end":62,"id":10},{"text":"Platforms","start":63,"end":72,"id":11},{"text":",","start":72,"end":73,"id":12},{"text":"and","start":74,"end":77,"id":13},{"text":"Network","start":78,"end":85,"id":14},{"text":"Security","start":86,"end":94,"id":15},{"text":".","start":94,"end":95,"id":16}]} {"text":"Creative Content Strategist experienced in detecting trojan attacks using ELK Stack.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1503164354,"_task_hash":545052805,"tokens":[{"text":"Creative","start":0,"end":8,"id":0},{"text":"Content","start":9,"end":16,"id":1},{"text":"Strategist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"ELK","start":74,"end":77,"id":9},{"text":"Stack","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Content Creator role available: Software Development experience required, ML Pipeline Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":74,"end":94,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1255817297,"_task_hash":813009694,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Creator","start":8,"end":15,"id":1},{"text":"role","start":16,"end":20,"id":2},{"text":"available","start":21,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"Software","start":32,"end":40,"id":5},{"text":"Development","start":41,"end":52,"id":6},{"text":"experience","start":53,"end":63,"id":7},{"text":"required","start":64,"end":72,"id":8},{"text":",","start":72,"end":73,"id":9},{"text":"ML","start":74,"end":76,"id":10},{"text":"Pipeline","start":77,"end":85,"id":11},{"text":"Security","start":86,"end":94,"id":12},{"text":"knowledge","start":95,"end":104,"id":13},{"text":"essential","start":105,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} {"text":"Experienced SRE specializing in Mobile Security.","spans":[{"start":12,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":32,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":610486075,"_task_hash":-1392880327,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"SRE","start":12,"end":15,"id":1},{"text":"specializing","start":16,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"Mobile","start":32,"end":38,"id":4},{"text":"Security","start":39,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Documented DCSync attack chain for threat intel.","spans":[{"start":11,"end":17,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1273437089,"_task_hash":-2004995989,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"DCSync","start":11,"end":17,"id":1},{"text":"attack","start":18,"end":24,"id":2},{"text":"chain","start":25,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"threat","start":35,"end":41,"id":5},{"text":"intel","start":42,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Social Engineering Consultant with 5 years experience in Web Development, Social Media Content, and Physics.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13},{"start":100,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":707485597,"_task_hash":-136843440,"tokens":[{"text":"Social","start":0,"end":6,"id":0},{"text":"Engineering","start":7,"end":18,"id":1},{"text":"Consultant","start":19,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"5","start":35,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Web","start":57,"end":60,"id":8},{"text":"Development","start":61,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Social","start":74,"end":80,"id":11},{"text":"Media","start":81,"end":86,"id":12},{"text":"Content","start":87,"end":94,"id":13},{"text":",","start":94,"end":95,"id":14},{"text":"and","start":96,"end":99,"id":15},{"text":"Physics","start":100,"end":107,"id":16},{"text":".","start":107,"end":108,"id":17}]} {"text":"Specialized in Network Security for enterprise environments.","spans":[{"start":15,"end":31,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1894512282,"_task_hash":556629849,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Network","start":15,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"for","start":32,"end":35,"id":4},{"text":"enterprise","start":36,"end":46,"id":5},{"text":"environments","start":47,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Cryptographer opportunity: Lead Cybersecurity program, implement NIST Framework, manage Privacy-Preserving ML operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":4},{"start":65,"end":79,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9},{"start":88,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1590649648,"_task_hash":-155273656,"tokens":[{"text":"Cryptographer","start":0,"end":13,"id":0},{"text":"opportunity","start":14,"end":25,"id":1},{"text":":","start":25,"end":26,"id":2},{"text":"Lead","start":27,"end":31,"id":3},{"text":"Cybersecurity","start":32,"end":45,"id":4},{"text":"program","start":46,"end":53,"id":5},{"text":",","start":53,"end":54,"id":6},{"text":"implement","start":55,"end":64,"id":7},{"text":"NIST","start":65,"end":69,"id":8},{"text":"Framework","start":70,"end":79,"id":9},{"text":",","start":79,"end":80,"id":10},{"text":"manage","start":81,"end":87,"id":11},{"text":"Privacy","start":88,"end":95,"id":12},{"text":"-","start":95,"end":96,"id":13},{"text":"Preserving","start":96,"end":106,"id":14},{"text":"ML","start":107,"end":109,"id":15},{"text":"operations","start":110,"end":120,"id":16},{"text":".","start":120,"end":121,"id":17}]} {"text":"Developed SCADA Security strategy and roadmap.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-586916489,"_task_hash":-1026711092,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"SCADA","start":10,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"strategy","start":25,"end":33,"id":3},{"text":"and","start":34,"end":37,"id":4},{"text":"roadmap","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Information Technology Manager with 3+ years experience in Cloud Platforms, Data Leakage Prevention, and Forensic Analysis.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":59,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":76,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14},{"start":105,"end":122,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1223856374,"_task_hash":-1974933862,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Technology","start":12,"end":22,"id":1},{"text":"Manager","start":23,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"3","start":36,"end":37,"id":4},{"text":"+","start":37,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Cloud","start":59,"end":64,"id":9},{"text":"Platforms","start":65,"end":74,"id":10},{"text":",","start":74,"end":75,"id":11},{"text":"Data","start":76,"end":80,"id":12},{"text":"Leakage","start":81,"end":88,"id":13},{"text":"Prevention","start":89,"end":99,"id":14},{"text":",","start":99,"end":100,"id":15},{"text":"and","start":101,"end":104,"id":16},{"text":"Forensic","start":105,"end":113,"id":17},{"text":"Analysis","start":114,"end":122,"id":18},{"text":".","start":122,"end":123,"id":19}]} {"text":"QA Analyst with hands-on experience in Wireshark, EDR Platforms, and Security Design.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":48,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":50,"end":63,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":69,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1663414079,"_task_hash":1621655256,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Analyst","start":3,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"hands","start":16,"end":21,"id":3},{"text":"-","start":21,"end":22,"id":4},{"text":"on","start":22,"end":24,"id":5},{"text":"experience","start":25,"end":35,"id":6},{"text":"in","start":36,"end":38,"id":7},{"text":"Wireshark","start":39,"end":48,"id":8},{"text":",","start":48,"end":49,"id":9},{"text":"EDR","start":50,"end":53,"id":10},{"text":"Platforms","start":54,"end":63,"id":11},{"text":",","start":63,"end":64,"id":12},{"text":"and","start":65,"end":68,"id":13},{"text":"Security","start":69,"end":77,"id":14},{"text":"Design","start":78,"end":84,"id":15},{"text":".","start":84,"end":85,"id":16}]} {"text":"Implemented Vulnerability Management controls and monitoring.","spans":[{"start":12,"end":36,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1042066552,"_task_hash":-186891077,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Vulnerability","start":12,"end":25,"id":1},{"text":"Management","start":26,"end":36,"id":2},{"text":"controls","start":37,"end":45,"id":3},{"text":"and","start":46,"end":49,"id":4},{"text":"monitoring","start":50,"end":60,"id":5},{"text":".","start":60,"end":61,"id":6}]} {"text":"Experienced Web UI Developer specializing in Security Training.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-498650712,"_task_hash":672372812,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Web","start":12,"end":15,"id":1},{"text":"UI","start":16,"end":18,"id":2},{"text":"Developer","start":19,"end":28,"id":3},{"text":"specializing","start":29,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"Training","start":54,"end":62,"id":7},{"text":".","start":62,"end":63,"id":8}]} {"text":"Developed CFAA policies and procedures.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-510358891,"_task_hash":-1118312428,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"CFAA","start":10,"end":14,"id":1},{"text":"policies","start":15,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"procedures","start":28,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Assessed compliance with CIS Control 1.","spans":[{"start":25,"end":38,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1977317735,"_task_hash":1175254882,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"compliance","start":9,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"CIS","start":25,"end":28,"id":3},{"text":"Control","start":29,"end":36,"id":4},{"text":"1","start":37,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Looking for Head of Security to lead Security Scanning initiatives.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":37,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1741385330,"_task_hash":-2020125646,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Head","start":12,"end":16,"id":2},{"text":"of","start":17,"end":19,"id":3},{"text":"Security","start":20,"end":28,"id":4},{"text":"to","start":29,"end":31,"id":5},{"text":"lead","start":32,"end":36,"id":6},{"text":"Security","start":37,"end":45,"id":7},{"text":"Scanning","start":46,"end":54,"id":8},{"text":"initiatives","start":55,"end":66,"id":9},{"text":".","start":66,"end":67,"id":10}]} {"text":"Senior Malware Reverse Engineer skilled in Stakeholder Management, Model Versioning, and Security Culture.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":89,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1043238395,"_task_hash":-2060402775,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Malware","start":7,"end":14,"id":1},{"text":"Reverse","start":15,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Stakeholder","start":43,"end":54,"id":6},{"text":"Management","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Model","start":67,"end":72,"id":9},{"text":"Versioning","start":73,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"Culture","start":98,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} {"text":"Holds FTK.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1675032968,"_task_hash":-236821845,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"FTK","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Managed HIPAA certification process.","spans":[{"start":8,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1005616084,"_task_hash":-1785790914,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"HIPAA","start":8,"end":13,"id":1},{"text":"certification","start":14,"end":27,"id":2},{"text":"process","start":28,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Technical Support Analyst with hands-on experience in CrowdStrike, QRadar, and Cloud Access Security Broker.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":67,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1390465447,"_task_hash":-1532673348,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"hands","start":31,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"on","start":37,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"CrowdStrike","start":54,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"QRadar","start":67,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Cloud","start":79,"end":84,"id":14},{"text":"Access","start":85,"end":91,"id":15},{"text":"Security","start":92,"end":100,"id":16},{"text":"Broker","start":101,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} {"text":"Blue Team Lead with CySA+ certification, expert in Tenable.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":25,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":58,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-564228204,"_task_hash":-438265305,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Lead","start":10,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"CySA+","start":20,"end":25,"id":4},{"text":"certification","start":26,"end":39,"id":5},{"text":",","start":39,"end":40,"id":6},{"text":"expert","start":41,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"Tenable","start":51,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"Senior Cloud Security Engineer position: 5+ years minimum, expert in Compliance Auditing, Exploit Development, and Security Systems.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":90,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":115,"end":131,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-1847255905,"_task_hash":1871849454,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"position","start":31,"end":39,"id":4},{"text":":","start":39,"end":40,"id":5},{"text":"5","start":41,"end":42,"id":6},{"text":"+","start":42,"end":43,"id":7},{"text":"years","start":44,"end":49,"id":8},{"text":"minimum","start":50,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"expert","start":59,"end":65,"id":11},{"text":"in","start":66,"end":68,"id":12},{"text":"Compliance","start":69,"end":79,"id":13},{"text":"Auditing","start":80,"end":88,"id":14},{"text":",","start":88,"end":89,"id":15},{"text":"Exploit","start":90,"end":97,"id":16},{"text":"Development","start":98,"end":109,"id":17},{"text":",","start":109,"end":110,"id":18},{"text":"and","start":111,"end":114,"id":19},{"text":"Security","start":115,"end":123,"id":20},{"text":"Systems","start":124,"end":131,"id":21},{"text":".","start":131,"end":132,"id":22}]} {"text":"Lead Security Systems Consultant managing Manual Testing and Software Architecture initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-940573475,"_task_hash":-468058517,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Systems","start":14,"end":21,"id":2},{"text":"Consultant","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Manual","start":42,"end":48,"id":5},{"text":"Testing","start":49,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Software","start":61,"end":69,"id":8},{"text":"Architecture","start":70,"end":82,"id":9},{"text":"initiatives","start":83,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} {"text":"Malware Analyst professional with 7+ years implementing SIEM Operations and managing Communication Skills programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":85,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-930027024,"_task_hash":524109329,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Analyst","start":8,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"7","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"implementing","start":43,"end":55,"id":7},{"text":"SIEM","start":56,"end":60,"id":8},{"text":"Operations","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"managing","start":76,"end":84,"id":11},{"text":"Communication","start":85,"end":98,"id":12},{"text":"Skills","start":99,"end":105,"id":13},{"text":"programs","start":106,"end":114,"id":14},{"text":".","start":114,"end":115,"id":15}]} {"text":"Video Game Developer needed for enterprise security team.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":632897693,"_task_hash":-1327652147,"tokens":[{"text":"Video","start":0,"end":5,"id":0},{"text":"Game","start":6,"end":10,"id":1},{"text":"Developer","start":11,"end":20,"id":2},{"text":"needed","start":21,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"security","start":43,"end":51,"id":6},{"text":"team","start":52,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Developed policies aligned with ISO 27001 A.7.1.","spans":[{"start":32,"end":47,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6},{"start":32,"end":47,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-762628039,"_task_hash":2118847060,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"policies","start":10,"end":18,"id":1},{"text":"aligned","start":19,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"ISO","start":32,"end":35,"id":4},{"text":"27001","start":36,"end":41,"id":5},{"text":"A.7.1","start":42,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Required: BDD/TDD, Nessus, and NIST Framework expertise.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":19,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1528274654,"_task_hash":-12450306,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"BDD","start":10,"end":13,"id":2},{"text":"/","start":13,"end":14,"id":3},{"text":"TDD","start":14,"end":17,"id":4},{"text":",","start":17,"end":18,"id":5},{"text":"Nessus","start":19,"end":25,"id":6},{"text":",","start":25,"end":26,"id":7},{"text":"and","start":27,"end":30,"id":8},{"text":"NIST","start":31,"end":35,"id":9},{"text":"Framework","start":36,"end":45,"id":10},{"text":"expertise","start":46,"end":55,"id":11},{"text":".","start":55,"end":56,"id":12}]} {"text":"Crisis Manager experienced in detecting DDoS attacks using Splunk.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":40,"end":44,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":59,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-2132291168,"_task_hash":1257876680,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"experienced","start":15,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"detecting","start":30,"end":39,"id":4},{"text":"DDoS","start":40,"end":44,"id":5},{"text":"attacks","start":45,"end":52,"id":6},{"text":"using","start":53,"end":58,"id":7},{"text":"Splunk","start":59,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"Senior Cloud Security Engineer skilled in Mobile Debugging, Storytelling, and Container Security.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":60,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":78,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":996393072,"_task_hash":-1515208300,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Engineer","start":22,"end":30,"id":3},{"text":"skilled","start":31,"end":38,"id":4},{"text":"in","start":39,"end":41,"id":5},{"text":"Mobile","start":42,"end":48,"id":6},{"text":"Debugging","start":49,"end":58,"id":7},{"text":",","start":58,"end":59,"id":8},{"text":"Storytelling","start":60,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"Container","start":78,"end":87,"id":12},{"text":"Security","start":88,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"Holds TOGAF.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1596309033,"_task_hash":-980631001,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TOGAF","start":6,"end":11,"id":1},{"text":".","start":11,"end":12,"id":2}]} {"text":"Security Monitoring Analyst with 10+ years experience in ServiceNow, Docker, and Model Registry.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":69,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":81,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":301900167,"_task_hash":1753575390,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Monitoring","start":9,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10","start":33,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"experience","start":43,"end":53,"id":7},{"text":"in","start":54,"end":56,"id":8},{"text":"ServiceNow","start":57,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Docker","start":69,"end":75,"id":11},{"text":",","start":75,"end":76,"id":12},{"text":"and","start":77,"end":80,"id":13},{"text":"Model","start":81,"end":86,"id":14},{"text":"Registry","start":87,"end":95,"id":15},{"text":".","start":95,"end":96,"id":16}]} {"text":"CISO with CEH certification, expert in Check Point.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":39,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1014800982,"_task_hash":-1808535954,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"with","start":5,"end":9,"id":1},{"text":"CEH","start":10,"end":13,"id":2},{"text":"certification","start":14,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"expert","start":29,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"Check","start":39,"end":44,"id":7},{"text":"Point","start":45,"end":50,"id":8},{"text":".","start":50,"end":51,"id":9}]} {"text":"Senior Test Engineer position: 3 years minimum, expert in Enterprise Integration, Linux, and Container Registry Security.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":58,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":93,"end":120,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":443255896,"_task_hash":73175587,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"position","start":21,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"3","start":31,"end":32,"id":5},{"text":"years","start":33,"end":38,"id":6},{"text":"minimum","start":39,"end":46,"id":7},{"text":",","start":46,"end":47,"id":8},{"text":"expert","start":48,"end":54,"id":9},{"text":"in","start":55,"end":57,"id":10},{"text":"Enterprise","start":58,"end":68,"id":11},{"text":"Integration","start":69,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"Linux","start":82,"end":87,"id":14},{"text":",","start":87,"end":88,"id":15},{"text":"and","start":89,"end":92,"id":16},{"text":"Container","start":93,"end":102,"id":17},{"text":"Registry","start":103,"end":111,"id":18},{"text":"Security","start":112,"end":120,"id":19},{"text":".","start":120,"end":121,"id":20}]} {"text":"Vulnerability Manager with hands-on experience in Burp Suite, Nessus, and Security Scanning Tools.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":50,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":74,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":312533988,"_task_hash":1319107857,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Manager","start":14,"end":21,"id":1},{"text":"with","start":22,"end":26,"id":2},{"text":"hands","start":27,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"on","start":33,"end":35,"id":5},{"text":"experience","start":36,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Burp","start":50,"end":54,"id":8},{"text":"Suite","start":55,"end":60,"id":9},{"text":",","start":60,"end":61,"id":10},{"text":"Nessus","start":62,"end":68,"id":11},{"text":",","start":68,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Security","start":74,"end":82,"id":14},{"text":"Scanning","start":83,"end":91,"id":15},{"text":"Tools","start":92,"end":97,"id":16},{"text":".","start":97,"end":98,"id":17}]} {"text":"Required skills: Burp Suite, Ethics Training, ISO 31000 certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":55,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1832737523,"_task_hash":-1621820757,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Ethics","start":29,"end":35,"id":6},{"text":"Training","start":36,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"ISO","start":46,"end":49,"id":9},{"text":"31000","start":50,"end":55,"id":10},{"text":"certification","start":56,"end":69,"id":11},{"text":".","start":69,"end":70,"id":12}]} {"text":"Implemented controls per ISO 27001 A.7.1 requirements.","spans":[{"start":25,"end":40,"label":"CONTROL_ID","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":643537532,"_task_hash":-1107704732,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"per","start":21,"end":24,"id":2},{"text":"ISO","start":25,"end":28,"id":3},{"text":"27001","start":29,"end":34,"id":4},{"text":"A.7.1","start":35,"end":40,"id":5},{"text":"requirements","start":41,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Must know Burp Suite, Splunk, and NIST Framework.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":22,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1189599039,"_task_hash":-1264245562,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":",","start":20,"end":21,"id":4},{"text":"Splunk","start":22,"end":28,"id":5},{"text":",","start":28,"end":29,"id":6},{"text":"and","start":30,"end":33,"id":7},{"text":"NIST","start":34,"end":38,"id":8},{"text":"Framework","start":39,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} {"text":"Simulated Command Injection during red team exercise.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1321391991,"_task_hash":2043252008,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Command","start":10,"end":17,"id":1},{"text":"Injection","start":18,"end":27,"id":2},{"text":"during","start":28,"end":34,"id":3},{"text":"red","start":35,"end":38,"id":4},{"text":"team","start":39,"end":43,"id":5},{"text":"exercise","start":44,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Seeking Security Operations Lead with 10+ years experience in 24/7 Operations and M&A Due Diligence.","spans":[{"start":8,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":82,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":2129901966,"_task_hash":-1187802261,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Operations","start":17,"end":27,"id":2},{"text":"Lead","start":28,"end":32,"id":3},{"text":"with","start":33,"end":37,"id":4},{"text":"10","start":38,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"experience","start":48,"end":58,"id":8},{"text":"in","start":59,"end":61,"id":9},{"text":"24/7","start":62,"end":66,"id":10},{"text":"Operations","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"M&A","start":82,"end":85,"id":13},{"text":"Due","start":86,"end":89,"id":14},{"text":"Diligence","start":90,"end":99,"id":15},{"text":".","start":99,"end":100,"id":16}]} {"text":"As CISO, managed team of 50 security professionals.","spans":[{"start":3,"end":7,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-555544538,"_task_hash":1905199398,"tokens":[{"text":"As","start":0,"end":2,"id":0},{"text":"CISO","start":3,"end":7,"id":1},{"text":",","start":7,"end":8,"id":2},{"text":"managed","start":9,"end":16,"id":3},{"text":"team","start":17,"end":21,"id":4},{"text":"of","start":22,"end":24,"id":5},{"text":"50","start":25,"end":27,"id":6},{"text":"security","start":28,"end":36,"id":7},{"text":"professionals","start":37,"end":50,"id":8},{"text":".","start":50,"end":51,"id":9}]} {"text":"Join our team as Copywriter!","spans":[{"start":17,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":264160960,"_task_hash":661764470,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Copywriter","start":17,"end":27,"id":4},{"text":"!","start":27,"end":28,"id":5}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Holds TLS/SSL.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":236213916,"_task_hash":2109383549,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"TLS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"SSL","start":10,"end":13,"id":3},{"text":".","start":13,"end":14,"id":4}]} {"text":"C++ certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1368894265,"_task_hash":-882486146,"tokens":[{"text":"C++","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"GCP certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1241195216,"_task_hash":1934077859,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Game Developer professional with 3++ years implementing CrowdStrike and managing Programming programs.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":81,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1475417628,"_task_hash":1553658101,"tokens":[{"text":"Game","start":0,"end":4,"id":0},{"text":"Developer","start":5,"end":14,"id":1},{"text":"professional","start":15,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"3++","start":33,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"implementing","start":43,"end":55,"id":6},{"text":"CrowdStrike","start":56,"end":67,"id":7},{"text":"and","start":68,"end":71,"id":8},{"text":"managing","start":72,"end":80,"id":9},{"text":"Programming","start":81,"end":92,"id":10},{"text":"programs","start":93,"end":101,"id":11},{"text":".","start":101,"end":102,"id":12}]} {"text":"Deployed OIDC across 500+ endpoints.","spans":[{"start":9,"end":13,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-722001572,"_task_hash":-1231517191,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"OIDC","start":9,"end":13,"id":1},{"text":"across","start":14,"end":20,"id":2},{"text":"500","start":21,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"endpoints","start":26,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Must know EDR Platforms, SIEM Operations, and NIST Framework.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":25,"end":40,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":46,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":198006119,"_task_hash":-1880986137,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"SIEM","start":25,"end":29,"id":5},{"text":"Operations","start":30,"end":40,"id":6},{"text":",","start":40,"end":41,"id":7},{"text":"and","start":42,"end":45,"id":8},{"text":"NIST","start":46,"end":50,"id":9},{"text":"Framework","start":51,"end":60,"id":10},{"text":".","start":60,"end":61,"id":11}]} {"text":"Implemented LDAP solution for enterprise security monitoring.","spans":[{"start":12,"end":16,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1276394715,"_task_hash":2014085818,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"LDAP","start":12,"end":16,"id":1},{"text":"solution","start":17,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"monitoring","start":50,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"COPPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-467222272,"_task_hash":59755085,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Back End Engineer with expertise in OWASP Top 10 compliance and Content Creation operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-239256630,"_task_hash":909559927,"tokens":[{"text":"Back","start":0,"end":4,"id":0},{"text":"End","start":5,"end":8,"id":1},{"text":"Engineer","start":9,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"OWASP","start":36,"end":41,"id":6},{"text":"Top","start":42,"end":45,"id":7},{"text":"10","start":46,"end":48,"id":8},{"text":"compliance","start":49,"end":59,"id":9},{"text":"and","start":60,"end":63,"id":10},{"text":"Content","start":64,"end":71,"id":11},{"text":"Creation","start":72,"end":80,"id":12},{"text":"operations","start":81,"end":91,"id":13},{"text":".","start":91,"end":92,"id":14}]} {"text":"Tested WAF rules against DLL Injection payloads.","spans":[{"start":25,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1725416015,"_task_hash":833120116,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"DLL","start":25,"end":28,"id":4},{"text":"Injection","start":29,"end":38,"id":5},{"text":"payloads","start":39,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Required skills: SIEM, Industrial Control Systems, TOGAF certification.","spans":[{"start":17,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":23,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":51,"end":56,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":746468005,"_task_hash":275459316,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":",","start":21,"end":22,"id":4},{"text":"Industrial","start":23,"end":33,"id":5},{"text":"Control","start":34,"end":41,"id":6},{"text":"Systems","start":42,"end":49,"id":7},{"text":",","start":49,"end":50,"id":8},{"text":"TOGAF","start":51,"end":56,"id":9},{"text":"certification","start":57,"end":70,"id":10},{"text":".","start":70,"end":71,"id":11}]} {"text":"Proficient in SIEM and SIEM Operations.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-537283209,"_task_hash":1088837397,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"SIEM","start":23,"end":27,"id":4},{"text":"Operations","start":28,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Join our team as Container Security Engineer!","spans":[{"start":17,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":455996107,"_task_hash":-570795513,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Container","start":17,"end":26,"id":4},{"text":"Security","start":27,"end":35,"id":5},{"text":"Engineer","start":36,"end":44,"id":6},{"text":"!","start":44,"end":45,"id":7}]} {"text":"ISO 31000 certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":697581698,"_task_hash":1262468209,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"31000","start":4,"end":9,"id":1},{"text":"certified","start":10,"end":19,"id":2},{"text":".","start":19,"end":20,"id":3}]} {"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Experienced Senior Software Engineer specializing in Network Security Architecture.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":161401642,"_task_hash":-1014867465,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Senior","start":12,"end":18,"id":1},{"text":"Software","start":19,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Network","start":53,"end":60,"id":6},{"text":"Security","start":61,"end":69,"id":7},{"text":"Architecture","start":70,"end":82,"id":8},{"text":".","start":82,"end":83,"id":9}]} {"text":"Connected Device Security Specialist with 7 years experience in Database Management, Technology Strategy, and Graphics.","spans":[{"start":0,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":64,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":110,"end":118,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-829634768,"_task_hash":1021445924,"tokens":[{"text":"Connected","start":0,"end":9,"id":0},{"text":"Device","start":10,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"7","start":42,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Database","start":64,"end":72,"id":9},{"text":"Management","start":73,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"Technology","start":85,"end":95,"id":12},{"text":"Strategy","start":96,"end":104,"id":13},{"text":",","start":104,"end":105,"id":14},{"text":"and","start":106,"end":109,"id":15},{"text":"Graphics","start":110,"end":118,"id":16},{"text":".","start":118,"end":119,"id":17}]} {"text":"We need a Robotics Engineer skilled in Session Hijacking prevention and Supply Chain Attack analysis using EDR Platforms.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":39,"end":56,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":72,"end":91,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":13},{"start":107,"end":120,"label":"SECURITY_TOOL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-552652047,"_task_hash":-52040491,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Robotics","start":10,"end":18,"id":3},{"text":"Engineer","start":19,"end":27,"id":4},{"text":"skilled","start":28,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"Session","start":39,"end":46,"id":7},{"text":"Hijacking","start":47,"end":56,"id":8},{"text":"prevention","start":57,"end":67,"id":9},{"text":"and","start":68,"end":71,"id":10},{"text":"Supply","start":72,"end":78,"id":11},{"text":"Chain","start":79,"end":84,"id":12},{"text":"Attack","start":85,"end":91,"id":13},{"text":"analysis","start":92,"end":100,"id":14},{"text":"using","start":101,"end":106,"id":15},{"text":"EDR","start":107,"end":110,"id":16},{"text":"Platforms","start":111,"end":120,"id":17},{"text":".","start":120,"end":121,"id":18}]} {"text":"Ensured compliance with CCPA requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-339826464,"_task_hash":936591986,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CCPA","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Proficient in EDR Tools and Burp Suite.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-187640961,"_task_hash":323284169,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Tools","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"Burp","start":28,"end":32,"id":5},{"text":"Suite","start":33,"end":38,"id":6},{"text":".","start":38,"end":39,"id":7}]} {"text":"Immediate opening for Container Security Engineer.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-631161827,"_task_hash":134187722,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Container","start":22,"end":31,"id":3},{"text":"Security","start":32,"end":40,"id":4},{"text":"Engineer","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Responded to hacktivist incident affecting 1000+ users.","spans":[{"start":13,"end":23,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1064786734,"_task_hash":2044314946,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"hacktivist","start":13,"end":23,"id":2},{"text":"incident","start":24,"end":32,"id":3},{"text":"affecting","start":33,"end":42,"id":4},{"text":"1000","start":43,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"users","start":49,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Senior Software Engineer experienced in detecting DDoS attacks using Burp Suite.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-856854254,"_task_hash":1493519187,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Software","start":7,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"experienced","start":25,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"detecting","start":40,"end":49,"id":5},{"text":"DDoS","start":50,"end":54,"id":6},{"text":"attacks","start":55,"end":62,"id":7},{"text":"using","start":63,"end":68,"id":8},{"text":"Burp","start":69,"end":73,"id":9},{"text":"Suite","start":74,"end":79,"id":10},{"text":".","start":79,"end":80,"id":11}]} {"text":"Cybersecurity Risk Analyst opportunity: Lead Building Security program, implement NIST Framework, manage Query Optimization operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":96,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":105,"end":123,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":532799992,"_task_hash":-1848122944,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Risk","start":14,"end":18,"id":1},{"text":"Analyst","start":19,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Building","start":45,"end":53,"id":6},{"text":"Security","start":54,"end":62,"id":7},{"text":"program","start":63,"end":70,"id":8},{"text":",","start":70,"end":71,"id":9},{"text":"implement","start":72,"end":81,"id":10},{"text":"NIST","start":82,"end":86,"id":11},{"text":"Framework","start":87,"end":96,"id":12},{"text":",","start":96,"end":97,"id":13},{"text":"manage","start":98,"end":104,"id":14},{"text":"Query","start":105,"end":110,"id":15},{"text":"Optimization","start":111,"end":123,"id":16},{"text":"operations","start":124,"end":134,"id":17},{"text":".","start":134,"end":135,"id":18}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Looking for Research Analyst to lead Perimeter Security initiatives.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":37,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1451353143,"_task_hash":-441848072,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Research","start":12,"end":20,"id":2},{"text":"Analyst","start":21,"end":28,"id":3},{"text":"to","start":29,"end":31,"id":4},{"text":"lead","start":32,"end":36,"id":5},{"text":"Perimeter","start":37,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"initiatives","start":56,"end":67,"id":8},{"text":".","start":67,"end":68,"id":9}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Security DevOps Engineer professional with 3++ years implementing SIEM Operations and managing VLAN Configuration programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":66,"end":81,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":95,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1304888652,"_task_hash":332641392,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"DevOps","start":9,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"professional","start":25,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"3++","start":43,"end":46,"id":5},{"text":"years","start":47,"end":52,"id":6},{"text":"implementing","start":53,"end":65,"id":7},{"text":"SIEM","start":66,"end":70,"id":8},{"text":"Operations","start":71,"end":81,"id":9},{"text":"and","start":82,"end":85,"id":10},{"text":"managing","start":86,"end":94,"id":11},{"text":"VLAN","start":95,"end":99,"id":12},{"text":"Configuration","start":100,"end":113,"id":13},{"text":"programs","start":114,"end":122,"id":14},{"text":".","start":122,"end":123,"id":15}]} {"text":"Certified SLAM working as Infrastructure Security Engineer, focused on MQTT Security and Buffer Overflow prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":71,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":89,"end":104,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-222279151,"_task_hash":-398945424,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SLAM","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Infrastructure","start":26,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":"Engineer","start":50,"end":58,"id":6},{"text":",","start":58,"end":59,"id":7},{"text":"focused","start":60,"end":67,"id":8},{"text":"on","start":68,"end":70,"id":9},{"text":"MQTT","start":71,"end":75,"id":10},{"text":"Security","start":76,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Buffer","start":89,"end":95,"id":13},{"text":"Overflow","start":96,"end":104,"id":14},{"text":"prevention","start":105,"end":115,"id":15},{"text":".","start":115,"end":116,"id":16}]} {"text":"Certified TOGAF working as Network Engineer, focused on Security Standards and Privilege Escalation prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":56,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":99,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1906676319,"_task_hash":-1494121493,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TOGAF","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Network","start":27,"end":34,"id":4},{"text":"Engineer","start":35,"end":43,"id":5},{"text":",","start":43,"end":44,"id":6},{"text":"focused","start":45,"end":52,"id":7},{"text":"on","start":53,"end":55,"id":8},{"text":"Security","start":56,"end":64,"id":9},{"text":"Standards","start":65,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"Privilege","start":79,"end":88,"id":12},{"text":"Escalation","start":89,"end":99,"id":13},{"text":"prevention","start":100,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} {"text":"Cloud Security Engineer with OSEP certification, expert in Burp Suite.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":29,"end":33,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1218543478,"_task_hash":-1675266353,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"OSEP","start":29,"end":33,"id":4},{"text":"certification","start":34,"end":47,"id":5},{"text":",","start":47,"end":48,"id":6},{"text":"expert","start":49,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Burp","start":59,"end":63,"id":9},{"text":"Suite","start":64,"end":69,"id":10},{"text":".","start":69,"end":70,"id":11}]} {"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"PMP Certification certification a plus.","spans":[{"start":0,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1450494660,"_task_hash":-506043020,"tokens":[{"text":"PMP","start":0,"end":3,"id":0},{"text":"Certification","start":4,"end":17,"id":1},{"text":"certification","start":18,"end":31,"id":2},{"text":"a","start":32,"end":33,"id":3},{"text":"plus","start":34,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Mitigated Lateral Movement through code remediation.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2009162778,"_task_hash":850843145,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Lateral","start":10,"end":17,"id":1},{"text":"Movement","start":18,"end":26,"id":2},{"text":"through","start":27,"end":34,"id":3},{"text":"code","start":35,"end":39,"id":4},{"text":"remediation","start":40,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Holds GDPR.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1954961026,"_task_hash":330250471,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GDPR","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Remediated FISMA audit findings.","spans":[{"start":11,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1950177316,"_task_hash":-1995225686,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"FISMA","start":11,"end":16,"id":1},{"text":"audit","start":17,"end":22,"id":2},{"text":"findings","start":23,"end":31,"id":3},{"text":".","start":31,"end":32,"id":4}]} {"text":"Developed Application Security strategy and roadmap.","spans":[{"start":10,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1802109985,"_task_hash":-887871542,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Application","start":10,"end":21,"id":1},{"text":"Security","start":22,"end":30,"id":2},{"text":"strategy","start":31,"end":39,"id":3},{"text":"and","start":40,"end":43,"id":4},{"text":"roadmap","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"The CISO reported directly to the CEO.","spans":[{"start":4,"end":8,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1336580063,"_task_hash":2122935,"tokens":[{"text":"The","start":0,"end":3,"id":0},{"text":"CISO","start":4,"end":8,"id":1},{"text":"reported","start":9,"end":17,"id":2},{"text":"directly","start":18,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"the","start":30,"end":33,"id":5},{"text":"CEO","start":34,"end":37,"id":6},{"text":".","start":37,"end":38,"id":7}]} {"text":"Exploited CSRF vulnerability in web application.","spans":[{"start":10,"end":14,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":201168308,"_task_hash":1565980603,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"CSRF","start":10,"end":14,"id":1},{"text":"vulnerability","start":15,"end":28,"id":2},{"text":"in","start":29,"end":31,"id":3},{"text":"web","start":32,"end":35,"id":4},{"text":"application","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Must know CrowdStrike, Splunk, and OWASP Top 10.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1050887992,"_task_hash":-160565399,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"OWASP","start":35,"end":40,"id":7},{"text":"Top","start":41,"end":44,"id":8},{"text":"10","start":45,"end":47,"id":9},{"text":".","start":47,"end":48,"id":10}]} {"text":"Holds RBAC certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-346948393,"_task_hash":2103080658,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Experienced Cryptographic Engineer specializing in Application Security.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-127729583,"_task_hash":1875520196,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cryptographic","start":12,"end":25,"id":1},{"text":"Engineer","start":26,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Application","start":51,"end":62,"id":5},{"text":"Security","start":63,"end":71,"id":6},{"text":".","start":71,"end":72,"id":7}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Automated PCI DSS 3.4 compliance monitoring.","spans":[{"start":10,"end":21,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1180752157,"_task_hash":1814267323,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"PCI","start":10,"end":13,"id":1},{"text":"DSS","start":14,"end":17,"id":2},{"text":"3.4","start":18,"end":21,"id":3},{"text":"compliance","start":22,"end":32,"id":4},{"text":"monitoring","start":33,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} {"text":"Application Security Specialist professional with 3+ years implementing Nessus and managing VMware programs.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-956613448,"_task_hash":-1509592086,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Specialist","start":21,"end":31,"id":2},{"text":"professional","start":32,"end":44,"id":3},{"text":"with","start":45,"end":49,"id":4},{"text":"3","start":50,"end":51,"id":5},{"text":"+","start":51,"end":52,"id":6},{"text":"years","start":53,"end":58,"id":7},{"text":"implementing","start":59,"end":71,"id":8},{"text":"Nessus","start":72,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"VMware","start":92,"end":98,"id":12},{"text":"programs","start":99,"end":107,"id":13},{"text":".","start":107,"end":108,"id":14}]} {"text":"Experienced Security Education Specialist specializing in Database Security.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":75,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":300349340,"_task_hash":1275245208,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Education","start":21,"end":30,"id":2},{"text":"Specialist","start":31,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"Database","start":58,"end":66,"id":6},{"text":"Security","start":67,"end":75,"id":7},{"text":".","start":75,"end":76,"id":8}]} {"text":"Must have Splunk experience and NIST Framework knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":776830533,"_task_hash":-2017004742,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"knowledge","start":47,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Hiring Software Security Engineer for Enterprise Architecture and rootkit detection.","spans":[{"start":7,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":73,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1530074748,"_task_hash":1225132658,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Software","start":7,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"for","start":34,"end":37,"id":4},{"text":"Enterprise","start":38,"end":48,"id":5},{"text":"Architecture","start":49,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"rootkit","start":66,"end":73,"id":8},{"text":"detection","start":74,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} {"text":"Program Manager role available: Budgeting experience required, Cisco Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":63,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":229032977,"_task_hash":-361860718,"tokens":[{"text":"Program","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"role","start":16,"end":20,"id":2},{"text":"available","start":21,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"Budgeting","start":32,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"required","start":53,"end":61,"id":7},{"text":",","start":61,"end":62,"id":8},{"text":"Cisco","start":63,"end":68,"id":9},{"text":"Security","start":69,"end":77,"id":10},{"text":"knowledge","start":78,"end":87,"id":11},{"text":"essential","start":88,"end":97,"id":12},{"text":".","start":97,"end":98,"id":13}]} {"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} {"text":"Governance Risk Compliance Specialist with 5+ years experience in Investigations, Microsoft Defender, and Cloud Hardening.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":66,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":82,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":106,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1759893546,"_task_hash":-2095591746,"tokens":[{"text":"Governance","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Compliance","start":16,"end":26,"id":2},{"text":"Specialist","start":27,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"5","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"in","start":63,"end":65,"id":9},{"text":"Investigations","start":66,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"Microsoft","start":82,"end":91,"id":12},{"text":"Defender","start":92,"end":100,"id":13},{"text":",","start":100,"end":101,"id":14},{"text":"and","start":102,"end":105,"id":15},{"text":"Cloud","start":106,"end":111,"id":16},{"text":"Hardening","start":112,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Application Security Engineer with OSWE certification, expert in Palo Alto.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":39,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":65,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-540086081,"_task_hash":1757051816,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"OSWE","start":35,"end":39,"id":4},{"text":"certification","start":40,"end":53,"id":5},{"text":",","start":53,"end":54,"id":6},{"text":"expert","start":55,"end":61,"id":7},{"text":"in","start":62,"end":64,"id":8},{"text":"Palo","start":65,"end":69,"id":9},{"text":"Alto","start":70,"end":74,"id":10},{"text":".","start":74,"end":75,"id":11}]} {"text":"Hiring Security Operations Analyst for System Maintenance and Man-in-the-Middle detection.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":79,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":652442928,"_task_hash":-878924852,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Operations","start":16,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"System","start":39,"end":45,"id":5},{"text":"Maintenance","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Man","start":62,"end":65,"id":8},{"text":"-","start":65,"end":66,"id":9},{"text":"in","start":66,"end":68,"id":10},{"text":"-","start":68,"end":69,"id":11},{"text":"the","start":69,"end":72,"id":12},{"text":"-","start":72,"end":73,"id":13},{"text":"Middle","start":73,"end":79,"id":14},{"text":"detection","start":80,"end":89,"id":15},{"text":".","start":89,"end":90,"id":16}]} {"text":"Briefed executives on nation-state actor risks.","spans":[{"start":22,"end":40,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1875004175,"_task_hash":-1534117152,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"nation","start":22,"end":28,"id":3},{"text":"-","start":28,"end":29,"id":4},{"text":"state","start":29,"end":34,"id":5},{"text":"actor","start":35,"end":40,"id":6},{"text":"risks","start":41,"end":46,"id":7},{"text":".","start":46,"end":47,"id":8}]} {"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Deployed DLP across 500+ endpoints.","spans":[{"start":9,"end":12,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":798574687,"_task_hash":1108297204,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"DLP","start":9,"end":12,"id":1},{"text":"across","start":13,"end":19,"id":2},{"text":"500","start":20,"end":23,"id":3},{"text":"+","start":23,"end":24,"id":4},{"text":"endpoints","start":25,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"Security Operations Manager with hands-on experience in EDR Platforms, EDR Tools, and Cloud Security Testing.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":108,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1598024350,"_task_hash":-1328811834,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"hands","start":33,"end":38,"id":4},{"text":"-","start":38,"end":39,"id":5},{"text":"on","start":39,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"EDR","start":56,"end":59,"id":9},{"text":"Platforms","start":60,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"EDR","start":71,"end":74,"id":12},{"text":"Tools","start":75,"end":80,"id":13},{"text":",","start":80,"end":81,"id":14},{"text":"and","start":82,"end":85,"id":15},{"text":"Cloud","start":86,"end":91,"id":16},{"text":"Security","start":92,"end":100,"id":17},{"text":"Testing","start":101,"end":108,"id":18},{"text":".","start":108,"end":109,"id":19}]} {"text":"Holds ITIL certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1287995443,"_task_hash":1138090145,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ITIL","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Major Incident Manager professional with 5+ years implementing Wireshark and managing Third-Party Risk programs.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":86,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1061602331,"_task_hash":-1066062002,"tokens":[{"text":"Major","start":0,"end":5,"id":0},{"text":"Incident","start":6,"end":14,"id":1},{"text":"Manager","start":15,"end":22,"id":2},{"text":"professional","start":23,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"5","start":41,"end":42,"id":5},{"text":"+","start":42,"end":43,"id":6},{"text":"years","start":44,"end":49,"id":7},{"text":"implementing","start":50,"end":62,"id":8},{"text":"Wireshark","start":63,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"managing","start":77,"end":85,"id":11},{"text":"Third","start":86,"end":91,"id":12},{"text":"-","start":91,"end":92,"id":13},{"text":"Party","start":92,"end":97,"id":14},{"text":"Risk","start":98,"end":102,"id":15},{"text":"programs","start":103,"end":111,"id":16},{"text":".","start":111,"end":112,"id":17}]} {"text":"Certified CCPA working as Cloud Security Engineer, focused on Security Awareness Platforms and Clickjacking prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":62,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":107,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1631922692,"_task_hash":-165811681,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"CCPA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Cloud","start":26,"end":31,"id":4},{"text":"Security","start":32,"end":40,"id":5},{"text":"Engineer","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"focused","start":51,"end":58,"id":8},{"text":"on","start":59,"end":61,"id":9},{"text":"Security","start":62,"end":70,"id":10},{"text":"Awareness","start":71,"end":80,"id":11},{"text":"Platforms","start":81,"end":90,"id":12},{"text":"and","start":91,"end":94,"id":13},{"text":"Clickjacking","start":95,"end":107,"id":14},{"text":"prevention","start":108,"end":118,"id":15},{"text":".","start":118,"end":119,"id":16}]} {"text":"Briefed executives on insider threat risks.","spans":[{"start":22,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1463282965,"_task_hash":1200017822,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"insider","start":22,"end":29,"id":3},{"text":"threat","start":30,"end":36,"id":4},{"text":"risks","start":37,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"SQL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":206140740,"_task_hash":-284236833,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Must have CrowdStrike experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1576336426,"_task_hash":1887255783,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"OWASP","start":37,"end":42,"id":5},{"text":"Top","start":43,"end":46,"id":6},{"text":"10","start":47,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Required skills: Metasploit, Switching, SAML certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":29,"end":38,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":40,"end":44,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1297231649,"_task_hash":381405729,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Metasploit","start":17,"end":27,"id":3},{"text":",","start":27,"end":28,"id":4},{"text":"Switching","start":29,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"SAML","start":40,"end":44,"id":7},{"text":"certification","start":45,"end":58,"id":8},{"text":".","start":58,"end":59,"id":9}]} {"text":"Detected DLL Injection attack in production environment.","spans":[{"start":9,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1900208444,"_task_hash":1958361782,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"DLL","start":9,"end":12,"id":1},{"text":"Injection","start":13,"end":22,"id":2},{"text":"attack","start":23,"end":29,"id":3},{"text":"in","start":30,"end":32,"id":4},{"text":"production","start":33,"end":43,"id":5},{"text":"environment","start":44,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Expert in DLP configuration and tuning.","spans":[{"start":10,"end":13,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1903331844,"_task_hash":284286378,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DLP","start":10,"end":13,"id":2},{"text":"configuration","start":14,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"tuning","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Certified AWS working as Firmware Engineer, focused on Security Assessment and CSRF prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":83,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":2143946712,"_task_hash":-1174653072,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"AWS","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Firmware","start":25,"end":33,"id":4},{"text":"Engineer","start":34,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Assessment","start":64,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"CSRF","start":79,"end":83,"id":12},{"text":"prevention","start":84,"end":94,"id":13},{"text":".","start":94,"end":95,"id":14}]} {"text":"Responsible for JWT operations and maintenance.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1300339827,"_task_hash":1820758039,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"JWT","start":16,"end":19,"id":2},{"text":"operations","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"maintenance","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"HTML/CSS certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-2132013890,"_task_hash":690673964,"tokens":[{"text":"HTML","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"CSS","start":5,"end":8,"id":2},{"text":"certification","start":9,"end":22,"id":3},{"text":"a","start":23,"end":24,"id":4},{"text":"plus","start":25,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} {"text":"Experienced Security Cryptographer specializing in Security Patterns.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-324100240,"_task_hash":1492489416,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Cryptographer","start":21,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Security","start":51,"end":59,"id":5},{"text":"Patterns","start":60,"end":68,"id":6},{"text":".","start":68,"end":69,"id":7}]} {"text":"Accomplished VP Information Security specializing in Test Data Management and Supply Chain Security.","spans":[{"start":13,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":78,"end":99,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1789339786,"_task_hash":-590186149,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"VP","start":13,"end":15,"id":1},{"text":"Information","start":16,"end":27,"id":2},{"text":"Security","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Test","start":53,"end":57,"id":6},{"text":"Data","start":58,"end":62,"id":7},{"text":"Management","start":63,"end":73,"id":8},{"text":"and","start":74,"end":77,"id":9},{"text":"Supply","start":78,"end":84,"id":10},{"text":"Chain","start":85,"end":90,"id":11},{"text":"Security","start":91,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Briefed executives on cryptominer risks.","spans":[{"start":22,"end":33,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1467255707,"_task_hash":-233541981,"tokens":[{"text":"Briefed","start":0,"end":7,"id":0},{"text":"executives","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"cryptominer","start":22,"end":33,"id":3},{"text":"risks","start":34,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Cyber Insurance Analyst with 5 years experience in Subnetting, Insider Threat Programs, and C#.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":92,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-832247760,"_task_hash":700387994,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Insurance","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"5","start":29,"end":30,"id":4},{"text":"years","start":31,"end":36,"id":5},{"text":"experience","start":37,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"Subnetting","start":51,"end":61,"id":8},{"text":",","start":61,"end":62,"id":9},{"text":"Insider","start":63,"end":70,"id":10},{"text":"Threat","start":71,"end":77,"id":11},{"text":"Programs","start":78,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"and","start":88,"end":91,"id":14},{"text":"C","start":92,"end":93,"id":15},{"text":"#","start":93,"end":94,"id":16},{"text":".","start":94,"end":95,"id":17}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Join our team as Application Architect!","spans":[{"start":17,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":759554918,"_task_hash":-1342043976,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Application","start":17,"end":28,"id":4},{"text":"Architect","start":29,"end":38,"id":5},{"text":"!","start":38,"end":39,"id":6}]} {"text":"Certified STIX/TAXII working as IT Project Manager, focused on Cloud Native Security and Credential Stuffing prevention.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":32,"end":50,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":8},{"start":63,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14},{"start":89,"end":108,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1236509966,"_task_hash":-1755162737,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"STIX","start":10,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"TAXII","start":15,"end":20,"id":3},{"text":"working","start":21,"end":28,"id":4},{"text":"as","start":29,"end":31,"id":5},{"text":"IT","start":32,"end":34,"id":6},{"text":"Project","start":35,"end":42,"id":7},{"text":"Manager","start":43,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"focused","start":52,"end":59,"id":10},{"text":"on","start":60,"end":62,"id":11},{"text":"Cloud","start":63,"end":68,"id":12},{"text":"Native","start":69,"end":75,"id":13},{"text":"Security","start":76,"end":84,"id":14},{"text":"and","start":85,"end":88,"id":15},{"text":"Credential","start":89,"end":99,"id":16},{"text":"Stuffing","start":100,"end":108,"id":17},{"text":"prevention","start":109,"end":119,"id":18},{"text":".","start":119,"end":120,"id":19}]} {"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Must have EDR Tools experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":341881145,"_task_hash":-941982494,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"NIST","start":35,"end":39,"id":6},{"text":"Framework","start":40,"end":49,"id":7},{"text":"knowledge","start":50,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Remediated GLBA audit findings.","spans":[{"start":11,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1674413088,"_task_hash":-1306275963,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"GLBA","start":11,"end":15,"id":1},{"text":"audit","start":16,"end":21,"id":2},{"text":"findings","start":22,"end":30,"id":3},{"text":".","start":30,"end":31,"id":4}]} {"text":"Chief Privacy Officer with expertise in OWASP Top 10 compliance and Incident Management Tools operations.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":68,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1783246907,"_task_hash":-501128307,"tokens":[{"text":"Chief","start":0,"end":5,"id":0},{"text":"Privacy","start":6,"end":13,"id":1},{"text":"Officer","start":14,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"expertise","start":27,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"OWASP","start":40,"end":45,"id":6},{"text":"Top","start":46,"end":49,"id":7},{"text":"10","start":50,"end":52,"id":8},{"text":"compliance","start":53,"end":63,"id":9},{"text":"and","start":64,"end":67,"id":10},{"text":"Incident","start":68,"end":76,"id":11},{"text":"Management","start":77,"end":87,"id":12},{"text":"Tools","start":88,"end":93,"id":13},{"text":"operations","start":94,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Hiring Security Training Coordinator for Legal Procedures and ransomware detection.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":72,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1002532906,"_task_hash":-1701463908,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Training","start":16,"end":24,"id":2},{"text":"Coordinator","start":25,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"Legal","start":41,"end":46,"id":5},{"text":"Procedures","start":47,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"ransomware","start":62,"end":72,"id":8},{"text":"detection","start":73,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Experienced Endpoint Security Specialist specializing in Email Gateway Security.","spans":[{"start":12,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":947059730,"_task_hash":-852562898,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Endpoint","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Specialist","start":30,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Email","start":57,"end":62,"id":6},{"text":"Gateway","start":63,"end":70,"id":7},{"text":"Security","start":71,"end":79,"id":8},{"text":".","start":79,"end":80,"id":9}]} {"text":"Required skills: QRadar, CI Integration, PMP Certification certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":41,"end":58,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":216243199,"_task_hash":-1106244385,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"QRadar","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"CI","start":25,"end":27,"id":5},{"text":"Integration","start":28,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"PMP","start":41,"end":44,"id":8},{"text":"Certification","start":45,"end":58,"id":9},{"text":"certification","start":59,"end":72,"id":10},{"text":".","start":72,"end":73,"id":11}]} {"text":"Remediated gaps identified in ISO 27001 A.5.1 assessment.","spans":[{"start":30,"end":45,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1063032886,"_task_hash":333377618,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"gaps","start":11,"end":15,"id":1},{"text":"identified","start":16,"end":26,"id":2},{"text":"in","start":27,"end":29,"id":3},{"text":"ISO","start":30,"end":33,"id":4},{"text":"27001","start":34,"end":39,"id":5},{"text":"A.5.1","start":40,"end":45,"id":6},{"text":"assessment","start":46,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Seeking Emergency Response Manager with 5++ years experience in Memory Forensics and Vendor Evaluation.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1632682232,"_task_hash":2139675679,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Emergency","start":8,"end":17,"id":1},{"text":"Response","start":18,"end":26,"id":2},{"text":"Manager","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Memory","start":64,"end":70,"id":9},{"text":"Forensics","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Vendor","start":85,"end":91,"id":12},{"text":"Evaluation","start":92,"end":102,"id":13},{"text":".","start":102,"end":103,"id":14}]} {"text":"Join our team as QA Engineer!","spans":[{"start":17,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1240179193,"_task_hash":1991912427,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"QA","start":17,"end":19,"id":4},{"text":"Engineer","start":20,"end":28,"id":5},{"text":"!","start":28,"end":29,"id":6}]} {"text":"Senior Chief Privacy Officer skilled in PowerShell, Cisco, and Cloud Access Security Broker.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":52,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":537234154,"_task_hash":1750376172,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Chief","start":7,"end":12,"id":1},{"text":"Privacy","start":13,"end":20,"id":2},{"text":"Officer","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"PowerShell","start":40,"end":50,"id":6},{"text":",","start":50,"end":51,"id":7},{"text":"Cisco","start":52,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"and","start":59,"end":62,"id":10},{"text":"Cloud","start":63,"end":68,"id":11},{"text":"Access","start":69,"end":75,"id":12},{"text":"Security","start":76,"end":84,"id":13},{"text":"Broker","start":85,"end":91,"id":14},{"text":".","start":91,"end":92,"id":15}]} {"text":"Implemented controls for GLBA audit.","spans":[{"start":25,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":447010161,"_task_hash":1725193109,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"GLBA","start":25,"end":29,"id":3},{"text":"audit","start":30,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"Certified NLP working as Full Stack Engineer, focused on CI/CD Security and SQL Injection prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":13},{"start":76,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-55874807,"_task_hash":-341092672,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Full","start":25,"end":29,"id":4},{"text":"Stack","start":30,"end":35,"id":5},{"text":"Engineer","start":36,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"CI","start":57,"end":59,"id":10},{"text":"/","start":59,"end":60,"id":11},{"text":"CD","start":60,"end":62,"id":12},{"text":"Security","start":63,"end":71,"id":13},{"text":"and","start":72,"end":75,"id":14},{"text":"SQL","start":76,"end":79,"id":15},{"text":"Injection","start":80,"end":89,"id":16},{"text":"prevention","start":90,"end":100,"id":17},{"text":".","start":100,"end":101,"id":18}]} {"text":"Published threat intel report on botnet trends.","spans":[{"start":33,"end":39,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1497482912,"_task_hash":-885135260,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"threat","start":10,"end":16,"id":1},{"text":"intel","start":17,"end":22,"id":2},{"text":"report","start":23,"end":29,"id":3},{"text":"on","start":30,"end":32,"id":4},{"text":"botnet","start":33,"end":39,"id":5},{"text":"trends","start":40,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Web Developer professional with 10+ years implementing EDR Platforms and managing Compliance Automation programs.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":55,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":82,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1951863711,"_task_hash":302071068,"tokens":[{"text":"Web","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"professional","start":14,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"10","start":32,"end":34,"id":4},{"text":"+","start":34,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"implementing","start":42,"end":54,"id":7},{"text":"EDR","start":55,"end":58,"id":8},{"text":"Platforms","start":59,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"managing","start":73,"end":81,"id":11},{"text":"Compliance","start":82,"end":92,"id":12},{"text":"Automation","start":93,"end":103,"id":13},{"text":"programs","start":104,"end":112,"id":14},{"text":".","start":112,"end":113,"id":15}]} {"text":"Developed Patch Management strategy and roadmap.","spans":[{"start":10,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":26,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2109827198,"_task_hash":-854263628,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Patch","start":10,"end":15,"id":1},{"text":"Management","start":16,"end":26,"id":2},{"text":"strategy","start":27,"end":35,"id":3},{"text":"and","start":36,"end":39,"id":4},{"text":"roadmap","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"FERPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1817666216,"_task_hash":1295086938,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Published research on Security Architecture trends.","spans":[{"start":22,"end":43,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":43,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-367716423,"_task_hash":1538906669,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Architecture","start":31,"end":43,"id":4},{"text":"trends","start":44,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Malware Analyst with CISSP certification, expert in Fortinet.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":21,"end":26,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":52,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1071922581,"_task_hash":-2123321216,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Analyst","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"CISSP","start":21,"end":26,"id":3},{"text":"certification","start":27,"end":40,"id":4},{"text":",","start":40,"end":41,"id":5},{"text":"expert","start":42,"end":48,"id":6},{"text":"in","start":49,"end":51,"id":7},{"text":"Fortinet","start":52,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"Discovered and reported CVE-2024-0001 affecting critical infrastructure.","spans":[{"start":24,"end":37,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1520408013,"_task_hash":-700311770,"tokens":[{"text":"Discovered","start":0,"end":10,"id":0},{"text":"and","start":11,"end":14,"id":1},{"text":"reported","start":15,"end":23,"id":2},{"text":"CVE-2024","start":24,"end":32,"id":3},{"text":"-","start":32,"end":33,"id":4},{"text":"0001","start":33,"end":37,"id":5},{"text":"affecting","start":38,"end":47,"id":6},{"text":"critical","start":48,"end":56,"id":7},{"text":"infrastructure","start":57,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"Implemented controls for SOC 2 audit.","spans":[{"start":25,"end":30,"label":"REGULATION","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2116299757,"_task_hash":112495044,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"for","start":21,"end":24,"id":2},{"text":"SOC","start":25,"end":28,"id":3},{"text":"2","start":29,"end":30,"id":4},{"text":"audit","start":31,"end":36,"id":5},{"text":".","start":36,"end":37,"id":6}]} {"text":"Created YARA rules for Reflective DLL Loading detection.","spans":[{"start":23,"end":45,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6},{"start":23,"end":45,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6},{"start":23,"end":45,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":159798562,"_task_hash":1932655627,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Reflective","start":23,"end":33,"id":4},{"text":"DLL","start":34,"end":37,"id":5},{"text":"Loading","start":38,"end":45,"id":6},{"text":"detection","start":46,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"Certified in NGFW administration.","spans":[{"start":13,"end":17,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1034032453,"_task_hash":-657456015,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"in","start":10,"end":12,"id":1},{"text":"NGFW","start":13,"end":17,"id":2},{"text":"administration","start":18,"end":32,"id":3},{"text":".","start":32,"end":33,"id":4}]} {"text":"Implemented controls to prevent supply chain attack attacks.","spans":[{"start":32,"end":51,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1216911066,"_task_hash":1058630938,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"supply","start":32,"end":38,"id":4},{"text":"chain","start":39,"end":44,"id":5},{"text":"attack","start":45,"end":51,"id":6},{"text":"attacks","start":52,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"Seeking ML Product Manager with 3++ years experience in Gamification and Server Management.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":73,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-260138531,"_task_hash":-1867464442,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"ML","start":8,"end":10,"id":1},{"text":"Product","start":11,"end":18,"id":2},{"text":"Manager","start":19,"end":26,"id":3},{"text":"with","start":27,"end":31,"id":4},{"text":"3++","start":32,"end":35,"id":5},{"text":"years","start":36,"end":41,"id":6},{"text":"experience","start":42,"end":52,"id":7},{"text":"in","start":53,"end":55,"id":8},{"text":"Gamification","start":56,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"Server","start":73,"end":79,"id":11},{"text":"Management","start":80,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Reported CCPA compliance status to board.","spans":[{"start":9,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1},{"start":9,"end":13,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1438576992,"_task_hash":752864615,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"CCPA","start":9,"end":13,"id":1},{"text":"compliance","start":14,"end":24,"id":2},{"text":"status","start":25,"end":31,"id":3},{"text":"to","start":32,"end":34,"id":4},{"text":"board","start":35,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Assessed Cryptography maturity using industry frameworks.","spans":[{"start":9,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-517505689,"_task_hash":1357011802,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Cryptography","start":9,"end":21,"id":1},{"text":"maturity","start":22,"end":30,"id":2},{"text":"using","start":31,"end":36,"id":3},{"text":"industry","start":37,"end":45,"id":4},{"text":"frameworks","start":46,"end":56,"id":5},{"text":".","start":56,"end":57,"id":6}]} {"text":"Lead Security Assessment Analyst managing Monitoring and SOC Operations initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":57,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1565280652,"_task_hash":1353743451,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Assessment","start":14,"end":24,"id":2},{"text":"Analyst","start":25,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Monitoring","start":42,"end":52,"id":5},{"text":"and","start":53,"end":56,"id":6},{"text":"SOC","start":57,"end":60,"id":7},{"text":"Operations","start":61,"end":71,"id":8},{"text":"initiatives","start":72,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} {"text":"Looking for Game Engineer to lead Security Champions Program initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-414114236,"_task_hash":299337878,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Game","start":12,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Champions","start":43,"end":52,"id":7},{"text":"Program","start":53,"end":60,"id":8},{"text":"initiatives","start":61,"end":72,"id":9},{"text":".","start":72,"end":73,"id":10}]} {"text":"Expert in GLBA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1495699365,"_task_hash":435438006,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GLBA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"API Developer with 3 years experience in Ethical Framework Development, Fast Comebacks, and Risk Metrics.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":70,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":72,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":92,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":518877385,"_task_hash":1226752438,"tokens":[{"text":"API","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"3","start":19,"end":20,"id":3},{"text":"years","start":21,"end":26,"id":4},{"text":"experience","start":27,"end":37,"id":5},{"text":"in","start":38,"end":40,"id":6},{"text":"Ethical","start":41,"end":48,"id":7},{"text":"Framework","start":49,"end":58,"id":8},{"text":"Development","start":59,"end":70,"id":9},{"text":",","start":70,"end":71,"id":10},{"text":"Fast","start":72,"end":76,"id":11},{"text":"Comebacks","start":77,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"and","start":88,"end":91,"id":14},{"text":"Risk","start":92,"end":96,"id":15},{"text":"Metrics","start":97,"end":104,"id":16},{"text":".","start":104,"end":105,"id":17}]} {"text":"Hiring Full\u2011Stack Developer for CVSS Scoring and adware detection.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":49,"end":55,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-861042883,"_task_hash":602362840,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Full\u2011Stack","start":7,"end":17,"id":1},{"text":"Developer","start":18,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"CVSS","start":32,"end":36,"id":4},{"text":"Scoring","start":37,"end":44,"id":5},{"text":"and","start":45,"end":48,"id":6},{"text":"adware","start":49,"end":55,"id":7},{"text":"detection","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} {"text":"SOC Analyst with hands-on experience in EDR Tools, ELK Stack, and Security Monitoring.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":40,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":51,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":66,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1816874173,"_task_hash":-685175148,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"hands","start":17,"end":22,"id":3},{"text":"-","start":22,"end":23,"id":4},{"text":"on","start":23,"end":25,"id":5},{"text":"experience","start":26,"end":36,"id":6},{"text":"in","start":37,"end":39,"id":7},{"text":"EDR","start":40,"end":43,"id":8},{"text":"Tools","start":44,"end":49,"id":9},{"text":",","start":49,"end":50,"id":10},{"text":"ELK","start":51,"end":54,"id":11},{"text":"Stack","start":55,"end":60,"id":12},{"text":",","start":60,"end":61,"id":13},{"text":"and","start":62,"end":65,"id":14},{"text":"Security","start":66,"end":74,"id":15},{"text":"Monitoring","start":75,"end":85,"id":16},{"text":".","start":85,"end":86,"id":17}]} {"text":"Tested WAF rules against Cross-Site Scripting payloads.","spans":[{"start":25,"end":45,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1687144876,"_task_hash":-1597954660,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Cross","start":25,"end":30,"id":4},{"text":"-","start":30,"end":31,"id":5},{"text":"Site","start":31,"end":35,"id":6},{"text":"Scripting","start":36,"end":45,"id":7},{"text":"payloads","start":46,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"ML Infrastructure Engineer with 5 years experience in Privacy in AI, Privacy-Enhancing Technologies, and Federated Learning.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":69,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15},{"start":105,"end":123,"label":"TECHNICAL_SKILL","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-754076922,"_task_hash":675431260,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Infrastructure","start":3,"end":17,"id":1},{"text":"Engineer","start":18,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"5","start":32,"end":33,"id":4},{"text":"years","start":34,"end":39,"id":5},{"text":"experience","start":40,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Privacy","start":54,"end":61,"id":8},{"text":"in","start":62,"end":64,"id":9},{"text":"AI","start":65,"end":67,"id":10},{"text":",","start":67,"end":68,"id":11},{"text":"Privacy","start":69,"end":76,"id":12},{"text":"-","start":76,"end":77,"id":13},{"text":"Enhancing","start":77,"end":86,"id":14},{"text":"Technologies","start":87,"end":99,"id":15},{"text":",","start":99,"end":100,"id":16},{"text":"and","start":101,"end":104,"id":17},{"text":"Federated","start":105,"end":114,"id":18},{"text":"Learning","start":115,"end":123,"id":19},{"text":".","start":123,"end":124,"id":20}]} {"text":"Security Tester needed for enterprise security team.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1403541829,"_task_hash":783557804,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Tester","start":9,"end":15,"id":1},{"text":"needed","start":16,"end":22,"id":2},{"text":"for","start":23,"end":26,"id":3},{"text":"enterprise","start":27,"end":37,"id":4},{"text":"security","start":38,"end":46,"id":5},{"text":"team","start":47,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Certified PKI working as Threat Analyst, focused on Security Strategy and Command Injection prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":52,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":74,"end":91,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1651761944,"_task_hash":523616643,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PKI","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Threat","start":25,"end":31,"id":4},{"text":"Analyst","start":32,"end":39,"id":5},{"text":",","start":39,"end":40,"id":6},{"text":"focused","start":41,"end":48,"id":7},{"text":"on","start":49,"end":51,"id":8},{"text":"Security","start":52,"end":60,"id":9},{"text":"Strategy","start":61,"end":69,"id":10},{"text":"and","start":70,"end":73,"id":11},{"text":"Command","start":74,"end":81,"id":12},{"text":"Injection","start":82,"end":91,"id":13},{"text":"prevention","start":92,"end":102,"id":14},{"text":".","start":102,"end":103,"id":15}]} {"text":"Risk Analyst with CISSP certification, expert in John the Ripper.","spans":[{"start":0,"end":12,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":18,"end":23,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":49,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2010674164,"_task_hash":2039196700,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Analyst","start":5,"end":12,"id":1},{"text":"with","start":13,"end":17,"id":2},{"text":"CISSP","start":18,"end":23,"id":3},{"text":"certification","start":24,"end":37,"id":4},{"text":",","start":37,"end":38,"id":5},{"text":"expert","start":39,"end":45,"id":6},{"text":"in","start":46,"end":48,"id":7},{"text":"John","start":49,"end":53,"id":8},{"text":"the","start":54,"end":57,"id":9},{"text":"Ripper","start":58,"end":64,"id":10},{"text":".","start":64,"end":65,"id":11}]} {"text":"Seeking Autonomous Systems Engineer with 10++ years experience in Evidence Collection and Content Strategy.","spans":[{"start":8,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":66,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":90,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":597576979,"_task_hash":1243724796,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Autonomous","start":8,"end":18,"id":1},{"text":"Systems","start":19,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"10++","start":41,"end":45,"id":5},{"text":"years","start":46,"end":51,"id":6},{"text":"experience","start":52,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Evidence","start":66,"end":74,"id":9},{"text":"Collection","start":75,"end":85,"id":10},{"text":"and","start":86,"end":89,"id":11},{"text":"Content","start":90,"end":97,"id":12},{"text":"Strategy","start":98,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} {"text":"Blue Team Lead with CGEIT certification, expert in Nessus.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":25,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1710881639,"_task_hash":-1462128337,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Lead","start":10,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"CGEIT","start":20,"end":25,"id":4},{"text":"certification","start":26,"end":39,"id":5},{"text":",","start":39,"end":40,"id":6},{"text":"expert","start":41,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"Nessus","start":51,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"We need a UI/UX Designer skilled in SQL Injection prevention and worm analysis using Burp Suite.","spans":[{"start":10,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":6},{"start":36,"end":49,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":9,"token_end":10},{"start":65,"end":69,"label":"THREAT_TYPE","answer":"accept","token_start":13,"token_end":13},{"start":85,"end":95,"label":"SECURITY_TOOL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-613577006,"_task_hash":-479795657,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"UI","start":10,"end":12,"id":3},{"text":"/","start":12,"end":13,"id":4},{"text":"UX","start":13,"end":15,"id":5},{"text":"Designer","start":16,"end":24,"id":6},{"text":"skilled","start":25,"end":32,"id":7},{"text":"in","start":33,"end":35,"id":8},{"text":"SQL","start":36,"end":39,"id":9},{"text":"Injection","start":40,"end":49,"id":10},{"text":"prevention","start":50,"end":60,"id":11},{"text":"and","start":61,"end":64,"id":12},{"text":"worm","start":65,"end":69,"id":13},{"text":"analysis","start":70,"end":78,"id":14},{"text":"using","start":79,"end":84,"id":15},{"text":"Burp","start":85,"end":89,"id":16},{"text":"Suite","start":90,"end":95,"id":17},{"text":".","start":95,"end":96,"id":18}]} {"text":"SOC Analyst with CISA certification, expert in Wireshark.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1690307722,"_task_hash":1967731681,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"CISA","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Wireshark","start":47,"end":56,"id":8},{"text":".","start":56,"end":57,"id":9}]} {"text":"Blue Team Analyst role available: Testing Libraries experience required, Web App Security knowledge essential.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":34,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":73,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":452060315,"_task_hash":1163056921,"tokens":[{"text":"Blue","start":0,"end":4,"id":0},{"text":"Team","start":5,"end":9,"id":1},{"text":"Analyst","start":10,"end":17,"id":2},{"text":"role","start":18,"end":22,"id":3},{"text":"available","start":23,"end":32,"id":4},{"text":":","start":32,"end":33,"id":5},{"text":"Testing","start":34,"end":41,"id":6},{"text":"Libraries","start":42,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"required","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Web","start":73,"end":76,"id":11},{"text":"App","start":77,"end":80,"id":12},{"text":"Security","start":81,"end":89,"id":13},{"text":"knowledge","start":90,"end":99,"id":14},{"text":"essential","start":100,"end":109,"id":15},{"text":".","start":109,"end":110,"id":16}]} {"text":"Experience with WAF platforms and integration.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-644774535,"_task_hash":672909235,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"WAF","start":16,"end":19,"id":2},{"text":"platforms","start":20,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"integration","start":34,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Must have EDR Platforms experience and NIST Framework knowledge.","spans":[{"start":10,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1390606848,"_task_hash":1171752415,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Platforms","start":14,"end":23,"id":3},{"text":"experience","start":24,"end":34,"id":4},{"text":"and","start":35,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"knowledge","start":54,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"CISO position available at Fortune 100 company.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":790104473,"_task_hash":-1542423715,"tokens":[{"text":"CISO","start":0,"end":4,"id":0},{"text":"position","start":5,"end":13,"id":1},{"text":"available","start":14,"end":23,"id":2},{"text":"at","start":24,"end":26,"id":3},{"text":"Fortune","start":27,"end":34,"id":4},{"text":"100","start":35,"end":38,"id":5},{"text":"company","start":39,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} {"text":"Seeking MLOps Engineer with 10+ years experience in Phishing Simulation Tools and Issue Resolution.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":52,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":82,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":355892509,"_task_hash":1178180029,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"MLOps","start":8,"end":13,"id":1},{"text":"Engineer","start":14,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"10","start":28,"end":30,"id":4},{"text":"+","start":30,"end":31,"id":5},{"text":"years","start":32,"end":37,"id":6},{"text":"experience","start":38,"end":48,"id":7},{"text":"in","start":49,"end":51,"id":8},{"text":"Phishing","start":52,"end":60,"id":9},{"text":"Simulation","start":61,"end":71,"id":10},{"text":"Tools","start":72,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Issue","start":82,"end":87,"id":13},{"text":"Resolution","start":88,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Reported ISO 27001 A.10.1 compliance status to leadership.","spans":[{"start":9,"end":25,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1045237164,"_task_hash":-175205869,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"ISO","start":9,"end":12,"id":1},{"text":"27001","start":13,"end":18,"id":2},{"text":"A.10.1","start":19,"end":25,"id":3},{"text":"compliance","start":26,"end":36,"id":4},{"text":"status","start":37,"end":43,"id":5},{"text":"to","start":44,"end":46,"id":6},{"text":"leadership","start":47,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} {"text":"RBAC required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1198453295,"_task_hash":1243055279,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Analytics Specialist with expertise in OWASP Top 10 compliance and Framework Design operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1472802493,"_task_hash":-1240698101,"tokens":[{"text":"Analytics","start":0,"end":9,"id":0},{"text":"Specialist","start":10,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"expertise","start":26,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"OWASP","start":39,"end":44,"id":5},{"text":"Top","start":45,"end":48,"id":6},{"text":"10","start":49,"end":51,"id":7},{"text":"compliance","start":52,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"Framework","start":67,"end":76,"id":10},{"text":"Design","start":77,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} {"text":"GDPR requires data protection impact assessments.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1806509649,"_task_hash":-543904399,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"requires","start":5,"end":13,"id":1},{"text":"data","start":14,"end":18,"id":2},{"text":"protection","start":19,"end":29,"id":3},{"text":"impact","start":30,"end":36,"id":4},{"text":"assessments","start":37,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Application Security Engineer with Azure Security certification, expert in Fortinet.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":75,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1145062997,"_task_hash":-1022359749,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"Azure","start":35,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":"certification","start":50,"end":63,"id":6},{"text":",","start":63,"end":64,"id":7},{"text":"expert","start":65,"end":71,"id":8},{"text":"in","start":72,"end":74,"id":9},{"text":"Fortinet","start":75,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Implemented GDPR data subject rights processes.","spans":[{"start":12,"end":16,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-280733137,"_task_hash":-1520589049,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"GDPR","start":12,"end":16,"id":1},{"text":"data","start":17,"end":21,"id":2},{"text":"subject","start":22,"end":29,"id":3},{"text":"rights","start":30,"end":36,"id":4},{"text":"processes","start":37,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Automated ITAR compliance monitoring.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1338543303,"_task_hash":-757297327,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"ITAR","start":10,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"monitoring","start":26,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Must have CrowdStrike experience and NIST Framework knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-3577102,"_task_hash":1298442445,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"knowledge","start":52,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} {"text":"Led Security Awareness initiatives across organization.","spans":[{"start":4,"end":22,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1067359245,"_task_hash":1787149043,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Security","start":4,"end":12,"id":1},{"text":"Awareness","start":13,"end":22,"id":2},{"text":"initiatives","start":23,"end":34,"id":3},{"text":"across","start":35,"end":41,"id":4},{"text":"organization","start":42,"end":54,"id":5},{"text":".","start":54,"end":55,"id":6}]} {"text":"Ensured compliance with SOC 2 requirements.","spans":[{"start":24,"end":29,"label":"REGULATION","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2038216472,"_task_hash":365865100,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"SOC","start":24,"end":27,"id":3},{"text":"2","start":28,"end":29,"id":4},{"text":"requirements","start":30,"end":42,"id":5},{"text":".","start":42,"end":43,"id":6}]} {"text":"Accomplished Sysadmin specializing in RESTful APIs and Kubernetes Security.","spans":[{"start":13,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":38,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-422357775,"_task_hash":-111400691,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Sysadmin","start":13,"end":21,"id":1},{"text":"specializing","start":22,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"RESTful","start":38,"end":45,"id":4},{"text":"APIs","start":46,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Kubernetes","start":55,"end":65,"id":7},{"text":"Security","start":66,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Risk Assessment Analyst role available: Network Penetration Testing experience required, AI Security knowledge essential.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":40,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1904595765,"_task_hash":1375370973,"tokens":[{"text":"Risk","start":0,"end":4,"id":0},{"text":"Assessment","start":5,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"role","start":24,"end":28,"id":3},{"text":"available","start":29,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"Network","start":40,"end":47,"id":6},{"text":"Penetration","start":48,"end":59,"id":7},{"text":"Testing","start":60,"end":67,"id":8},{"text":"experience","start":68,"end":78,"id":9},{"text":"required","start":79,"end":87,"id":10},{"text":",","start":87,"end":88,"id":11},{"text":"AI","start":89,"end":91,"id":12},{"text":"Security","start":92,"end":100,"id":13},{"text":"knowledge","start":101,"end":110,"id":14},{"text":"essential","start":111,"end":120,"id":15},{"text":".","start":120,"end":121,"id":16}]} {"text":"Holds SOC 2.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":556305966,"_task_hash":-2022141598,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SOC","start":6,"end":9,"id":1},{"text":"2","start":10,"end":11,"id":2},{"text":".","start":11,"end":12,"id":3}]} {"text":"Detected Race Condition attack in production environment.","spans":[{"start":9,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1321563192,"_task_hash":-405440416,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Race","start":9,"end":13,"id":1},{"text":"Condition","start":14,"end":23,"id":2},{"text":"attack","start":24,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"production","start":34,"end":44,"id":5},{"text":"environment","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Automated CFAA compliance monitoring.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-160029054,"_task_hash":-1570507427,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"CFAA","start":10,"end":14,"id":1},{"text":"compliance","start":15,"end":25,"id":2},{"text":"monitoring","start":26,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Holds LDAP.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1805087655,"_task_hash":149409793,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"LDAP","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} {"text":"Accomplished Vulnerability Analyst specializing in VPN and Pod Security.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":59,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-234307633,"_task_hash":1007610384,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Vulnerability","start":13,"end":26,"id":1},{"text":"Analyst","start":27,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"VPN","start":51,"end":54,"id":5},{"text":"and","start":55,"end":58,"id":6},{"text":"Pod","start":59,"end":62,"id":7},{"text":"Security","start":63,"end":71,"id":8},{"text":".","start":71,"end":72,"id":9}]} {"text":"Hiring Information Technology Manager for Replication and trojan detection.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1380774676,"_task_hash":2123291586,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Information","start":7,"end":18,"id":1},{"text":"Technology","start":19,"end":29,"id":2},{"text":"Manager","start":30,"end":37,"id":3},{"text":"for","start":38,"end":41,"id":4},{"text":"Replication","start":42,"end":53,"id":5},{"text":"and","start":54,"end":57,"id":6},{"text":"trojan","start":58,"end":64,"id":7},{"text":"detection","start":65,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} {"text":"Holds OSCP Certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851475902,"_task_hash":270501489,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Experienced AI/Robotics Engineer specializing in IoT Security.","spans":[{"start":12,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":49,"end":61,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":660506044,"_task_hash":-1300568391,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"AI","start":12,"end":14,"id":1},{"text":"/","start":14,"end":15,"id":2},{"text":"Robotics","start":15,"end":23,"id":3},{"text":"Engineer","start":24,"end":32,"id":4},{"text":"specializing","start":33,"end":45,"id":5},{"text":"in","start":46,"end":48,"id":6},{"text":"IoT","start":49,"end":52,"id":7},{"text":"Security","start":53,"end":61,"id":8},{"text":".","start":61,"end":62,"id":9}]} {"text":"Immediate opening for Kubernetes Security Engineer.","spans":[{"start":22,"end":50,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1852552537,"_task_hash":1293601639,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Kubernetes","start":22,"end":32,"id":3},{"text":"Security","start":33,"end":41,"id":4},{"text":"Engineer","start":42,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"Network Specialist professional with 7+ years implementing CrowdStrike and managing Regulatory Frameworks programs.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":59,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":84,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-133372839,"_task_hash":-367215640,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Specialist","start":8,"end":18,"id":1},{"text":"professional","start":19,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"7","start":37,"end":38,"id":4},{"text":"+","start":38,"end":39,"id":5},{"text":"years","start":40,"end":45,"id":6},{"text":"implementing","start":46,"end":58,"id":7},{"text":"CrowdStrike","start":59,"end":70,"id":8},{"text":"and","start":71,"end":74,"id":9},{"text":"managing","start":75,"end":83,"id":10},{"text":"Regulatory","start":84,"end":94,"id":11},{"text":"Frameworks","start":95,"end":105,"id":12},{"text":"programs","start":106,"end":114,"id":13},{"text":".","start":114,"end":115,"id":14}]} {"text":"Immediate opening for Physical Security Analyst.","spans":[{"start":22,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1511616322,"_task_hash":1166583757,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Physical","start":22,"end":30,"id":3},{"text":"Security","start":31,"end":39,"id":4},{"text":"Analyst","start":40,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Holds ETL.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":582823180,"_task_hash":-1693571280,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ETL","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"Application Security Engineer with CISSP certification, expert in SentinelOne.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":35,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":66,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-804712144,"_task_hash":767983285,"tokens":[{"text":"Application","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"CISSP","start":35,"end":40,"id":4},{"text":"certification","start":41,"end":54,"id":5},{"text":",","start":54,"end":55,"id":6},{"text":"expert","start":56,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"SentinelOne","start":66,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} {"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Trained staff on NIST obligations.","spans":[{"start":17,"end":21,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1958808884,"_task_hash":2012869168,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"NIST","start":17,"end":21,"id":3},{"text":"obligations","start":22,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Certified PRINCE2 working as IT Department Manager, focused on Security Culture and XXE prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":29,"end":50,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":63,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":84,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-882431709,"_task_hash":1105822296,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"PRINCE2","start":10,"end":17,"id":1},{"text":"working","start":18,"end":25,"id":2},{"text":"as","start":26,"end":28,"id":3},{"text":"IT","start":29,"end":31,"id":4},{"text":"Department","start":32,"end":42,"id":5},{"text":"Manager","start":43,"end":50,"id":6},{"text":",","start":50,"end":51,"id":7},{"text":"focused","start":52,"end":59,"id":8},{"text":"on","start":60,"end":62,"id":9},{"text":"Security","start":63,"end":71,"id":10},{"text":"Culture","start":72,"end":79,"id":11},{"text":"and","start":80,"end":83,"id":12},{"text":"XXE","start":84,"end":87,"id":13},{"text":"prevention","start":88,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} {"text":"Proficient in QRadar and Burp Suite.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":20521113,"_task_hash":1685999949,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"QRadar","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Burp","start":25,"end":29,"id":4},{"text":"Suite","start":30,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"Built DevSecOps team from ground up.","spans":[{"start":6,"end":15,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2121381351,"_task_hash":2082413634,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"DevSecOps","start":6,"end":15,"id":1},{"text":"team","start":16,"end":20,"id":2},{"text":"from","start":21,"end":25,"id":3},{"text":"ground","start":26,"end":32,"id":4},{"text":"up","start":33,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"GLBA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1328244680,"_task_hash":-1510078390,"tokens":[{"text":"GLBA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and SQL Server operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1343628236,"_task_hash":1810185313,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"SQL","start":82,"end":85,"id":13},{"text":"Server","start":86,"end":92,"id":14},{"text":"operations","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} {"text":"Detected supply chain attack activity using behavioral analytics.","spans":[{"start":9,"end":28,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1363981165,"_task_hash":-1581715609,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"supply","start":9,"end":15,"id":1},{"text":"chain","start":16,"end":21,"id":2},{"text":"attack","start":22,"end":28,"id":3},{"text":"activity","start":29,"end":37,"id":4},{"text":"using","start":38,"end":43,"id":5},{"text":"behavioral","start":44,"end":54,"id":6},{"text":"analytics","start":55,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} {"text":"Security Operations Lead with expertise in OWASP Top 10 compliance and CVSS Scoring operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":71,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2122200759,"_task_hash":-873218532,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Lead","start":20,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"OWASP","start":43,"end":48,"id":6},{"text":"Top","start":49,"end":52,"id":7},{"text":"10","start":53,"end":55,"id":8},{"text":"compliance","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"CVSS","start":71,"end":75,"id":11},{"text":"Scoring","start":76,"end":83,"id":12},{"text":"operations","start":84,"end":94,"id":13},{"text":".","start":94,"end":95,"id":14}]} {"text":"NIST RMF certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1708361409,"_task_hash":252404575,"tokens":[{"text":"NIST","start":0,"end":4,"id":0},{"text":"RMF","start":5,"end":8,"id":1},{"text":"certification","start":9,"end":22,"id":2},{"text":"a","start":23,"end":24,"id":3},{"text":"plus","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} {"text":"OSCP Certification certification a plus.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":177069532,"_task_hash":1789774490,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"certification","start":19,"end":32,"id":2},{"text":"a","start":33,"end":34,"id":3},{"text":"plus","start":35,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Accomplished VP Security specializing in Data Protection and Security Training.","spans":[{"start":13,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-910704684,"_task_hash":598337380,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"VP","start":13,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"specializing","start":25,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Data","start":41,"end":45,"id":5},{"text":"Protection","start":46,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Security","start":61,"end":69,"id":8},{"text":"Training","start":70,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Chief Information Security Officer with CCSP certification, expert in BloodHound.","spans":[{"start":0,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":40,"end":44,"label":"CERTIFICATION","answer":"accept","token_start":5,"token_end":5},{"start":70,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-912830308,"_task_hash":-160439555,"tokens":[{"text":"Chief","start":0,"end":5,"id":0},{"text":"Information","start":6,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Officer","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"CCSP","start":40,"end":44,"id":5},{"text":"certification","start":45,"end":58,"id":6},{"text":",","start":58,"end":59,"id":7},{"text":"expert","start":60,"end":66,"id":8},{"text":"in","start":67,"end":69,"id":9},{"text":"BloodHound","start":70,"end":80,"id":10},{"text":".","start":80,"end":81,"id":11}]} {"text":"Managed AI Act certification process.","spans":[{"start":8,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2},{"start":8,"end":14,"label":"REGULATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1443768311,"_task_hash":-555826980,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Act","start":11,"end":14,"id":2},{"text":"certification","start":15,"end":28,"id":3},{"text":"process","start":29,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"Container Security Engineer with 10 years experience in Intelligence Analysis, Data Analysis, and Penetration Testing.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":56,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":117,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1650229892,"_task_hash":-752971441,"tokens":[{"text":"Container","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Engineer","start":19,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"10","start":33,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Intelligence","start":56,"end":68,"id":8},{"text":"Analysis","start":69,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"Data","start":79,"end":83,"id":11},{"text":"Analysis","start":84,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"and","start":94,"end":97,"id":14},{"text":"Penetration","start":98,"end":109,"id":15},{"text":"Testing","start":110,"end":117,"id":16},{"text":".","start":117,"end":118,"id":17}]} {"text":"IAM required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1453201640,"_task_hash":-526125081,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Chief Information Security Officer with OSED certification, expert in Burp Suite.","spans":[{"start":0,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":40,"end":44,"label":"CERTIFICATION","answer":"accept","token_start":5,"token_end":5},{"start":70,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1546649776,"_task_hash":-929435833,"tokens":[{"text":"Chief","start":0,"end":5,"id":0},{"text":"Information","start":6,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Officer","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"OSED","start":40,"end":44,"id":5},{"text":"certification","start":45,"end":58,"id":6},{"text":",","start":58,"end":59,"id":7},{"text":"expert","start":60,"end":66,"id":8},{"text":"in","start":67,"end":69,"id":9},{"text":"Burp","start":70,"end":74,"id":10},{"text":"Suite","start":75,"end":80,"id":11},{"text":".","start":80,"end":81,"id":12}]} {"text":"Immediate opening for Product Designer.","spans":[{"start":22,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":2140507977,"_task_hash":-2143330952,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Product","start":22,"end":29,"id":3},{"text":"Designer","start":30,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Developed playbooks for Advanced Persistent Threat response.","spans":[{"start":24,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1370451532,"_task_hash":1601845269,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"playbooks","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Advanced","start":24,"end":32,"id":3},{"text":"Persistent","start":33,"end":43,"id":4},{"text":"Threat","start":44,"end":50,"id":5},{"text":"response","start":51,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Mentored junior engineers in Purple Team.","spans":[{"start":29,"end":40,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1144325641,"_task_hash":-125303244,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Purple","start":29,"end":35,"id":4},{"text":"Team","start":36,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Accomplished Quality Assurance Engineer specializing in Model Explainability and Cisco Security.","spans":[{"start":13,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1085597199,"_task_hash":1238925514,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Quality","start":13,"end":20,"id":1},{"text":"Assurance","start":21,"end":30,"id":2},{"text":"Engineer","start":31,"end":39,"id":3},{"text":"specializing","start":40,"end":52,"id":4},{"text":"in","start":53,"end":55,"id":5},{"text":"Model","start":56,"end":61,"id":6},{"text":"Explainability","start":62,"end":76,"id":7},{"text":"and","start":77,"end":80,"id":8},{"text":"Cisco","start":81,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} {"text":"Offensive Security Specialist with 7 years experience in Back End, Simulations, and Awareness Programs.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":67,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":84,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1557990443,"_task_hash":-1899947238,"tokens":[{"text":"Offensive","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"7","start":35,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Back","start":57,"end":61,"id":8},{"text":"End","start":62,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"Simulations","start":67,"end":78,"id":11},{"text":",","start":78,"end":79,"id":12},{"text":"and","start":80,"end":83,"id":13},{"text":"Awareness","start":84,"end":93,"id":14},{"text":"Programs","start":94,"end":102,"id":15},{"text":".","start":102,"end":103,"id":16}]} {"text":"Azure Architect with expertise in NIST Framework compliance and Protocols operations.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1596711979,"_task_hash":1403576846,"tokens":[{"text":"Azure","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"expertise","start":21,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"NIST","start":34,"end":38,"id":5},{"text":"Framework","start":39,"end":48,"id":6},{"text":"compliance","start":49,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Protocols","start":64,"end":73,"id":9},{"text":"operations","start":74,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} {"text":"IT Manager with expertise in NIST Framework compliance and API Design operations.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":29,"end":43,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-439503005,"_task_hash":1243252389,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"expertise","start":16,"end":25,"id":3},{"text":"in","start":26,"end":28,"id":4},{"text":"NIST","start":29,"end":33,"id":5},{"text":"Framework","start":34,"end":43,"id":6},{"text":"compliance","start":44,"end":54,"id":7},{"text":"and","start":55,"end":58,"id":8},{"text":"API","start":59,"end":62,"id":9},{"text":"Design","start":63,"end":69,"id":10},{"text":"operations","start":70,"end":80,"id":11},{"text":".","start":80,"end":81,"id":12}]} {"text":"Developed Security Awareness strategy and roadmap.","spans":[{"start":10,"end":28,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1147573163,"_task_hash":-1164688983,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Awareness","start":19,"end":28,"id":2},{"text":"strategy","start":29,"end":37,"id":3},{"text":"and","start":38,"end":41,"id":4},{"text":"roadmap","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Lead Android Developer managing Middleware and UEBA Tools initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":47,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1738444323,"_task_hash":2020107143,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Android","start":5,"end":12,"id":1},{"text":"Developer","start":13,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"Middleware","start":32,"end":42,"id":4},{"text":"and","start":43,"end":46,"id":5},{"text":"UEBA","start":47,"end":51,"id":6},{"text":"Tools","start":52,"end":57,"id":7},{"text":"initiatives","start":58,"end":69,"id":8},{"text":".","start":69,"end":70,"id":9}]} {"text":"Tested WAF rules against Process Hollowing payloads.","spans":[{"start":25,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5},{"start":25,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1993072354,"_task_hash":1136423346,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Process","start":25,"end":32,"id":4},{"text":"Hollowing","start":33,"end":42,"id":5},{"text":"payloads","start":43,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Crisis Management Specialist experienced in detecting APT attacks using QRadar.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457121147,"_task_hash":1005708318,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Management","start":7,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"experienced","start":29,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"detecting","start":44,"end":53,"id":5},{"text":"APT","start":54,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"QRadar","start":72,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} {"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Mitigated Man in the Middle through code remediation.","spans":[{"start":10,"end":27,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1571083102,"_task_hash":40463240,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Man","start":10,"end":13,"id":1},{"text":"in","start":14,"end":16,"id":2},{"text":"the","start":17,"end":20,"id":3},{"text":"Middle","start":21,"end":27,"id":4},{"text":"through","start":28,"end":35,"id":5},{"text":"code","start":36,"end":40,"id":6},{"text":"remediation","start":41,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Security Engineer with CCSP certification, expert in Palo Alto.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":23,"end":27,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":53,"end":62,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1166627561,"_task_hash":-1527687981,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"CCSP","start":23,"end":27,"id":3},{"text":"certification","start":28,"end":41,"id":4},{"text":",","start":41,"end":42,"id":5},{"text":"expert","start":43,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Palo","start":53,"end":57,"id":8},{"text":"Alto","start":58,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} {"text":"Trained developers on SQL Injection prevention.","spans":[{"start":22,"end":35,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4},{"start":22,"end":35,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-793514009,"_task_hash":-710520270,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"SQL","start":22,"end":25,"id":3},{"text":"Injection","start":26,"end":35,"id":4},{"text":"prevention","start":36,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Project Manager needed for enterprise security team.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":706080161,"_task_hash":1449655778,"tokens":[{"text":"Project","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"needed","start":16,"end":22,"id":2},{"text":"for","start":23,"end":26,"id":3},{"text":"enterprise","start":27,"end":37,"id":4},{"text":"security","start":38,"end":46,"id":5},{"text":"team","start":47,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Tested WAF rules against Pass the Hash payloads.","spans":[{"start":25,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-826389357,"_task_hash":-1590323954,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Pass","start":25,"end":29,"id":4},{"text":"the","start":30,"end":33,"id":5},{"text":"Hash","start":34,"end":38,"id":6},{"text":"payloads","start":39,"end":47,"id":7},{"text":".","start":47,"end":48,"id":8}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"DORA familiarity needed.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":757810043,"_task_hash":-723281915,"tokens":[{"text":"DORA","start":0,"end":4,"id":0},{"text":"familiarity","start":5,"end":16,"id":1},{"text":"needed","start":17,"end":23,"id":2},{"text":".","start":23,"end":24,"id":3}]} {"text":"Coordinated with law enforcement on keylogger case.","spans":[{"start":36,"end":45,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-776489790,"_task_hash":1447095592,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"keylogger","start":36,"end":45,"id":5},{"text":"case","start":46,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Implemented controls to prevent keylogger attacks.","spans":[{"start":32,"end":41,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":244607377,"_task_hash":975576877,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"keylogger","start":32,"end":41,"id":4},{"text":"attacks","start":42,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Analyzed phishing campaign targeting financial sector.","spans":[{"start":9,"end":17,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1608768807,"_task_hash":235374129,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"phishing","start":9,"end":17,"id":1},{"text":"campaign","start":18,"end":26,"id":2},{"text":"targeting","start":27,"end":36,"id":3},{"text":"financial","start":37,"end":46,"id":4},{"text":"sector","start":47,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Deployed CASB across 500+ endpoints.","spans":[{"start":9,"end":13,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-906314657,"_task_hash":-1839124430,"tokens":[{"text":"Deployed","start":0,"end":8,"id":0},{"text":"CASB","start":9,"end":13,"id":1},{"text":"across","start":14,"end":20,"id":2},{"text":"500","start":21,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"endpoints","start":26,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} {"text":"ISO 31000 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1268929123,"_task_hash":-308243635,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"31000","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} {"text":"Presented GRC updates to leadership.","spans":[{"start":10,"end":13,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":36894152,"_task_hash":-1603072894,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"GRC","start":10,"end":13,"id":1},{"text":"updates","start":14,"end":21,"id":2},{"text":"to","start":22,"end":24,"id":3},{"text":"leadership","start":25,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"DevOps Specialist with hands-on experience in Splunk, QRadar, and Hardware Security.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":52,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":54,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":66,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":2133558625,"_task_hash":-166158615,"tokens":[{"text":"DevOps","start":0,"end":6,"id":0},{"text":"Specialist","start":7,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"hands","start":23,"end":28,"id":3},{"text":"-","start":28,"end":29,"id":4},{"text":"on","start":29,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Splunk","start":46,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"QRadar","start":54,"end":60,"id":10},{"text":",","start":60,"end":61,"id":11},{"text":"and","start":62,"end":65,"id":12},{"text":"Hardware","start":66,"end":74,"id":13},{"text":"Security","start":75,"end":83,"id":14},{"text":".","start":83,"end":84,"id":15}]} {"text":"Looking for Cloud Infrastructure Security Engineer to lead GCP Security initiatives.","spans":[{"start":12,"end":50,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":5},{"start":59,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-216465965,"_task_hash":-1457887004,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Cloud","start":12,"end":17,"id":2},{"text":"Infrastructure","start":18,"end":32,"id":3},{"text":"Security","start":33,"end":41,"id":4},{"text":"Engineer","start":42,"end":50,"id":5},{"text":"to","start":51,"end":53,"id":6},{"text":"lead","start":54,"end":58,"id":7},{"text":"GCP","start":59,"end":62,"id":8},{"text":"Security","start":63,"end":71,"id":9},{"text":"initiatives","start":72,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} {"text":"Full Stack Engineer with expertise in NIST Framework compliance and Crisis Communication operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":68,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":849453434,"_task_hash":529421689,"tokens":[{"text":"Full","start":0,"end":4,"id":0},{"text":"Stack","start":5,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"with","start":20,"end":24,"id":3},{"text":"expertise","start":25,"end":34,"id":4},{"text":"in","start":35,"end":37,"id":5},{"text":"NIST","start":38,"end":42,"id":6},{"text":"Framework","start":43,"end":52,"id":7},{"text":"compliance","start":53,"end":63,"id":8},{"text":"and","start":64,"end":67,"id":9},{"text":"Crisis","start":68,"end":74,"id":10},{"text":"Communication","start":75,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"Senior Application Security Specialist skilled in HTML/CSS, Network Basics, and Aqua Security.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":60,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":80,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1515207650,"_task_hash":190233893,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Application","start":7,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Specialist","start":28,"end":38,"id":3},{"text":"skilled","start":39,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"HTML","start":50,"end":54,"id":6},{"text":"/","start":54,"end":55,"id":7},{"text":"CSS","start":55,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"Network","start":60,"end":67,"id":10},{"text":"Basics","start":68,"end":74,"id":11},{"text":",","start":74,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"Aqua","start":80,"end":84,"id":14},{"text":"Security","start":85,"end":93,"id":15},{"text":".","start":93,"end":94,"id":16}]} {"text":"Accomplished Interface Designer specializing in Tailwind CSS and Network Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":2130861941,"_task_hash":1775570633,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Interface","start":13,"end":22,"id":1},{"text":"Designer","start":23,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Tailwind","start":48,"end":56,"id":5},{"text":"CSS","start":57,"end":60,"id":6},{"text":"and","start":61,"end":64,"id":7},{"text":"Network","start":65,"end":72,"id":8},{"text":"Security","start":73,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} {"text":"Required skills: ELK Stack, Angular, GDPR certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":37,"end":41,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-437432369,"_task_hash":1622779407,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Angular","start":28,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"GDPR","start":37,"end":41,"id":8},{"text":"certification","start":42,"end":55,"id":9},{"text":".","start":55,"end":56,"id":10}]} {"text":"Immediate opening for EDR Specialist.","spans":[{"start":22,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":175648082,"_task_hash":1666054489,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"EDR","start":22,"end":25,"id":3},{"text":"Specialist","start":26,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} {"text":"CCPA certification a plus.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-334892882,"_task_hash":116736472,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"certification","start":5,"end":18,"id":1},{"text":"a","start":19,"end":20,"id":2},{"text":"plus","start":21,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Experienced Mobile Engineer specializing in Supply Chain Security.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-202972423,"_task_hash":369480113,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Mobile","start":12,"end":18,"id":1},{"text":"Engineer","start":19,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Supply","start":44,"end":50,"id":5},{"text":"Chain","start":51,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} {"text":"CI/CD certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-209265102,"_task_hash":809721666,"tokens":[{"text":"CI","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"CD","start":3,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"We need a Fullstack Engineer skilled in Cross-Site Scripting prevention and DDoS analysis using EDR Tools.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":60,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":10},{"start":76,"end":80,"label":"THREAT_TYPE","answer":"accept","token_start":13,"token_end":13},{"start":96,"end":105,"label":"SECURITY_TOOL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":898948178,"_task_hash":-479030911,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Fullstack","start":10,"end":19,"id":3},{"text":"Engineer","start":20,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"Cross","start":40,"end":45,"id":7},{"text":"-","start":45,"end":46,"id":8},{"text":"Site","start":46,"end":50,"id":9},{"text":"Scripting","start":51,"end":60,"id":10},{"text":"prevention","start":61,"end":71,"id":11},{"text":"and","start":72,"end":75,"id":12},{"text":"DDoS","start":76,"end":80,"id":13},{"text":"analysis","start":81,"end":89,"id":14},{"text":"using","start":90,"end":95,"id":15},{"text":"EDR","start":96,"end":99,"id":16},{"text":"Tools","start":100,"end":105,"id":17},{"text":".","start":105,"end":106,"id":18}]} {"text":"Looking for Forensic Examiner to lead Embedded Systems Security initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":38,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":260761350,"_task_hash":1224072780,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Forensic","start":12,"end":20,"id":2},{"text":"Examiner","start":21,"end":29,"id":3},{"text":"to","start":30,"end":32,"id":4},{"text":"lead","start":33,"end":37,"id":5},{"text":"Embedded","start":38,"end":46,"id":6},{"text":"Systems","start":47,"end":54,"id":7},{"text":"Security","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} {"text":"Implemented workaround for CVE-2019-11510 until patch available.","spans":[{"start":27,"end":41,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1094730520,"_task_hash":-1954516033,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2019","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"11510","start":36,"end":41,"id":5},{"text":"until","start":42,"end":47,"id":6},{"text":"patch","start":48,"end":53,"id":7},{"text":"available","start":54,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} {"text":"Technical Support Analyst needed for enterprise security team.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":771622953,"_task_hash":506712017,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"needed","start":26,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"enterprise","start":37,"end":47,"id":5},{"text":"security","start":48,"end":56,"id":6},{"text":"team","start":57,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} {"text":"Immediate opening for Digital Forensics Investigator.","spans":[{"start":22,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":856227505,"_task_hash":577843495,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Digital","start":22,"end":29,"id":3},{"text":"Forensics","start":30,"end":39,"id":4},{"text":"Investigator","start":40,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Built Mobile Security team from ground up.","spans":[{"start":6,"end":21,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1984426321,"_task_hash":1532027191,"tokens":[{"text":"Built","start":0,"end":5,"id":0},{"text":"Mobile","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"team","start":22,"end":26,"id":3},{"text":"from","start":27,"end":31,"id":4},{"text":"ground","start":32,"end":38,"id":5},{"text":"up","start":39,"end":41,"id":6},{"text":".","start":41,"end":42,"id":7}]} {"text":"Looking for Game Engineer to lead Service Mesh Security initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-75876538,"_task_hash":-458552846,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Game","start":12,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":"Mesh","start":42,"end":46,"id":7},{"text":"Security","start":47,"end":55,"id":8},{"text":"initiatives","start":56,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} {"text":"Join our team as Code Reviewer!","spans":[{"start":17,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-303263246,"_task_hash":-1155987550,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Code","start":17,"end":21,"id":4},{"text":"Reviewer","start":22,"end":30,"id":5},{"text":"!","start":30,"end":31,"id":6}]} {"text":"Analyzed rootkit campaign targeting financial sector.","spans":[{"start":9,"end":16,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-100632751,"_task_hash":55818038,"tokens":[{"text":"Analyzed","start":0,"end":8,"id":0},{"text":"rootkit","start":9,"end":16,"id":1},{"text":"campaign","start":17,"end":25,"id":2},{"text":"targeting","start":26,"end":35,"id":3},{"text":"financial","start":36,"end":45,"id":4},{"text":"sector","start":46,"end":52,"id":5},{"text":".","start":52,"end":53,"id":6}]} {"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Experienced Web Developer specializing in Cloud Security Testing.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":42,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":420771155,"_task_hash":602096835,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Web","start":12,"end":15,"id":1},{"text":"Developer","start":16,"end":25,"id":2},{"text":"specializing","start":26,"end":38,"id":3},{"text":"in","start":39,"end":41,"id":4},{"text":"Cloud","start":42,"end":47,"id":5},{"text":"Security","start":48,"end":56,"id":6},{"text":"Testing","start":57,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} {"text":"SOC 2 required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-777344063,"_task_hash":-1318550929,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"required","start":6,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Developed detection for Token Impersonation attacks.","spans":[{"start":24,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4},{"start":24,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1433464450,"_task_hash":699898646,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Token","start":24,"end":29,"id":3},{"text":"Impersonation","start":30,"end":43,"id":4},{"text":"attacks","start":44,"end":51,"id":5},{"text":".","start":51,"end":52,"id":6}]} {"text":"Join our team as Data Analyst!","spans":[{"start":17,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":2008813529,"_task_hash":1611981623,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Data","start":17,"end":21,"id":4},{"text":"Analyst","start":22,"end":29,"id":5},{"text":"!","start":29,"end":30,"id":6}]} {"text":"Immediate opening for Back\u2011End Developer.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-966243897,"_task_hash":-1097660260,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Back\u2011End","start":22,"end":30,"id":3},{"text":"Developer","start":31,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} {"text":"ROS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-573523661,"_task_hash":-1060764557,"tokens":[{"text":"ROS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Must know Splunk, EDR Tools, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":108323573,"_task_hash":-1100991907,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"EDR","start":18,"end":21,"id":4},{"text":"Tools","start":22,"end":27,"id":5},{"text":",","start":27,"end":28,"id":6},{"text":"and","start":29,"end":32,"id":7},{"text":"NIST","start":33,"end":37,"id":8},{"text":"Framework","start":38,"end":47,"id":9},{"text":".","start":47,"end":48,"id":10}]} {"text":"Lead Asset Manager managing Vendor Management and AI Policy initiatives.","spans":[{"start":5,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":50,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1407350326,"_task_hash":-2103742763,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Asset","start":5,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"managing","start":19,"end":27,"id":3},{"text":"Vendor","start":28,"end":34,"id":4},{"text":"Management","start":35,"end":45,"id":5},{"text":"and","start":46,"end":49,"id":6},{"text":"AI","start":50,"end":52,"id":7},{"text":"Policy","start":53,"end":59,"id":8},{"text":"initiatives","start":60,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} {"text":"Lead Cloud Native Security Engineer managing Privacy Engineering and Product Vision initiatives.","spans":[{"start":5,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":45,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-538200637,"_task_hash":656489754,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cloud","start":5,"end":10,"id":1},{"text":"Native","start":11,"end":17,"id":2},{"text":"Security","start":18,"end":26,"id":3},{"text":"Engineer","start":27,"end":35,"id":4},{"text":"managing","start":36,"end":44,"id":5},{"text":"Privacy","start":45,"end":52,"id":6},{"text":"Engineering","start":53,"end":64,"id":7},{"text":"and","start":65,"end":68,"id":8},{"text":"Product","start":69,"end":76,"id":9},{"text":"Vision","start":77,"end":83,"id":10},{"text":"initiatives","start":84,"end":95,"id":11},{"text":".","start":95,"end":96,"id":12}]} {"text":"Experienced Program Manager specializing in Aqua Security.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1795557671,"_task_hash":-1024332173,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Program","start":12,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Aqua","start":44,"end":48,"id":5},{"text":"Security","start":49,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"SOC Analyst with CISA certification, expert in YARA.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":21,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":47,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-474499939,"_task_hash":681555963,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"CISA","start":17,"end":21,"id":3},{"text":"certification","start":22,"end":35,"id":4},{"text":",","start":35,"end":36,"id":5},{"text":"expert","start":37,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"YARA","start":47,"end":51,"id":8},{"text":".","start":51,"end":52,"id":9}]} {"text":"Detected Token Impersonation attack in production environment.","spans":[{"start":9,"end":28,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-388079787,"_task_hash":17110116,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Token","start":9,"end":14,"id":1},{"text":"Impersonation","start":15,"end":28,"id":2},{"text":"attack","start":29,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"production","start":39,"end":49,"id":5},{"text":"environment","start":50,"end":61,"id":6},{"text":".","start":61,"end":62,"id":7}]} {"text":"Proficient in QRadar and Splunk.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-633501333,"_task_hash":-1852513846,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"QRadar","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Splunk","start":25,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Led Security Architecture initiatives across organization.","spans":[{"start":4,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2},{"start":4,"end":25,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":898800724,"_task_hash":425808389,"tokens":[{"text":"Led","start":0,"end":3,"id":0},{"text":"Security","start":4,"end":12,"id":1},{"text":"Architecture","start":13,"end":25,"id":2},{"text":"initiatives","start":26,"end":37,"id":3},{"text":"across","start":38,"end":44,"id":4},{"text":"organization","start":45,"end":57,"id":5},{"text":".","start":57,"end":58,"id":6}]} {"text":"Recovered systems after keylogger attack.","spans":[{"start":24,"end":33,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1119024897,"_task_hash":1746039746,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"keylogger","start":24,"end":33,"id":3},{"text":"attack","start":34,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} {"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"AI UX certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":488350115,"_task_hash":-1406348696,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"UX","start":3,"end":5,"id":1},{"text":"certified","start":6,"end":15,"id":2},{"text":".","start":15,"end":16,"id":3}]} {"text":"Holds MITRE ATT&CK certification.","spans":[{"start":6,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1699214375,"_task_hash":-441446302,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"MITRE","start":6,"end":11,"id":1},{"text":"ATT&CK","start":12,"end":18,"id":2},{"text":"certification","start":19,"end":32,"id":3},{"text":".","start":32,"end":33,"id":4}]} {"text":"FERPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1817666216,"_task_hash":1295086938,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Specialized in Incident Response for enterprise environments.","spans":[{"start":15,"end":32,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1873862941,"_task_hash":-1628357320,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Incident","start":15,"end":23,"id":2},{"text":"Response","start":24,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"enterprise","start":37,"end":47,"id":5},{"text":"environments","start":48,"end":60,"id":6},{"text":".","start":60,"end":61,"id":7}]} {"text":"Implemented controls to prevent brute force attacks.","spans":[{"start":32,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":88578714,"_task_hash":-1098963429,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"controls","start":12,"end":20,"id":1},{"text":"to","start":21,"end":23,"id":2},{"text":"prevent","start":24,"end":31,"id":3},{"text":"brute","start":32,"end":37,"id":4},{"text":"force","start":38,"end":43,"id":5},{"text":"attacks","start":44,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Security Awareness Trainer opportunity: Lead Container Security program, implement NIST Framework, manage Physics operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":83,"end":97,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":106,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":6344371,"_task_hash":830775882,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Trainer","start":19,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Container","start":45,"end":54,"id":6},{"text":"Security","start":55,"end":63,"id":7},{"text":"program","start":64,"end":71,"id":8},{"text":",","start":71,"end":72,"id":9},{"text":"implement","start":73,"end":82,"id":10},{"text":"NIST","start":83,"end":87,"id":11},{"text":"Framework","start":88,"end":97,"id":12},{"text":",","start":97,"end":98,"id":13},{"text":"manage","start":99,"end":105,"id":14},{"text":"Physics","start":106,"end":113,"id":15},{"text":"operations","start":114,"end":124,"id":16},{"text":".","start":124,"end":125,"id":17}]} {"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"Holds CCPA certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1889162723,"_task_hash":1781085210,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Required skills: Splunk, Zero Trust, JIRA certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":37,"end":41,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1941030839,"_task_hash":-1384734454,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Zero","start":25,"end":29,"id":5},{"text":"Trust","start":30,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"JIRA","start":37,"end":41,"id":8},{"text":"certification","start":42,"end":55,"id":9},{"text":".","start":55,"end":56,"id":10}]} {"text":"Security Awareness Trainer with hands-on experience in SIEM Operations, SIEM, and Container Security.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":55,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":82,"end":100,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1591766218,"_task_hash":-370938398,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Awareness","start":9,"end":18,"id":1},{"text":"Trainer","start":19,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"hands","start":32,"end":37,"id":4},{"text":"-","start":37,"end":38,"id":5},{"text":"on","start":38,"end":40,"id":6},{"text":"experience","start":41,"end":51,"id":7},{"text":"in","start":52,"end":54,"id":8},{"text":"SIEM","start":55,"end":59,"id":9},{"text":"Operations","start":60,"end":70,"id":10},{"text":",","start":70,"end":71,"id":11},{"text":"SIEM","start":72,"end":76,"id":12},{"text":",","start":76,"end":77,"id":13},{"text":"and","start":78,"end":81,"id":14},{"text":"Container","start":82,"end":91,"id":15},{"text":"Security","start":92,"end":100,"id":16},{"text":".","start":100,"end":101,"id":17}]} {"text":"Responsible for SSL operations and maintenance.","spans":[{"start":16,"end":19,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":524133717,"_task_hash":1190213048,"tokens":[{"text":"Responsible","start":0,"end":11,"id":0},{"text":"for","start":12,"end":15,"id":1},{"text":"SSL","start":16,"end":19,"id":2},{"text":"operations","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"maintenance","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"GDPR compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":1469293597,"_task_hash":-1966140726,"tokens":[{"text":"GDPR","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Join our team as AI Robotics Engineer!","spans":[{"start":17,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":589372933,"_task_hash":-1476198737,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"AI","start":17,"end":19,"id":4},{"text":"Robotics","start":20,"end":28,"id":5},{"text":"Engineer","start":29,"end":37,"id":6},{"text":"!","start":37,"end":38,"id":7}]} {"text":"Performed Business Impact Analysis for SOC 2 certification.","spans":[{"start":10,"end":34,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":270101937,"_task_hash":-2082248235,"tokens":[{"text":"Performed","start":0,"end":9,"id":0},{"text":"Business","start":10,"end":18,"id":1},{"text":"Impact","start":19,"end":25,"id":2},{"text":"Analysis","start":26,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"SOC","start":39,"end":42,"id":5},{"text":"2","start":43,"end":44,"id":6},{"text":"certification","start":45,"end":58,"id":7},{"text":".","start":58,"end":59,"id":8}]} {"text":"Release Manager experienced in detecting adware attacks using Splunk.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-288890557,"_task_hash":-1953510225,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"experienced","start":16,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"detecting","start":31,"end":40,"id":4},{"text":"adware","start":41,"end":47,"id":5},{"text":"attacks","start":48,"end":55,"id":6},{"text":"using","start":56,"end":61,"id":7},{"text":"Splunk","start":62,"end":68,"id":8},{"text":".","start":68,"end":69,"id":9}]} {"text":"Senior Cyber Risk Insurance Specialist skilled in Responsible AI, Routing, and Security Standards.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":50,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":66,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":79,"end":97,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1717206420,"_task_hash":1632872152,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Risk","start":13,"end":17,"id":2},{"text":"Insurance","start":18,"end":27,"id":3},{"text":"Specialist","start":28,"end":38,"id":4},{"text":"skilled","start":39,"end":46,"id":5},{"text":"in","start":47,"end":49,"id":6},{"text":"Responsible","start":50,"end":61,"id":7},{"text":"AI","start":62,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"Routing","start":66,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Security","start":79,"end":87,"id":13},{"text":"Standards","start":88,"end":97,"id":14},{"text":".","start":97,"end":98,"id":15}]} {"text":"Phishing Defense Expert opportunity: Lead Security Scanning program, implement NIST Framework, manage Test Data Management operations.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":59,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":79,"end":93,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":102,"end":122,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":311266846,"_task_hash":666816200,"tokens":[{"text":"Phishing","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Expert","start":17,"end":23,"id":2},{"text":"opportunity","start":24,"end":35,"id":3},{"text":":","start":35,"end":36,"id":4},{"text":"Lead","start":37,"end":41,"id":5},{"text":"Security","start":42,"end":50,"id":6},{"text":"Scanning","start":51,"end":59,"id":7},{"text":"program","start":60,"end":67,"id":8},{"text":",","start":67,"end":68,"id":9},{"text":"implement","start":69,"end":78,"id":10},{"text":"NIST","start":79,"end":83,"id":11},{"text":"Framework","start":84,"end":93,"id":12},{"text":",","start":93,"end":94,"id":13},{"text":"manage","start":95,"end":101,"id":14},{"text":"Test","start":102,"end":106,"id":15},{"text":"Data","start":107,"end":111,"id":16},{"text":"Management","start":112,"end":122,"id":17},{"text":"operations","start":123,"end":133,"id":18},{"text":".","start":133,"end":134,"id":19}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"FERPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1817666216,"_task_hash":1295086938,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Seeking Threat Intelligence Hunter with 5++ years experience in URL Analysis and Forensics.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":81,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1409591500,"_task_hash":1188314647,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Intelligence","start":15,"end":27,"id":2},{"text":"Hunter","start":28,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"URL","start":64,"end":67,"id":9},{"text":"Analysis","start":68,"end":76,"id":10},{"text":"and","start":77,"end":80,"id":11},{"text":"Forensics","start":81,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} {"text":"Insider Threat Specialist with 5+ years experience in Budget Management, Intrusion Detection, and Push Notifications.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":73,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":98,"end":116,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-743282,"_task_hash":-749846899,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Specialist","start":15,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"5","start":31,"end":32,"id":4},{"text":"+","start":32,"end":33,"id":5},{"text":"years","start":34,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"Budget","start":54,"end":60,"id":9},{"text":"Management","start":61,"end":71,"id":10},{"text":",","start":71,"end":72,"id":11},{"text":"Intrusion","start":73,"end":82,"id":12},{"text":"Detection","start":83,"end":92,"id":13},{"text":",","start":92,"end":93,"id":14},{"text":"and","start":94,"end":97,"id":15},{"text":"Push","start":98,"end":102,"id":16},{"text":"Notifications","start":103,"end":116,"id":17},{"text":".","start":116,"end":117,"id":18}]} {"text":"Security Compliance Analyst professional with 7+ years implementing Metasploit and managing Performance Management programs.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":68,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":114,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-706180355,"_task_hash":596904673,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Compliance","start":9,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"professional","start":28,"end":40,"id":3},{"text":"with","start":41,"end":45,"id":4},{"text":"7","start":46,"end":47,"id":5},{"text":"+","start":47,"end":48,"id":6},{"text":"years","start":49,"end":54,"id":7},{"text":"implementing","start":55,"end":67,"id":8},{"text":"Metasploit","start":68,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"Performance","start":92,"end":103,"id":12},{"text":"Management","start":104,"end":114,"id":13},{"text":"programs","start":115,"end":123,"id":14},{"text":".","start":123,"end":124,"id":15}]} {"text":"Created YARA rules for Remote Code Execution detection.","spans":[{"start":23,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6},{"start":23,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1488067284,"_task_hash":2026853257,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"Remote","start":23,"end":29,"id":4},{"text":"Code","start":30,"end":34,"id":5},{"text":"Execution","start":35,"end":44,"id":6},{"text":"detection","start":45,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Developed Security Operations strategy and roadmap.","spans":[{"start":10,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":941789380,"_task_hash":-877747243,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Security","start":10,"end":18,"id":1},{"text":"Operations","start":19,"end":29,"id":2},{"text":"strategy","start":30,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"roadmap","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"SOX familiarity needed.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-283668640,"_task_hash":389148770,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"familiarity","start":4,"end":15,"id":1},{"text":"needed","start":16,"end":22,"id":2},{"text":".","start":22,"end":23,"id":3}]} {"text":"Certified JIRA working as Pen Tester, focused on ML Pipeline Security and SQL Injection prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":49,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11},{"start":74,"end":87,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":359784579,"_task_hash":160247376,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"JIRA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Pen","start":26,"end":29,"id":4},{"text":"Tester","start":30,"end":36,"id":5},{"text":",","start":36,"end":37,"id":6},{"text":"focused","start":38,"end":45,"id":7},{"text":"on","start":46,"end":48,"id":8},{"text":"ML","start":49,"end":51,"id":9},{"text":"Pipeline","start":52,"end":60,"id":10},{"text":"Security","start":61,"end":69,"id":11},{"text":"and","start":70,"end":73,"id":12},{"text":"SQL","start":74,"end":77,"id":13},{"text":"Injection","start":78,"end":87,"id":14},{"text":"prevention","start":88,"end":98,"id":15},{"text":".","start":98,"end":99,"id":16}]} {"text":"Mentored junior engineers in Security Awareness.","spans":[{"start":29,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5},{"start":29,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-2100645339,"_task_hash":-503299337,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"Security","start":29,"end":37,"id":4},{"text":"Awareness","start":38,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Certified SABSA working as Incident Response Manager, focused on Service Mesh Security and SSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":52,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":65,"end":86,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":91,"end":95,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-481681192,"_task_hash":-1466375373,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Incident","start":27,"end":35,"id":4},{"text":"Response","start":36,"end":44,"id":5},{"text":"Manager","start":45,"end":52,"id":6},{"text":",","start":52,"end":53,"id":7},{"text":"focused","start":54,"end":61,"id":8},{"text":"on","start":62,"end":64,"id":9},{"text":"Service","start":65,"end":72,"id":10},{"text":"Mesh","start":73,"end":77,"id":11},{"text":"Security","start":78,"end":86,"id":12},{"text":"and","start":87,"end":90,"id":13},{"text":"SSRF","start":91,"end":95,"id":14},{"text":"prevention","start":96,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"C/C++ certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1361516636,"_task_hash":-1118922725,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} {"text":"Senior Cloud Architect position: 7 years minimum, expert in Manual Testing, Design Patterns, and Cloud Security.","spans":[{"start":7,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":60,"end":74,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":76,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":97,"end":111,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1536239737,"_task_hash":-1362230128,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Architect","start":13,"end":22,"id":2},{"text":"position","start":23,"end":31,"id":3},{"text":":","start":31,"end":32,"id":4},{"text":"7","start":33,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"minimum","start":41,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"expert","start":50,"end":56,"id":9},{"text":"in","start":57,"end":59,"id":10},{"text":"Manual","start":60,"end":66,"id":11},{"text":"Testing","start":67,"end":74,"id":12},{"text":",","start":74,"end":75,"id":13},{"text":"Design","start":76,"end":82,"id":14},{"text":"Patterns","start":83,"end":91,"id":15},{"text":",","start":91,"end":92,"id":16},{"text":"and","start":93,"end":96,"id":17},{"text":"Cloud","start":97,"end":102,"id":18},{"text":"Security","start":103,"end":111,"id":19},{"text":".","start":111,"end":112,"id":20}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Experienced ML Platform Engineer specializing in Physical Security.","spans":[{"start":12,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":49,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":772704038,"_task_hash":-1399766462,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"ML","start":12,"end":14,"id":1},{"text":"Platform","start":15,"end":23,"id":2},{"text":"Engineer","start":24,"end":32,"id":3},{"text":"specializing","start":33,"end":45,"id":4},{"text":"in","start":46,"end":48,"id":5},{"text":"Physical","start":49,"end":57,"id":6},{"text":"Security","start":58,"end":66,"id":7},{"text":".","start":66,"end":67,"id":8}]} {"text":"Immediate opening for Cloud Security Engineer.","spans":[{"start":22,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1894479724,"_task_hash":-67184772,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Cloud","start":22,"end":27,"id":3},{"text":"Security","start":28,"end":36,"id":4},{"text":"Engineer","start":37,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Accomplished Malware Specialist specializing in Model Explainability and Hardware Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-2015782288,"_task_hash":-969295417,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Malware","start":13,"end":20,"id":1},{"text":"Specialist","start":21,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Model","start":48,"end":53,"id":5},{"text":"Explainability","start":54,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"Hardware","start":73,"end":81,"id":8},{"text":"Security","start":82,"end":90,"id":9},{"text":".","start":90,"end":91,"id":10}]} {"text":"Senior Threat Detection Specialist position: 3 years minimum, expert in IOC Analysis, Privacy Engineering, and Security Awareness Platforms.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":72,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":111,"end":139,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-2096425349,"_task_hash":1140006178,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Threat","start":7,"end":13,"id":1},{"text":"Detection","start":14,"end":23,"id":2},{"text":"Specialist","start":24,"end":34,"id":3},{"text":"position","start":35,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"3","start":45,"end":46,"id":6},{"text":"years","start":47,"end":52,"id":7},{"text":"minimum","start":53,"end":60,"id":8},{"text":",","start":60,"end":61,"id":9},{"text":"expert","start":62,"end":68,"id":10},{"text":"in","start":69,"end":71,"id":11},{"text":"IOC","start":72,"end":75,"id":12},{"text":"Analysis","start":76,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"Privacy","start":86,"end":93,"id":15},{"text":"Engineering","start":94,"end":105,"id":16},{"text":",","start":105,"end":106,"id":17},{"text":"and","start":107,"end":110,"id":18},{"text":"Security","start":111,"end":119,"id":19},{"text":"Awareness","start":120,"end":129,"id":20},{"text":"Platforms","start":130,"end":139,"id":21},{"text":".","start":139,"end":140,"id":22}]} {"text":"Hiring Analytics Specialist for Software Installation and Supply Chain Attack detection.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":77,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":970819012,"_task_hash":1420049342,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Analytics","start":7,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"Software","start":32,"end":40,"id":4},{"text":"Installation","start":41,"end":53,"id":5},{"text":"and","start":54,"end":57,"id":6},{"text":"Supply","start":58,"end":64,"id":7},{"text":"Chain","start":65,"end":70,"id":8},{"text":"Attack","start":71,"end":77,"id":9},{"text":"detection","start":78,"end":87,"id":10},{"text":".","start":87,"end":88,"id":11}]} {"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} {"text":"OSINT certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1903586176,"_task_hash":1692638379,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Accomplished Threat Intelligence Hunter specializing in Vulnerability Assessment and Terraform Security.","spans":[{"start":13,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":85,"end":103,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1745880332,"_task_hash":1604527215,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Threat","start":13,"end":19,"id":1},{"text":"Intelligence","start":20,"end":32,"id":2},{"text":"Hunter","start":33,"end":39,"id":3},{"text":"specializing","start":40,"end":52,"id":4},{"text":"in","start":53,"end":55,"id":5},{"text":"Vulnerability","start":56,"end":69,"id":6},{"text":"Assessment","start":70,"end":80,"id":7},{"text":"and","start":81,"end":84,"id":8},{"text":"Terraform","start":85,"end":94,"id":9},{"text":"Security","start":95,"end":103,"id":10},{"text":".","start":103,"end":104,"id":11}]} {"text":"Expert in HIPAA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-768324278,"_task_hash":-2027532621,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"HIPAA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Troubleshot BAS performance issues.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":49368041,"_task_hash":2135838847,"tokens":[{"text":"Troubleshot","start":0,"end":11,"id":0},{"text":"BAS","start":12,"end":15,"id":1},{"text":"performance","start":16,"end":27,"id":2},{"text":"issues","start":28,"end":34,"id":3},{"text":".","start":34,"end":35,"id":4}]} {"text":"Implemented Security Awareness controls and monitoring.","spans":[{"start":12,"end":30,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":394745352,"_task_hash":-406592375,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Awareness","start":21,"end":30,"id":2},{"text":"controls","start":31,"end":39,"id":3},{"text":"and","start":40,"end":43,"id":4},{"text":"monitoring","start":44,"end":54,"id":5},{"text":".","start":54,"end":55,"id":6}]} {"text":"Experienced IAM Engineer specializing in Cloud Security.","spans":[{"start":12,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":308036260,"_task_hash":1313167417,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IAM","start":12,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"specializing","start":25,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Cloud","start":41,"end":46,"id":5},{"text":"Security","start":47,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Created YARA rules for DCSync detection.","spans":[{"start":23,"end":29,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-432467484,"_task_hash":-372008101,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"DCSync","start":23,"end":29,"id":4},{"text":"detection","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"DevSecOps Engineer with GSEC certification, expert in BloodHound.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":804631575,"_task_hash":-877241366,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"GSEC","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"BloodHound","start":54,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Technology Manager experienced in detecting malware attacks using SIEM.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":51,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":66,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1997542697,"_task_hash":106803307,"tokens":[{"text":"Technology","start":0,"end":10,"id":0},{"text":"Manager","start":11,"end":18,"id":1},{"text":"experienced","start":19,"end":30,"id":2},{"text":"in","start":31,"end":33,"id":3},{"text":"detecting","start":34,"end":43,"id":4},{"text":"malware","start":44,"end":51,"id":5},{"text":"attacks","start":52,"end":59,"id":6},{"text":"using","start":60,"end":65,"id":7},{"text":"SIEM","start":66,"end":70,"id":8},{"text":".","start":70,"end":71,"id":9}]} {"text":"Seeking AI Policy Specialist with 10++ years experience in Coordination and iOS.","spans":[{"start":8,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":59,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":76,"end":79,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1255878049,"_task_hash":1919005314,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"AI","start":8,"end":10,"id":1},{"text":"Policy","start":11,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"with","start":29,"end":33,"id":4},{"text":"10++","start":34,"end":38,"id":5},{"text":"years","start":39,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Coordination","start":59,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"iOS","start":76,"end":79,"id":11},{"text":".","start":79,"end":80,"id":12}]} {"text":"Mitigated Token Impersonation through code remediation.","spans":[{"start":10,"end":29,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1510689009,"_task_hash":1253303543,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"Token","start":10,"end":15,"id":1},{"text":"Impersonation","start":16,"end":29,"id":2},{"text":"through","start":30,"end":37,"id":3},{"text":"code","start":38,"end":42,"id":4},{"text":"remediation","start":43,"end":54,"id":5},{"text":".","start":54,"end":55,"id":6}]} {"text":"Proficient in ELK Stack and QRadar.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1812074326,"_task_hash":1840171177,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"ELK","start":14,"end":17,"id":2},{"text":"Stack","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"QRadar","start":28,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"Detected Buffer Overflow attack in production environment.","spans":[{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1102604268,"_task_hash":-1374790459,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Buffer","start":9,"end":15,"id":1},{"text":"Overflow","start":16,"end":24,"id":2},{"text":"attack","start":25,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"production","start":35,"end":45,"id":5},{"text":"environment","start":46,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Required: ISO 27001, Splunk, and OWASP Top 10 expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1414132839,"_task_hash":-178267023,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"27001","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"Splunk","start":21,"end":27,"id":5},{"text":",","start":27,"end":28,"id":6},{"text":"and","start":29,"end":32,"id":7},{"text":"OWASP","start":33,"end":38,"id":8},{"text":"Top","start":39,"end":42,"id":9},{"text":"10","start":43,"end":45,"id":10},{"text":"expertise","start":46,"end":55,"id":11},{"text":".","start":55,"end":56,"id":12}]} {"text":"Hardware Engineer with expertise in NIST Framework compliance and Angular operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":128705276,"_task_hash":-295976460,"tokens":[{"text":"Hardware","start":0,"end":8,"id":0},{"text":"Engineer","start":9,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"expertise","start":23,"end":32,"id":3},{"text":"in","start":33,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"compliance","start":51,"end":61,"id":7},{"text":"and","start":62,"end":65,"id":8},{"text":"Angular","start":66,"end":73,"id":9},{"text":"operations","start":74,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Required: NLP, SIEM, and OWASP Top 10 expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":25,"end":37,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-945115777,"_task_hash":-1503398717,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"NLP","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"SIEM","start":15,"end":19,"id":4},{"text":",","start":19,"end":20,"id":5},{"text":"and","start":21,"end":24,"id":6},{"text":"OWASP","start":25,"end":30,"id":7},{"text":"Top","start":31,"end":34,"id":8},{"text":"10","start":35,"end":37,"id":9},{"text":"expertise","start":38,"end":47,"id":10},{"text":".","start":47,"end":48,"id":11}]} {"text":"Detected Process Hollowing attack in production environment.","spans":[{"start":9,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1391372051,"_task_hash":-1264202460,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"Process","start":9,"end":16,"id":1},{"text":"Hollowing","start":17,"end":26,"id":2},{"text":"attack","start":27,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"production","start":37,"end":47,"id":5},{"text":"environment","start":48,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Looking for Security Training Coordinator to lead Enterprise Security initiatives.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":50,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":131260253,"_task_hash":-1468792356,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Training","start":21,"end":29,"id":3},{"text":"Coordinator","start":30,"end":41,"id":4},{"text":"to","start":42,"end":44,"id":5},{"text":"lead","start":45,"end":49,"id":6},{"text":"Enterprise","start":50,"end":60,"id":7},{"text":"Security","start":61,"end":69,"id":8},{"text":"initiatives","start":70,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} {"text":"Robotic Systems Engineer professional with 5+ years implementing SIEM and managing Edge Computing programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":65,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":83,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1678579251,"_task_hash":540349856,"tokens":[{"text":"Robotic","start":0,"end":7,"id":0},{"text":"Systems","start":8,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"professional","start":25,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"5","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"implementing","start":52,"end":64,"id":8},{"text":"SIEM","start":65,"end":69,"id":9},{"text":"and","start":70,"end":73,"id":10},{"text":"managing","start":74,"end":82,"id":11},{"text":"Edge","start":83,"end":87,"id":12},{"text":"Computing","start":88,"end":97,"id":13},{"text":"programs","start":98,"end":106,"id":14},{"text":".","start":106,"end":107,"id":15}]} {"text":"Assessed Red Team maturity using industry frameworks.","spans":[{"start":9,"end":17,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1069417497,"_task_hash":269473508,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"Red","start":9,"end":12,"id":1},{"text":"Team","start":13,"end":17,"id":2},{"text":"maturity","start":18,"end":26,"id":3},{"text":"using","start":27,"end":32,"id":4},{"text":"industry","start":33,"end":41,"id":5},{"text":"frameworks","start":42,"end":52,"id":6},{"text":".","start":52,"end":53,"id":7}]} {"text":"Recovered systems after hacktivist attack.","spans":[{"start":24,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":568568417,"_task_hash":2142149297,"tokens":[{"text":"Recovered","start":0,"end":9,"id":0},{"text":"systems","start":10,"end":17,"id":1},{"text":"after","start":18,"end":23,"id":2},{"text":"hacktivist","start":24,"end":34,"id":3},{"text":"attack","start":35,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"OSINT required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1609453577,"_task_hash":-644759626,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Tracked Advanced Persistent Threat group activities and TTPs.","spans":[{"start":8,"end":34,"label":"THREAT_TYPE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-251961694,"_task_hash":895483691,"tokens":[{"text":"Tracked","start":0,"end":7,"id":0},{"text":"Advanced","start":8,"end":16,"id":1},{"text":"Persistent","start":17,"end":27,"id":2},{"text":"Threat","start":28,"end":34,"id":3},{"text":"group","start":35,"end":40,"id":4},{"text":"activities","start":41,"end":51,"id":5},{"text":"and","start":52,"end":55,"id":6},{"text":"TTPs","start":56,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} {"text":"Security Vulnerability Analyst opportunity: Lead Model Security program, implement OWASP Top 10, manage Graphics operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":83,"end":95,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":104,"end":112,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-394145972,"_task_hash":-1634261333,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"opportunity","start":31,"end":42,"id":3},{"text":":","start":42,"end":43,"id":4},{"text":"Lead","start":44,"end":48,"id":5},{"text":"Model","start":49,"end":54,"id":6},{"text":"Security","start":55,"end":63,"id":7},{"text":"program","start":64,"end":71,"id":8},{"text":",","start":71,"end":72,"id":9},{"text":"implement","start":73,"end":82,"id":10},{"text":"OWASP","start":83,"end":88,"id":11},{"text":"Top","start":89,"end":92,"id":12},{"text":"10","start":93,"end":95,"id":13},{"text":",","start":95,"end":96,"id":14},{"text":"manage","start":97,"end":103,"id":15},{"text":"Graphics","start":104,"end":112,"id":16},{"text":"operations","start":113,"end":123,"id":17},{"text":".","start":123,"end":124,"id":18}]} {"text":"iOS Developer opportunity: Lead Security Design program, implement OWASP Top 10, manage Research Ethics operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6},{"start":67,"end":79,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":88,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-517852909,"_task_hash":-1825586720,"tokens":[{"text":"iOS","start":0,"end":3,"id":0},{"text":"Developer","start":4,"end":13,"id":1},{"text":"opportunity","start":14,"end":25,"id":2},{"text":":","start":25,"end":26,"id":3},{"text":"Lead","start":27,"end":31,"id":4},{"text":"Security","start":32,"end":40,"id":5},{"text":"Design","start":41,"end":47,"id":6},{"text":"program","start":48,"end":55,"id":7},{"text":",","start":55,"end":56,"id":8},{"text":"implement","start":57,"end":66,"id":9},{"text":"OWASP","start":67,"end":72,"id":10},{"text":"Top","start":73,"end":76,"id":11},{"text":"10","start":77,"end":79,"id":12},{"text":",","start":79,"end":80,"id":13},{"text":"manage","start":81,"end":87,"id":14},{"text":"Research","start":88,"end":96,"id":15},{"text":"Ethics","start":97,"end":103,"id":16},{"text":"operations","start":104,"end":114,"id":17},{"text":".","start":114,"end":115,"id":18}]} {"text":"Documented Pass the Hash attack chain for threat intel.","spans":[{"start":11,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1830549097,"_task_hash":-1349501084,"tokens":[{"text":"Documented","start":0,"end":10,"id":0},{"text":"Pass","start":11,"end":15,"id":1},{"text":"the","start":16,"end":19,"id":2},{"text":"Hash","start":20,"end":24,"id":3},{"text":"attack","start":25,"end":31,"id":4},{"text":"chain","start":32,"end":37,"id":5},{"text":"for","start":38,"end":41,"id":6},{"text":"threat","start":42,"end":48,"id":7},{"text":"intel","start":49,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} {"text":"Lead Cloud Solutions Architect managing Control Frameworks and Insider Threat Programs initiatives.","spans":[{"start":5,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-123270303,"_task_hash":-1195310998,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cloud","start":5,"end":10,"id":1},{"text":"Solutions","start":11,"end":20,"id":2},{"text":"Architect","start":21,"end":30,"id":3},{"text":"managing","start":31,"end":39,"id":4},{"text":"Control","start":40,"end":47,"id":5},{"text":"Frameworks","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Insider","start":63,"end":70,"id":8},{"text":"Threat","start":71,"end":77,"id":9},{"text":"Programs","start":78,"end":86,"id":10},{"text":"initiatives","start":87,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} {"text":"Seeking Industrial IoT Security Specialist with 10++ years experience in Post-Quantum Cryptography and Hardware Integration.","spans":[{"start":8,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":73,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":13},{"start":103,"end":123,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1212454559,"_task_hash":-478006325,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Industrial","start":8,"end":18,"id":1},{"text":"IoT","start":19,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"Specialist","start":32,"end":42,"id":4},{"text":"with","start":43,"end":47,"id":5},{"text":"10++","start":48,"end":52,"id":6},{"text":"years","start":53,"end":58,"id":7},{"text":"experience","start":59,"end":69,"id":8},{"text":"in","start":70,"end":72,"id":9},{"text":"Post","start":73,"end":77,"id":10},{"text":"-","start":77,"end":78,"id":11},{"text":"Quantum","start":78,"end":85,"id":12},{"text":"Cryptography","start":86,"end":98,"id":13},{"text":"and","start":99,"end":102,"id":14},{"text":"Hardware","start":103,"end":111,"id":15},{"text":"Integration","start":112,"end":123,"id":16},{"text":".","start":123,"end":124,"id":17}]} {"text":"OPA certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1135685672,"_task_hash":-1492907968,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Must have SIEM experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":42,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-2001643755,"_task_hash":1229096089,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"OWASP","start":30,"end":35,"id":5},{"text":"Top","start":36,"end":39,"id":6},{"text":"10","start":40,"end":42,"id":7},{"text":"knowledge","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} {"text":"HIPAA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":456060774,"_task_hash":1331088241,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Trained team on Vulnerability Assessment best practices.","spans":[{"start":16,"end":40,"label":"AUDIT_TERM","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1415240588,"_task_hash":349214325,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"team","start":8,"end":12,"id":1},{"text":"on","start":13,"end":15,"id":2},{"text":"Vulnerability","start":16,"end":29,"id":3},{"text":"Assessment","start":30,"end":40,"id":4},{"text":"best","start":41,"end":45,"id":5},{"text":"practices","start":46,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} {"text":"Security Cryptographer with hands-on experience in Metasploit, Metasploit, and Container Registry Security.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":51,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":79,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1907597012,"_task_hash":1568560051,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Cryptographer","start":9,"end":22,"id":1},{"text":"with","start":23,"end":27,"id":2},{"text":"hands","start":28,"end":33,"id":3},{"text":"-","start":33,"end":34,"id":4},{"text":"on","start":34,"end":36,"id":5},{"text":"experience","start":37,"end":47,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"Metasploit","start":51,"end":61,"id":8},{"text":",","start":61,"end":62,"id":9},{"text":"Metasploit","start":63,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Container","start":79,"end":88,"id":13},{"text":"Registry","start":89,"end":97,"id":14},{"text":"Security","start":98,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} {"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Social Engineering Specialist with expertise in OWASP Top 10 compliance and Firmware Analysis operations.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":48,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":76,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-387977254,"_task_hash":478241404,"tokens":[{"text":"Social","start":0,"end":6,"id":0},{"text":"Engineering","start":7,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"expertise","start":35,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"OWASP","start":48,"end":53,"id":6},{"text":"Top","start":54,"end":57,"id":7},{"text":"10","start":58,"end":60,"id":8},{"text":"compliance","start":61,"end":71,"id":9},{"text":"and","start":72,"end":75,"id":10},{"text":"Firmware","start":76,"end":84,"id":11},{"text":"Analysis","start":85,"end":93,"id":12},{"text":"operations","start":94,"end":104,"id":13},{"text":".","start":104,"end":105,"id":14}]} {"text":"Expert in IAM platforms like Okta and Azure AD.","spans":[{"start":10,"end":13,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1768569148,"_task_hash":569525318,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"IAM","start":10,"end":13,"id":2},{"text":"platforms","start":14,"end":23,"id":3},{"text":"like","start":24,"end":28,"id":4},{"text":"Okta","start":29,"end":33,"id":5},{"text":"and","start":34,"end":37,"id":6},{"text":"Azure","start":38,"end":43,"id":7},{"text":"AD","start":44,"end":46,"id":8},{"text":".","start":46,"end":47,"id":9}]} {"text":"Published research on Reverse Engineering trends.","spans":[{"start":22,"end":41,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1905958055,"_task_hash":-1891313518,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Reverse","start":22,"end":29,"id":3},{"text":"Engineering","start":30,"end":41,"id":4},{"text":"trends","start":42,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Join our team as Connected Device Security Specialist!","spans":[{"start":17,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-800134200,"_task_hash":1575745476,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Connected","start":17,"end":26,"id":4},{"text":"Device","start":27,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Specialist","start":43,"end":53,"id":7},{"text":"!","start":53,"end":54,"id":8}]} {"text":"Required skills: Nessus, Sprint Planning, C++ certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":42,"end":45,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1207377436,"_task_hash":-371320088,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Sprint","start":25,"end":31,"id":5},{"text":"Planning","start":32,"end":40,"id":6},{"text":",","start":40,"end":41,"id":7},{"text":"C++","start":42,"end":45,"id":8},{"text":"certification","start":46,"end":59,"id":9},{"text":".","start":59,"end":60,"id":10}]} {"text":"Required: ROS, Wireshark, and NIST Framework expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1712627024,"_task_hash":1547813616,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ROS","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"Wireshark","start":15,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":"expertise","start":45,"end":54,"id":9},{"text":".","start":54,"end":55,"id":10}]} {"text":"Immediate opening for Mobile Developer.","spans":[{"start":22,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-477781479,"_task_hash":-381457972,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Mobile","start":22,"end":28,"id":3},{"text":"Developer","start":29,"end":38,"id":4},{"text":".","start":38,"end":39,"id":5}]} {"text":"Developed policies aligned with ISO 27001 A.8.1.","spans":[{"start":32,"end":47,"label":"CONTROL_ID","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-651652806,"_task_hash":-89916456,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"policies","start":10,"end":18,"id":1},{"text":"aligned","start":19,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"ISO","start":32,"end":35,"id":4},{"text":"27001","start":36,"end":41,"id":5},{"text":"A.8.1","start":42,"end":47,"id":6},{"text":".","start":47,"end":48,"id":7}]} {"text":"Security Training Specialist with expertise in NIST Framework compliance and RESTful APIs operations.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":61,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-62874457,"_task_hash":-1007625357,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Training","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"expertise","start":34,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"NIST","start":47,"end":51,"id":6},{"text":"Framework","start":52,"end":61,"id":7},{"text":"compliance","start":62,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"RESTful","start":77,"end":84,"id":10},{"text":"APIs","start":85,"end":89,"id":11},{"text":"operations","start":90,"end":100,"id":12},{"text":".","start":100,"end":101,"id":13}]} {"text":"Certified JIRA working as Threat Intelligence Analyst, focused on Cybersecurity and SSRF prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":66,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":10},{"start":84,"end":88,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1495449623,"_task_hash":210455556,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"JIRA","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Threat","start":26,"end":32,"id":4},{"text":"Intelligence","start":33,"end":45,"id":5},{"text":"Analyst","start":46,"end":53,"id":6},{"text":",","start":53,"end":54,"id":7},{"text":"focused","start":55,"end":62,"id":8},{"text":"on","start":63,"end":65,"id":9},{"text":"Cybersecurity","start":66,"end":79,"id":10},{"text":"and","start":80,"end":83,"id":11},{"text":"SSRF","start":84,"end":88,"id":12},{"text":"prevention","start":89,"end":99,"id":13},{"text":".","start":99,"end":100,"id":14}]} {"text":"Published research on Malware Analysis trends.","spans":[{"start":22,"end":38,"label":"SECURITY_DOMAIN","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-466761557,"_task_hash":-159370271,"tokens":[{"text":"Published","start":0,"end":9,"id":0},{"text":"research","start":10,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Malware","start":22,"end":29,"id":3},{"text":"Analysis","start":30,"end":38,"id":4},{"text":"trends","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Integration Specialist experienced in detecting malware attacks using Nessus.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":55,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":70,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1504909019,"_task_hash":-140585424,"tokens":[{"text":"Integration","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"malware","start":48,"end":55,"id":5},{"text":"attacks","start":56,"end":63,"id":6},{"text":"using","start":64,"end":69,"id":7},{"text":"Nessus","start":70,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} {"text":"Coordinated with law enforcement on script kiddie case.","spans":[{"start":36,"end":49,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1588050293,"_task_hash":-2049328538,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"script","start":36,"end":42,"id":5},{"text":"kiddie","start":43,"end":49,"id":6},{"text":"case","start":50,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Technology Manager opportunity: Lead Security program, implement OWASP Top 10, manage Scheduling operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":37,"end":45,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":5},{"start":65,"end":77,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11},{"start":86,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":2142342564,"_task_hash":362195053,"tokens":[{"text":"Technology","start":0,"end":10,"id":0},{"text":"Manager","start":11,"end":18,"id":1},{"text":"opportunity","start":19,"end":30,"id":2},{"text":":","start":30,"end":31,"id":3},{"text":"Lead","start":32,"end":36,"id":4},{"text":"Security","start":37,"end":45,"id":5},{"text":"program","start":46,"end":53,"id":6},{"text":",","start":53,"end":54,"id":7},{"text":"implement","start":55,"end":64,"id":8},{"text":"OWASP","start":65,"end":70,"id":9},{"text":"Top","start":71,"end":74,"id":10},{"text":"10","start":75,"end":77,"id":11},{"text":",","start":77,"end":78,"id":12},{"text":"manage","start":79,"end":85,"id":13},{"text":"Scheduling","start":86,"end":96,"id":14},{"text":"operations","start":97,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"SAST/DAST required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":284157302,"_task_hash":1114825629,"tokens":[{"text":"SAST","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"DAST","start":5,"end":9,"id":2},{"text":"required","start":10,"end":18,"id":3},{"text":".","start":18,"end":19,"id":4}]} {"text":"Proficient in ELK Stack and Splunk.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":28,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1302569939,"_task_hash":1850115966,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"ELK","start":14,"end":17,"id":2},{"text":"Stack","start":18,"end":23,"id":3},{"text":"and","start":24,"end":27,"id":4},{"text":"Splunk","start":28,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} {"text":"Social Engineering Tester with expertise in OWASP Top 10 compliance and X-Ways Forensics operations.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":44,"end":56,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":72,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1166093222,"_task_hash":-1483828108,"tokens":[{"text":"Social","start":0,"end":6,"id":0},{"text":"Engineering","start":7,"end":18,"id":1},{"text":"Tester","start":19,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"expertise","start":31,"end":40,"id":4},{"text":"in","start":41,"end":43,"id":5},{"text":"OWASP","start":44,"end":49,"id":6},{"text":"Top","start":50,"end":53,"id":7},{"text":"10","start":54,"end":56,"id":8},{"text":"compliance","start":57,"end":67,"id":9},{"text":"and","start":68,"end":71,"id":10},{"text":"X","start":72,"end":73,"id":11},{"text":"-","start":73,"end":74,"id":12},{"text":"Ways","start":74,"end":78,"id":13},{"text":"Forensics","start":79,"end":88,"id":14},{"text":"operations","start":89,"end":99,"id":15},{"text":".","start":99,"end":100,"id":16}]} {"text":"Must know Wireshark, Splunk, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1284986241,"_task_hash":-1348631691,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Splunk","start":21,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"NIST","start":33,"end":37,"id":7},{"text":"Framework","start":38,"end":47,"id":8},{"text":".","start":47,"end":48,"id":9}]} {"text":"SOC 2 required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-777344063,"_task_hash":-1318550929,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"required","start":6,"end":14,"id":2},{"text":".","start":14,"end":15,"id":3}]} {"text":"Assessed third-party vendors for FERPA compliance.","spans":[{"start":33,"end":38,"label":"REGULATION","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":753522203,"_task_hash":1253604161,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"FERPA","start":33,"end":38,"id":6},{"text":"compliance","start":39,"end":49,"id":7},{"text":".","start":49,"end":50,"id":8}]} {"text":"Lead ML Infrastructure Engineer managing CVE Analysis and Server-Side Development initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":58,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1609483680,"_task_hash":855909183,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"ML","start":5,"end":7,"id":1},{"text":"Infrastructure","start":8,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"CVE","start":41,"end":44,"id":5},{"text":"Analysis","start":45,"end":53,"id":6},{"text":"and","start":54,"end":57,"id":7},{"text":"Server","start":58,"end":64,"id":8},{"text":"-","start":64,"end":65,"id":9},{"text":"Side","start":65,"end":69,"id":10},{"text":"Development","start":70,"end":81,"id":11},{"text":"initiatives","start":82,"end":93,"id":12},{"text":".","start":93,"end":94,"id":13}]} {"text":"Proficient in Metasploit and ELK Stack.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":501266764,"_task_hash":805828661,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"ELK","start":29,"end":32,"id":4},{"text":"Stack","start":33,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} {"text":"Seeking Game Engineer with 3+ years experience in Enterprise Risk Management and Process Improvement.","spans":[{"start":8,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":660322616,"_task_hash":-362025316,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Game","start":8,"end":12,"id":1},{"text":"Engineer","start":13,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"3","start":27,"end":28,"id":4},{"text":"+","start":28,"end":29,"id":5},{"text":"years","start":30,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Enterprise","start":50,"end":60,"id":9},{"text":"Risk","start":61,"end":65,"id":10},{"text":"Management","start":66,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Process","start":81,"end":88,"id":13},{"text":"Improvement","start":89,"end":100,"id":14},{"text":".","start":100,"end":101,"id":15}]} {"text":"Service Desk Analyst professional with 3+ years implementing EDR Tools and managing SLA Management programs.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":84,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-946732135,"_task_hash":684248597,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Desk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"professional","start":21,"end":33,"id":3},{"text":"with","start":34,"end":38,"id":4},{"text":"3","start":39,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"implementing","start":48,"end":60,"id":8},{"text":"EDR","start":61,"end":64,"id":9},{"text":"Tools","start":65,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"managing","start":75,"end":83,"id":12},{"text":"SLA","start":84,"end":87,"id":13},{"text":"Management","start":88,"end":98,"id":14},{"text":"programs","start":99,"end":107,"id":15},{"text":".","start":107,"end":108,"id":16}]} {"text":"Specialized in Data Security for enterprise environments.","spans":[{"start":15,"end":28,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":856920249,"_task_hash":-1135502611,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Data","start":15,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"for","start":29,"end":32,"id":4},{"text":"enterprise","start":33,"end":43,"id":5},{"text":"environments","start":44,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"BDD/TDD certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1688939224,"_task_hash":-1212079216,"tokens":[{"text":"BDD","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"TDD","start":4,"end":7,"id":2},{"text":"certification","start":8,"end":21,"id":3},{"text":"a","start":22,"end":23,"id":4},{"text":"plus","start":24,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Detected LLMNR Poisoning attack in production environment.","spans":[{"start":9,"end":24,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1196191308,"_task_hash":-688310515,"tokens":[{"text":"Detected","start":0,"end":8,"id":0},{"text":"LLMNR","start":9,"end":14,"id":1},{"text":"Poisoning","start":15,"end":24,"id":2},{"text":"attack","start":25,"end":31,"id":3},{"text":"in","start":32,"end":34,"id":4},{"text":"production","start":35,"end":45,"id":5},{"text":"environment","start":46,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Security Operations Manager with OSWE certification, expert in Hashcat.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":33,"end":37,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":63,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-942280162,"_task_hash":-286944699,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Operations","start":9,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"OSWE","start":33,"end":37,"id":4},{"text":"certification","start":38,"end":51,"id":5},{"text":",","start":51,"end":52,"id":6},{"text":"expert","start":53,"end":59,"id":7},{"text":"in","start":60,"end":62,"id":8},{"text":"Hashcat","start":63,"end":70,"id":9},{"text":".","start":70,"end":71,"id":10}]} {"text":"Developed Compliance Audit methodology and procedures.","spans":[{"start":10,"end":26,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1286049564,"_task_hash":1540066227,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Compliance","start":10,"end":20,"id":1},{"text":"Audit","start":21,"end":26,"id":2},{"text":"methodology","start":27,"end":38,"id":3},{"text":"and","start":39,"end":42,"id":4},{"text":"procedures","start":43,"end":53,"id":5},{"text":".","start":53,"end":54,"id":6}]} {"text":"Tested WAF rules against Command Injection payloads.","spans":[{"start":25,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1052424658,"_task_hash":-350890838,"tokens":[{"text":"Tested","start":0,"end":6,"id":0},{"text":"WAF","start":7,"end":10,"id":1},{"text":"rules","start":11,"end":16,"id":2},{"text":"against","start":17,"end":24,"id":3},{"text":"Command","start":25,"end":32,"id":4},{"text":"Injection","start":33,"end":42,"id":5},{"text":"payloads","start":43,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"IT Solutions Architect with expertise in OWASP Top 10 compliance and Expert Testimony operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1287254217,"_task_hash":566264895,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Solutions","start":3,"end":12,"id":1},{"text":"Architect","start":13,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"expertise","start":28,"end":37,"id":4},{"text":"in","start":38,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"compliance","start":54,"end":64,"id":9},{"text":"and","start":65,"end":68,"id":10},{"text":"Expert","start":69,"end":75,"id":11},{"text":"Testimony","start":76,"end":85,"id":12},{"text":"operations","start":86,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"VP of Security with GCP Security certification, expert in Autopsy.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":32,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-746927905,"_task_hash":2025296101,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"GCP","start":20,"end":23,"id":4},{"text":"Security","start":24,"end":32,"id":5},{"text":"certification","start":33,"end":46,"id":6},{"text":",","start":46,"end":47,"id":7},{"text":"expert","start":48,"end":54,"id":8},{"text":"in","start":55,"end":57,"id":9},{"text":"Autopsy","start":58,"end":65,"id":10},{"text":".","start":65,"end":66,"id":11}]} {"text":"We need a SRE skilled in CSRF prevention and Zero-Day analysis using Splunk.","spans":[{"start":10,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":29,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":6,"token_end":6},{"start":45,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":11},{"start":69,"end":75,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-671076895,"_task_hash":1721520664,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"SRE","start":10,"end":13,"id":3},{"text":"skilled","start":14,"end":21,"id":4},{"text":"in","start":22,"end":24,"id":5},{"text":"CSRF","start":25,"end":29,"id":6},{"text":"prevention","start":30,"end":40,"id":7},{"text":"and","start":41,"end":44,"id":8},{"text":"Zero","start":45,"end":49,"id":9},{"text":"-","start":49,"end":50,"id":10},{"text":"Day","start":50,"end":53,"id":11},{"text":"analysis","start":54,"end":62,"id":12},{"text":"using","start":63,"end":68,"id":13},{"text":"Splunk","start":69,"end":75,"id":14},{"text":".","start":75,"end":76,"id":15}]} {"text":"Looking for SOC Manager to lead Docker Security initiatives.","spans":[{"start":12,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":47,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1400950833,"_task_hash":1169790324,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"SOC","start":12,"end":15,"id":2},{"text":"Manager","start":16,"end":23,"id":3},{"text":"to","start":24,"end":26,"id":4},{"text":"lead","start":27,"end":31,"id":5},{"text":"Docker","start":32,"end":38,"id":6},{"text":"Security","start":39,"end":47,"id":7},{"text":"initiatives","start":48,"end":59,"id":8},{"text":".","start":59,"end":60,"id":9}]} {"text":"Must have Burp Suite experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-556840815,"_task_hash":-1067785361,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":"experience","start":21,"end":31,"id":4},{"text":"and","start":32,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"knowledge","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"We need a Interface Designer skilled in XXE prevention and Supply Chain Attack analysis using Burp Suite.","spans":[{"start":10,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":40,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":59,"end":78,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":12},{"start":94,"end":104,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-765874075,"_task_hash":-292395582,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Interface","start":10,"end":19,"id":3},{"text":"Designer","start":20,"end":28,"id":4},{"text":"skilled","start":29,"end":36,"id":5},{"text":"in","start":37,"end":39,"id":6},{"text":"XXE","start":40,"end":43,"id":7},{"text":"prevention","start":44,"end":54,"id":8},{"text":"and","start":55,"end":58,"id":9},{"text":"Supply","start":59,"end":65,"id":10},{"text":"Chain","start":66,"end":71,"id":11},{"text":"Attack","start":72,"end":78,"id":12},{"text":"analysis","start":79,"end":87,"id":13},{"text":"using","start":88,"end":93,"id":14},{"text":"Burp","start":94,"end":98,"id":15},{"text":"Suite","start":99,"end":104,"id":16},{"text":".","start":104,"end":105,"id":17}]} {"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} {"text":"Hiring Full\u2011Stack Developer for IDA Pro and Man-in-the-Middle detection.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":39,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":44,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":678225315,"_task_hash":-922460056,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Full\u2011Stack","start":7,"end":17,"id":1},{"text":"Developer","start":18,"end":27,"id":2},{"text":"for","start":28,"end":31,"id":3},{"text":"IDA","start":32,"end":35,"id":4},{"text":"Pro","start":36,"end":39,"id":5},{"text":"and","start":40,"end":43,"id":6},{"text":"Man","start":44,"end":47,"id":7},{"text":"-","start":47,"end":48,"id":8},{"text":"in","start":48,"end":50,"id":9},{"text":"-","start":50,"end":51,"id":10},{"text":"the","start":51,"end":54,"id":11},{"text":"-","start":54,"end":55,"id":12},{"text":"Middle","start":55,"end":61,"id":13},{"text":"detection","start":62,"end":71,"id":14},{"text":".","start":71,"end":72,"id":15}]} {"text":"Threat Hunter with expertise in NIST Framework compliance and Privacy Engineering operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-104127338,"_task_hash":-960350748,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Privacy","start":62,"end":69,"id":9},{"text":"Engineering","start":70,"end":81,"id":10},{"text":"operations","start":82,"end":92,"id":11},{"text":".","start":92,"end":93,"id":12}]} {"text":"Penetration Tester with CCSP certification, expert in Autopsy.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":24,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":54,"end":61,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":420626364,"_task_hash":1892552129,"tokens":[{"text":"Penetration","start":0,"end":11,"id":0},{"text":"Tester","start":12,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CCSP","start":24,"end":28,"id":3},{"text":"certification","start":29,"end":42,"id":4},{"text":",","start":42,"end":43,"id":5},{"text":"expert","start":44,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"Autopsy","start":54,"end":61,"id":8},{"text":".","start":61,"end":62,"id":9}]} {"text":"OPA required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370918646,"_task_hash":-45550355,"tokens":[{"text":"OPA","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} {"text":"Accomplished Research Specialist specializing in Impact Assessment and Application Security Architecture.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":862450570,"_task_hash":1503306075,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Research","start":13,"end":21,"id":1},{"text":"Specialist","start":22,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Impact","start":49,"end":55,"id":5},{"text":"Assessment","start":56,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"Application","start":71,"end":82,"id":8},{"text":"Security","start":83,"end":91,"id":9},{"text":"Architecture","start":92,"end":104,"id":10},{"text":".","start":104,"end":105,"id":11}]} {"text":"Developed Key Management strategy and roadmap.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":639751119,"_task_hash":-1676791885,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Key","start":10,"end":13,"id":1},{"text":"Management","start":14,"end":24,"id":2},{"text":"strategy","start":25,"end":33,"id":3},{"text":"and","start":34,"end":37,"id":4},{"text":"roadmap","start":38,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} {"text":"Looking for Anti-Phishing Specialist to lead Security Testing initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":5},{"start":45,"end":61,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1293374790,"_task_hash":-1881448618,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Anti","start":12,"end":16,"id":2},{"text":"-","start":16,"end":17,"id":3},{"text":"Phishing","start":17,"end":25,"id":4},{"text":"Specialist","start":26,"end":36,"id":5},{"text":"to","start":37,"end":39,"id":6},{"text":"lead","start":40,"end":44,"id":7},{"text":"Security","start":45,"end":53,"id":8},{"text":"Testing","start":54,"end":61,"id":9},{"text":"initiatives","start":62,"end":73,"id":10},{"text":".","start":73,"end":74,"id":11}]} {"text":"Must know Nessus, EDR Tools, and OWASP Top 10.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":927050440,"_task_hash":-1539420200,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"EDR","start":18,"end":21,"id":4},{"text":"Tools","start":22,"end":27,"id":5},{"text":",","start":27,"end":28,"id":6},{"text":"and","start":29,"end":32,"id":7},{"text":"OWASP","start":33,"end":38,"id":8},{"text":"Top","start":39,"end":42,"id":9},{"text":"10","start":43,"end":45,"id":10},{"text":".","start":45,"end":46,"id":11}]} {"text":"Must know SIEM, EDR Tools, and OWASP Top 10.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":43,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1253890965,"_task_hash":-492592052,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"OWASP","start":31,"end":36,"id":8},{"text":"Top","start":37,"end":40,"id":9},{"text":"10","start":41,"end":43,"id":10},{"text":".","start":43,"end":44,"id":11}]} {"text":"Lead Forensic Examiner managing AI Policy and Python/Bash initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":46,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1223817223,"_task_hash":-1645101274,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Forensic","start":5,"end":13,"id":1},{"text":"Examiner","start":14,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"AI","start":32,"end":34,"id":4},{"text":"Policy","start":35,"end":41,"id":5},{"text":"and","start":42,"end":45,"id":6},{"text":"Python","start":46,"end":52,"id":7},{"text":"/","start":52,"end":53,"id":8},{"text":"Bash","start":53,"end":57,"id":9},{"text":"initiatives","start":58,"end":69,"id":10},{"text":".","start":69,"end":70,"id":11}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Presented Identity Security updates to leadership.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-297961347,"_task_hash":-1518304644,"tokens":[{"text":"Presented","start":0,"end":9,"id":0},{"text":"Identity","start":10,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"updates","start":28,"end":35,"id":3},{"text":"to","start":36,"end":38,"id":4},{"text":"leadership","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} {"text":"Developed detection for Race Condition attacks.","spans":[{"start":24,"end":38,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1781976622,"_task_hash":219501447,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Race","start":24,"end":28,"id":3},{"text":"Condition","start":29,"end":38,"id":4},{"text":"attacks","start":39,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Join our team as SOC Analyst!","spans":[{"start":17,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-626426418,"_task_hash":-84075366,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"SOC","start":17,"end":20,"id":4},{"text":"Analyst","start":21,"end":28,"id":5},{"text":"!","start":28,"end":29,"id":6}]} {"text":"Required skills: Splunk, Troubleshooting, ISO 27001 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":40,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":42,"end":51,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":436236460,"_task_hash":-1386353422,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Troubleshooting","start":25,"end":40,"id":5},{"text":",","start":40,"end":41,"id":6},{"text":"ISO","start":42,"end":45,"id":7},{"text":"27001","start":46,"end":51,"id":8},{"text":"certification","start":52,"end":65,"id":9},{"text":".","start":65,"end":66,"id":10}]} {"text":"Reported SOC 2 CC6.1 compliance status to leadership.","spans":[{"start":9,"end":20,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":403305704,"_task_hash":1337240962,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"SOC","start":9,"end":12,"id":1},{"text":"2","start":13,"end":14,"id":2},{"text":"CC6.1","start":15,"end":20,"id":3},{"text":"compliance","start":21,"end":31,"id":4},{"text":"status","start":32,"end":38,"id":5},{"text":"to","start":39,"end":41,"id":6},{"text":"leadership","start":42,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Coordinated with law enforcement on spear phishing case.","spans":[{"start":36,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1937448421,"_task_hash":17262383,"tokens":[{"text":"Coordinated","start":0,"end":11,"id":0},{"text":"with","start":12,"end":16,"id":1},{"text":"law","start":17,"end":20,"id":2},{"text":"enforcement","start":21,"end":32,"id":3},{"text":"on","start":33,"end":35,"id":4},{"text":"spear","start":36,"end":41,"id":5},{"text":"phishing","start":42,"end":50,"id":6},{"text":"case","start":51,"end":55,"id":7},{"text":".","start":55,"end":56,"id":8}]} {"text":"GRC Analyst with GWAPT certification, expert in Fortinet.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":17,"end":22,"label":"CERTIFICATION","answer":"accept","token_start":3,"token_end":3},{"start":48,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1122579723,"_task_hash":2092823354,"tokens":[{"text":"GRC","start":0,"end":3,"id":0},{"text":"Analyst","start":4,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"GWAPT","start":17,"end":22,"id":3},{"text":"certification","start":23,"end":36,"id":4},{"text":",","start":36,"end":37,"id":5},{"text":"expert","start":38,"end":44,"id":6},{"text":"in","start":45,"end":47,"id":7},{"text":"Fortinet","start":48,"end":56,"id":8},{"text":".","start":56,"end":57,"id":9}]} {"text":"Required: C++, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":15,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-615048582,"_task_hash":-533958575,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"C++","start":10,"end":13,"id":2},{"text":",","start":13,"end":14,"id":3},{"text":"EDR","start":15,"end":18,"id":4},{"text":"Tools","start":19,"end":24,"id":5},{"text":",","start":24,"end":25,"id":6},{"text":"and","start":26,"end":29,"id":7},{"text":"NIST","start":30,"end":34,"id":8},{"text":"Framework","start":35,"end":44,"id":9},{"text":"expertise","start":45,"end":54,"id":10},{"text":".","start":54,"end":55,"id":11}]} {"text":"Implemented workaround for CVE-2023-4863 until patch available.","spans":[{"start":27,"end":40,"label":"CVE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":427212147,"_task_hash":-1611739445,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"workaround","start":12,"end":22,"id":1},{"text":"for","start":23,"end":26,"id":2},{"text":"CVE-2023","start":27,"end":35,"id":3},{"text":"-","start":35,"end":36,"id":4},{"text":"4863","start":36,"end":40,"id":5},{"text":"until","start":41,"end":46,"id":6},{"text":"patch","start":47,"end":52,"id":7},{"text":"available","start":53,"end":62,"id":8},{"text":".","start":62,"end":63,"id":9}]} {"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} {"text":"Android Developer opportunity: Lead Service Mesh Security program, implement NIST Framework, manage Privacy Risk operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":36,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":7},{"start":77,"end":91,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":100,"end":112,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-807768473,"_task_hash":-1113554058,"tokens":[{"text":"Android","start":0,"end":7,"id":0},{"text":"Developer","start":8,"end":17,"id":1},{"text":"opportunity","start":18,"end":29,"id":2},{"text":":","start":29,"end":30,"id":3},{"text":"Lead","start":31,"end":35,"id":4},{"text":"Service","start":36,"end":43,"id":5},{"text":"Mesh","start":44,"end":48,"id":6},{"text":"Security","start":49,"end":57,"id":7},{"text":"program","start":58,"end":65,"id":8},{"text":",","start":65,"end":66,"id":9},{"text":"implement","start":67,"end":76,"id":10},{"text":"NIST","start":77,"end":81,"id":11},{"text":"Framework","start":82,"end":91,"id":12},{"text":",","start":91,"end":92,"id":13},{"text":"manage","start":93,"end":99,"id":14},{"text":"Privacy","start":100,"end":107,"id":15},{"text":"Risk","start":108,"end":112,"id":16},{"text":"operations","start":113,"end":123,"id":17},{"text":".","start":123,"end":124,"id":18}]} {"text":"PCI-DSS compliance experience preferred.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1829455208,"_task_hash":1390445460,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"compliance","start":8,"end":18,"id":3},{"text":"experience","start":19,"end":29,"id":4},{"text":"preferred","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Immediate opening for Hardware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-787263074,"_task_hash":-216303877,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Hardware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} {"text":"Exploited Format String vulnerability in web application.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":789815195,"_task_hash":1447791641,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Format","start":10,"end":16,"id":1},{"text":"String","start":17,"end":23,"id":2},{"text":"vulnerability","start":24,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"web","start":41,"end":44,"id":5},{"text":"application","start":45,"end":56,"id":6},{"text":".","start":56,"end":57,"id":7}]} {"text":"Remediated PIPL audit findings.","spans":[{"start":11,"end":15,"label":"REGULATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":317830182,"_task_hash":1954996203,"tokens":[{"text":"Remediated","start":0,"end":10,"id":0},{"text":"PIPL","start":11,"end":15,"id":1},{"text":"audit","start":16,"end":21,"id":2},{"text":"findings","start":22,"end":30,"id":3},{"text":".","start":30,"end":31,"id":4}]} {"text":"Security Defense Analyst with hands-on experience in CrowdStrike, Burp Suite, and Cisco Security.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":66,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-82188573,"_task_hash":1232246467,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Analyst","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"hands","start":30,"end":35,"id":4},{"text":"-","start":35,"end":36,"id":5},{"text":"on","start":36,"end":38,"id":6},{"text":"experience","start":39,"end":49,"id":7},{"text":"in","start":50,"end":52,"id":8},{"text":"CrowdStrike","start":53,"end":64,"id":9},{"text":",","start":64,"end":65,"id":10},{"text":"Burp","start":66,"end":70,"id":11},{"text":"Suite","start":71,"end":76,"id":12},{"text":",","start":76,"end":77,"id":13},{"text":"and","start":78,"end":81,"id":14},{"text":"Cisco","start":82,"end":87,"id":15},{"text":"Security","start":88,"end":96,"id":16},{"text":".","start":96,"end":97,"id":17}]} {"text":"Simulated Memory Injection during red team exercise.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1203030605,"_task_hash":-1556057404,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"Memory","start":10,"end":16,"id":1},{"text":"Injection","start":17,"end":26,"id":2},{"text":"during","start":27,"end":33,"id":3},{"text":"red","start":34,"end":37,"id":4},{"text":"team","start":38,"end":42,"id":5},{"text":"exercise","start":43,"end":51,"id":6},{"text":".","start":51,"end":52,"id":7}]} {"text":"Assessed third-party vendors for SOC 2 compliance.","spans":[{"start":33,"end":38,"label":"REGULATION","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-608768550,"_task_hash":-1281471844,"tokens":[{"text":"Assessed","start":0,"end":8,"id":0},{"text":"third","start":9,"end":14,"id":1},{"text":"-","start":14,"end":15,"id":2},{"text":"party","start":15,"end":20,"id":3},{"text":"vendors","start":21,"end":28,"id":4},{"text":"for","start":29,"end":32,"id":5},{"text":"SOC","start":33,"end":36,"id":6},{"text":"2","start":37,"end":38,"id":7},{"text":"compliance","start":39,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} {"text":"Reported SEC Cyber Rules compliance status to board.","spans":[{"start":9,"end":24,"label":"REGULATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1384013632,"_task_hash":149834804,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"SEC","start":9,"end":12,"id":1},{"text":"Cyber","start":13,"end":18,"id":2},{"text":"Rules","start":19,"end":24,"id":3},{"text":"compliance","start":25,"end":35,"id":4},{"text":"status","start":36,"end":42,"id":5},{"text":"to","start":43,"end":45,"id":6},{"text":"board","start":46,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"Crisis Manager with 5+ years experience in Emergency Planning, Strategic Planning, and Learning Management Systems.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":63,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":87,"end":114,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1852231677,"_task_hash":-1282208165,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"5","start":20,"end":21,"id":3},{"text":"+","start":21,"end":22,"id":4},{"text":"years","start":23,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"Emergency","start":43,"end":52,"id":8},{"text":"Planning","start":53,"end":61,"id":9},{"text":",","start":61,"end":62,"id":10},{"text":"Strategic","start":63,"end":72,"id":11},{"text":"Planning","start":73,"end":81,"id":12},{"text":",","start":81,"end":82,"id":13},{"text":"and","start":83,"end":86,"id":14},{"text":"Learning","start":87,"end":95,"id":15},{"text":"Management","start":96,"end":106,"id":16},{"text":"Systems","start":107,"end":114,"id":17},{"text":".","start":114,"end":115,"id":18}]} {"text":"Join our team as Privacy Specialist!","spans":[{"start":17,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":101886903,"_task_hash":780000485,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Privacy","start":17,"end":24,"id":4},{"text":"Specialist","start":25,"end":35,"id":5},{"text":"!","start":35,"end":36,"id":6}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Director of Security with hands-on experience in EDR Tools, EDR Platforms, and IoT Security.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":58,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":60,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":13},{"start":79,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1837535779,"_task_hash":917941629,"tokens":[{"text":"Director","start":0,"end":8,"id":0},{"text":"of","start":9,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"hands","start":26,"end":31,"id":4},{"text":"-","start":31,"end":32,"id":5},{"text":"on","start":32,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"EDR","start":49,"end":52,"id":9},{"text":"Tools","start":53,"end":58,"id":10},{"text":",","start":58,"end":59,"id":11},{"text":"EDR","start":60,"end":63,"id":12},{"text":"Platforms","start":64,"end":73,"id":13},{"text":",","start":73,"end":74,"id":14},{"text":"and","start":75,"end":78,"id":15},{"text":"IoT","start":79,"end":82,"id":16},{"text":"Security","start":83,"end":91,"id":17},{"text":".","start":91,"end":92,"id":18}]} {"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Created YARA rules for ARP Spoofing detection.","spans":[{"start":23,"end":35,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1975917592,"_task_hash":451078599,"tokens":[{"text":"Created","start":0,"end":7,"id":0},{"text":"YARA","start":8,"end":12,"id":1},{"text":"rules","start":13,"end":18,"id":2},{"text":"for","start":19,"end":22,"id":3},{"text":"ARP","start":23,"end":26,"id":4},{"text":"Spoofing","start":27,"end":35,"id":5},{"text":"detection","start":36,"end":45,"id":6},{"text":".","start":45,"end":46,"id":7}]} {"text":"Technical Project Manager role available: Cloud Architecture experience required, Security knowledge essential.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1314791684,"_task_hash":-1031533739,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Project","start":10,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"role","start":26,"end":30,"id":3},{"text":"available","start":31,"end":40,"id":4},{"text":":","start":40,"end":41,"id":5},{"text":"Cloud","start":42,"end":47,"id":6},{"text":"Architecture","start":48,"end":60,"id":7},{"text":"experience","start":61,"end":71,"id":8},{"text":"required","start":72,"end":80,"id":9},{"text":",","start":80,"end":81,"id":10},{"text":"Security","start":82,"end":90,"id":11},{"text":"knowledge","start":91,"end":100,"id":12},{"text":"essential","start":101,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} {"text":"Product Designer with hands-on experience in Nessus, EDR Platforms, and Mobile Security.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":45,"end":51,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":53,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":72,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1171335258,"_task_hash":457089143,"tokens":[{"text":"Product","start":0,"end":7,"id":0},{"text":"Designer","start":8,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"hands","start":22,"end":27,"id":3},{"text":"-","start":27,"end":28,"id":4},{"text":"on","start":28,"end":30,"id":5},{"text":"experience","start":31,"end":41,"id":6},{"text":"in","start":42,"end":44,"id":7},{"text":"Nessus","start":45,"end":51,"id":8},{"text":",","start":51,"end":52,"id":9},{"text":"EDR","start":53,"end":56,"id":10},{"text":"Platforms","start":57,"end":66,"id":11},{"text":",","start":66,"end":67,"id":12},{"text":"and","start":68,"end":71,"id":13},{"text":"Mobile","start":72,"end":78,"id":14},{"text":"Security","start":79,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} {"text":"PKI certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":843245551,"_task_hash":-225831804,"tokens":[{"text":"PKI","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} {"text":"Seeking Security Operations Analyst with 10++ years experience in Technical Documentation and Swift.","spans":[{"start":8,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":66,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":94,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1025908376,"_task_hash":-1973269725,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Operations","start":17,"end":27,"id":2},{"text":"Analyst","start":28,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"10++","start":41,"end":45,"id":5},{"text":"years","start":46,"end":51,"id":6},{"text":"experience","start":52,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Technical","start":66,"end":75,"id":9},{"text":"Documentation","start":76,"end":89,"id":10},{"text":"and","start":90,"end":93,"id":11},{"text":"Swift","start":94,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} {"text":"We need a Senior Data Analyst skilled in XXE prevention and Man-in-the-Middle analysis using ELK Stack.","spans":[{"start":10,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":41,"end":44,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":8},{"start":60,"end":77,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":17},{"start":93,"end":102,"label":"SECURITY_TOOL","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-1266103554,"_task_hash":-2032520589,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Senior","start":10,"end":16,"id":3},{"text":"Data","start":17,"end":21,"id":4},{"text":"Analyst","start":22,"end":29,"id":5},{"text":"skilled","start":30,"end":37,"id":6},{"text":"in","start":38,"end":40,"id":7},{"text":"XXE","start":41,"end":44,"id":8},{"text":"prevention","start":45,"end":55,"id":9},{"text":"and","start":56,"end":59,"id":10},{"text":"Man","start":60,"end":63,"id":11},{"text":"-","start":63,"end":64,"id":12},{"text":"in","start":64,"end":66,"id":13},{"text":"-","start":66,"end":67,"id":14},{"text":"the","start":67,"end":70,"id":15},{"text":"-","start":70,"end":71,"id":16},{"text":"Middle","start":71,"end":77,"id":17},{"text":"analysis","start":78,"end":86,"id":18},{"text":"using","start":87,"end":92,"id":19},{"text":"ELK","start":93,"end":96,"id":20},{"text":"Stack","start":97,"end":102,"id":21},{"text":".","start":102,"end":103,"id":22}]} {"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} {"text":"Database Manager professional with 3+ years implementing Burp Suite and managing E-Learning Development programs.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":67,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":81,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1278659257,"_task_hash":1766009528,"tokens":[{"text":"Database","start":0,"end":8,"id":0},{"text":"Manager","start":9,"end":16,"id":1},{"text":"professional","start":17,"end":29,"id":2},{"text":"with","start":30,"end":34,"id":3},{"text":"3","start":35,"end":36,"id":4},{"text":"+","start":36,"end":37,"id":5},{"text":"years","start":38,"end":43,"id":6},{"text":"implementing","start":44,"end":56,"id":7},{"text":"Burp","start":57,"end":61,"id":8},{"text":"Suite","start":62,"end":67,"id":9},{"text":"and","start":68,"end":71,"id":10},{"text":"managing","start":72,"end":80,"id":11},{"text":"E","start":81,"end":82,"id":12},{"text":"-","start":82,"end":83,"id":13},{"text":"Learning","start":83,"end":91,"id":14},{"text":"Development","start":92,"end":103,"id":15},{"text":"programs","start":104,"end":112,"id":16},{"text":".","start":112,"end":113,"id":17}]} {"text":"Exploited Lateral Movement vulnerability in web application.","spans":[{"start":10,"end":26,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-212679263,"_task_hash":-73639939,"tokens":[{"text":"Exploited","start":0,"end":9,"id":0},{"text":"Lateral","start":10,"end":17,"id":1},{"text":"Movement","start":18,"end":26,"id":2},{"text":"vulnerability","start":27,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"web","start":44,"end":47,"id":5},{"text":"application","start":48,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Experienced Defensive Security Analyst specializing in Security Scanning Tools.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1908659874,"_task_hash":-528652977,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Defensive","start":12,"end":21,"id":1},{"text":"Security","start":22,"end":30,"id":2},{"text":"Analyst","start":31,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Scanning","start":64,"end":72,"id":7},{"text":"Tools","start":73,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} {"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Lead Access Management Specialist managing Technical Writing and Model Serving initiatives.","spans":[{"start":5,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-981941909,"_task_hash":1945118859,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Access","start":5,"end":11,"id":1},{"text":"Management","start":12,"end":22,"id":2},{"text":"Specialist","start":23,"end":33,"id":3},{"text":"managing","start":34,"end":42,"id":4},{"text":"Technical","start":43,"end":52,"id":5},{"text":"Writing","start":53,"end":60,"id":6},{"text":"and","start":61,"end":64,"id":7},{"text":"Model","start":65,"end":70,"id":8},{"text":"Serving","start":71,"end":78,"id":9},{"text":"initiatives","start":79,"end":90,"id":10},{"text":".","start":90,"end":91,"id":11}]} {"text":"Simulated SQL Injection during red team exercise.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-374534870,"_task_hash":149808498,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"SQL","start":10,"end":13,"id":1},{"text":"Injection","start":14,"end":23,"id":2},{"text":"during","start":24,"end":30,"id":3},{"text":"red","start":31,"end":34,"id":4},{"text":"team","start":35,"end":39,"id":5},{"text":"exercise","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Required skills: EDR Tools, Data Analysis, CI/CD certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":43,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1874053216,"_task_hash":-1219692022,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Tools","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Data","start":28,"end":32,"id":6},{"text":"Analysis","start":33,"end":41,"id":7},{"text":",","start":41,"end":42,"id":8},{"text":"CI","start":43,"end":45,"id":9},{"text":"/","start":45,"end":46,"id":10},{"text":"CD","start":46,"end":48,"id":11},{"text":"certification","start":49,"end":62,"id":12},{"text":".","start":62,"end":63,"id":13}]} {"text":"Trained staff on CCPA obligations.","spans":[{"start":17,"end":21,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":17,"end":21,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3},{"start":17,"end":21,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-501881939,"_task_hash":2093784972,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"staff","start":8,"end":13,"id":1},{"text":"on","start":14,"end":16,"id":2},{"text":"CCPA","start":17,"end":21,"id":3},{"text":"obligations","start":22,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} {"text":"FISMA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1159449825,"_task_hash":869222594,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} {"text":"Seeking IT Project Manager with 10+ years experience in Communication Skills and Network Scanning.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":97,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1284568359,"_task_hash":625340175,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"IT","start":8,"end":10,"id":1},{"text":"Project","start":11,"end":18,"id":2},{"text":"Manager","start":19,"end":26,"id":3},{"text":"with","start":27,"end":31,"id":4},{"text":"10","start":32,"end":34,"id":5},{"text":"+","start":34,"end":35,"id":6},{"text":"years","start":36,"end":41,"id":7},{"text":"experience","start":42,"end":52,"id":8},{"text":"in","start":53,"end":55,"id":9},{"text":"Communication","start":56,"end":69,"id":10},{"text":"Skills","start":70,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Network","start":81,"end":88,"id":13},{"text":"Scanning","start":89,"end":97,"id":14},{"text":".","start":97,"end":98,"id":15}]} {"text":"Certified DNS/DHCP working as Fullstack Engineer, focused on Security Awareness and Session Hijacking prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":30,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":79,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":101,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1011570560,"_task_hash":346848112,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"DNS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"DHCP","start":14,"end":18,"id":3},{"text":"working","start":19,"end":26,"id":4},{"text":"as","start":27,"end":29,"id":5},{"text":"Fullstack","start":30,"end":39,"id":6},{"text":"Engineer","start":40,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"focused","start":50,"end":57,"id":9},{"text":"on","start":58,"end":60,"id":10},{"text":"Security","start":61,"end":69,"id":11},{"text":"Awareness","start":70,"end":79,"id":12},{"text":"and","start":80,"end":83,"id":13},{"text":"Session","start":84,"end":91,"id":14},{"text":"Hijacking","start":92,"end":101,"id":15},{"text":"prevention","start":102,"end":112,"id":16},{"text":".","start":112,"end":113,"id":17}]} {"text":"Seeking Software Tester with 5++ years experience in OTA Updates and Service Delivery.","spans":[{"start":8,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":53,"end":64,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-798218940,"_task_hash":473786105,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Software","start":8,"end":16,"id":1},{"text":"Tester","start":17,"end":23,"id":2},{"text":"with","start":24,"end":28,"id":3},{"text":"5++","start":29,"end":32,"id":4},{"text":"years","start":33,"end":38,"id":5},{"text":"experience","start":39,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"OTA","start":53,"end":56,"id":8},{"text":"Updates","start":57,"end":64,"id":9},{"text":"and","start":65,"end":68,"id":10},{"text":"Service","start":69,"end":76,"id":11},{"text":"Delivery","start":77,"end":85,"id":12},{"text":".","start":85,"end":86,"id":13}]} {"text":"Specialized in Reverse Engineering for enterprise environments.","spans":[{"start":15,"end":34,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1660627054,"_task_hash":2088282640,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"Reverse","start":15,"end":22,"id":2},{"text":"Engineering","start":23,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"enterprise","start":39,"end":49,"id":5},{"text":"environments","start":50,"end":62,"id":6},{"text":".","start":62,"end":63,"id":7}]} {"text":"Proficient in Wireshark and Nessus.","spans":[{"start":14,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":28,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":801494507,"_task_hash":-231925444,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Wireshark","start":14,"end":23,"id":2},{"text":"and","start":24,"end":27,"id":3},{"text":"Nessus","start":28,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} {"text":"Specialized in PKI Management for enterprise environments.","spans":[{"start":15,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":15,"end":29,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-427672594,"_task_hash":1928843647,"tokens":[{"text":"Specialized","start":0,"end":11,"id":0},{"text":"in","start":12,"end":14,"id":1},{"text":"PKI","start":15,"end":18,"id":2},{"text":"Management","start":19,"end":29,"id":3},{"text":"for","start":30,"end":33,"id":4},{"text":"enterprise","start":34,"end":44,"id":5},{"text":"environments","start":45,"end":57,"id":6},{"text":".","start":57,"end":58,"id":7}]} {"text":"Certified IAM working as Threat Intelligence Hunter, focused on Hardware Security and Command Injection prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":51,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":64,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":86,"end":103,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1708128661,"_task_hash":-1585260906,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IAM","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Threat","start":25,"end":31,"id":4},{"text":"Intelligence","start":32,"end":44,"id":5},{"text":"Hunter","start":45,"end":51,"id":6},{"text":",","start":51,"end":52,"id":7},{"text":"focused","start":53,"end":60,"id":8},{"text":"on","start":61,"end":63,"id":9},{"text":"Hardware","start":64,"end":72,"id":10},{"text":"Security","start":73,"end":81,"id":11},{"text":"and","start":82,"end":85,"id":12},{"text":"Command","start":86,"end":93,"id":13},{"text":"Injection","start":94,"end":103,"id":14},{"text":"prevention","start":104,"end":114,"id":15},{"text":".","start":114,"end":115,"id":16}]} {"text":"SOC 2 compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":2073297872,"_task_hash":-1634877542,"tokens":[{"text":"SOC","start":0,"end":3,"id":0},{"text":"2","start":4,"end":5,"id":1},{"text":"compliance","start":6,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"preferred","start":28,"end":37,"id":4},{"text":".","start":37,"end":38,"id":5}]} {"text":"Holds OPA.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1953373167,"_task_hash":625579373,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OPA","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} {"text":"TOGAF certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1611953164,"_task_hash":629751826,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"certification","start":6,"end":19,"id":1},{"text":"a","start":20,"end":21,"id":2},{"text":"plus","start":22,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Simulated DNS Hijacking during red team exercise.","spans":[{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":23,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":254325403,"_task_hash":1413616711,"tokens":[{"text":"Simulated","start":0,"end":9,"id":0},{"text":"DNS","start":10,"end":13,"id":1},{"text":"Hijacking","start":14,"end":23,"id":2},{"text":"during","start":24,"end":30,"id":3},{"text":"red","start":31,"end":34,"id":4},{"text":"team","start":35,"end":39,"id":5},{"text":"exercise","start":40,"end":48,"id":6},{"text":".","start":48,"end":49,"id":7}]} {"text":"Holds SPF/DKIM/DMARC certification.","spans":[{"start":6,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1094651715,"_task_hash":994877923,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SPF","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"DKIM","start":10,"end":14,"id":3},{"text":"/","start":14,"end":15,"id":4},{"text":"DMARC","start":15,"end":20,"id":5},{"text":"certification","start":21,"end":34,"id":6},{"text":".","start":34,"end":35,"id":7}]} {"text":"SABSA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":953533127,"_task_hash":482991972,"tokens":[{"text":"SABSA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Must know Burp Suite, ELK Stack, and OWASP Top 10.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":22,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":37,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1214581808,"_task_hash":283581415,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Burp","start":10,"end":14,"id":2},{"text":"Suite","start":15,"end":20,"id":3},{"text":",","start":20,"end":21,"id":4},{"text":"ELK","start":22,"end":25,"id":5},{"text":"Stack","start":26,"end":31,"id":6},{"text":",","start":31,"end":32,"id":7},{"text":"and","start":33,"end":36,"id":8},{"text":"OWASP","start":37,"end":42,"id":9},{"text":"Top","start":43,"end":46,"id":10},{"text":"10","start":47,"end":49,"id":11},{"text":".","start":49,"end":50,"id":12}]} {"text":"Experienced Machine Learning Product Manager specializing in Supply Chain Security.","spans":[{"start":12,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":61,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":941309924,"_task_hash":165336706,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Machine","start":12,"end":19,"id":1},{"text":"Learning","start":20,"end":28,"id":2},{"text":"Product","start":29,"end":36,"id":3},{"text":"Manager","start":37,"end":44,"id":4},{"text":"specializing","start":45,"end":57,"id":5},{"text":"in","start":58,"end":60,"id":6},{"text":"Supply","start":61,"end":67,"id":7},{"text":"Chain","start":68,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} {"text":"Service Desk Analyst with expertise in OWASP Top 10 compliance and Awareness Programs operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-182161664,"_task_hash":286390724,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Desk","start":8,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Awareness","start":67,"end":76,"id":11},{"text":"Programs","start":77,"end":85,"id":12},{"text":"operations","start":86,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"SAST/DAST certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-82871198,"_task_hash":-1918755033,"tokens":[{"text":"SAST","start":0,"end":4,"id":0},{"text":"/","start":4,"end":5,"id":1},{"text":"DAST","start":5,"end":9,"id":2},{"text":"certified","start":10,"end":19,"id":3},{"text":".","start":19,"end":20,"id":4}]} {"text":"Software Tester professional with 5+ years implementing SIEM and managing Post-Quantum Cryptography programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":60,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":74,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-444929455,"_task_hash":643324573,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Tester","start":9,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"5","start":34,"end":35,"id":4},{"text":"+","start":35,"end":36,"id":5},{"text":"years","start":37,"end":42,"id":6},{"text":"implementing","start":43,"end":55,"id":7},{"text":"SIEM","start":56,"end":60,"id":8},{"text":"and","start":61,"end":64,"id":9},{"text":"managing","start":65,"end":73,"id":10},{"text":"Post","start":74,"end":78,"id":11},{"text":"-","start":78,"end":79,"id":12},{"text":"Quantum","start":79,"end":86,"id":13},{"text":"Cryptography","start":87,"end":99,"id":14},{"text":"programs","start":100,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} {"text":"Lead Computer Forensics Investigator managing Grafana and Replication initiatives.","spans":[{"start":5,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":46,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-552827263,"_task_hash":-338070767,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Computer","start":5,"end":13,"id":1},{"text":"Forensics","start":14,"end":23,"id":2},{"text":"Investigator","start":24,"end":36,"id":3},{"text":"managing","start":37,"end":45,"id":4},{"text":"Grafana","start":46,"end":53,"id":5},{"text":"and","start":54,"end":57,"id":6},{"text":"Replication","start":58,"end":69,"id":7},{"text":"initiatives","start":70,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} {"text":"Looking for Copywriter to lead BYOD Security initiatives.","spans":[{"start":12,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":2},{"start":31,"end":44,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":529330304,"_task_hash":-1889252770,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Copywriter","start":12,"end":22,"id":2},{"text":"to","start":23,"end":25,"id":3},{"text":"lead","start":26,"end":30,"id":4},{"text":"BYOD","start":31,"end":35,"id":5},{"text":"Security","start":36,"end":44,"id":6},{"text":"initiatives","start":45,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} {"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} {"text":"Ethical Hacker role available: Refactoring experience required, Security Architecture knowledge essential.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":31,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":64,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1202588342,"_task_hash":-236414328,"tokens":[{"text":"Ethical","start":0,"end":7,"id":0},{"text":"Hacker","start":8,"end":14,"id":1},{"text":"role","start":15,"end":19,"id":2},{"text":"available","start":20,"end":29,"id":3},{"text":":","start":29,"end":30,"id":4},{"text":"Refactoring","start":31,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"required","start":54,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"Security","start":64,"end":72,"id":9},{"text":"Architecture","start":73,"end":85,"id":10},{"text":"knowledge","start":86,"end":95,"id":11},{"text":"essential","start":96,"end":105,"id":12},{"text":".","start":105,"end":106,"id":13}]} {"text":"Vendor Manager professional with 5++ years implementing EDR Tools and managing Training Metrics programs.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":8},{"start":79,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":644474781,"_task_hash":1977709523,"tokens":[{"text":"Vendor","start":0,"end":6,"id":0},{"text":"Manager","start":7,"end":14,"id":1},{"text":"professional","start":15,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"5++","start":33,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"implementing","start":43,"end":55,"id":6},{"text":"EDR","start":56,"end":59,"id":7},{"text":"Tools","start":60,"end":65,"id":8},{"text":"and","start":66,"end":69,"id":9},{"text":"managing","start":70,"end":78,"id":10},{"text":"Training","start":79,"end":87,"id":11},{"text":"Metrics","start":88,"end":95,"id":12},{"text":"programs","start":96,"end":104,"id":13},{"text":".","start":104,"end":105,"id":14}]} {"text":"Proficient in Nessus and Nessus.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":31,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-369654999,"_task_hash":1384127287,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Nessus","start":25,"end":31,"id":4},{"text":".","start":31,"end":32,"id":5}]} {"text":"Implemented BAS solution for enterprise security monitoring.","spans":[{"start":12,"end":15,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":945540005,"_task_hash":-1432346015,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"BAS","start":12,"end":15,"id":1},{"text":"solution","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"enterprise","start":29,"end":39,"id":4},{"text":"security","start":40,"end":48,"id":5},{"text":"monitoring","start":49,"end":59,"id":6},{"text":".","start":59,"end":60,"id":7}]} {"text":"Looking for Game Engineer to lead Bluetooth Security initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":52,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1871410498,"_task_hash":-1651246727,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Game","start":12,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Bluetooth","start":34,"end":43,"id":6},{"text":"Security","start":44,"end":52,"id":7},{"text":"initiatives","start":53,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Automated Compliance Audit processes using scripts.","spans":[{"start":10,"end":26,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-68824718,"_task_hash":1775034563,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"Compliance","start":10,"end":20,"id":1},{"text":"Audit","start":21,"end":26,"id":2},{"text":"processes","start":27,"end":36,"id":3},{"text":"using","start":37,"end":42,"id":4},{"text":"scripts","start":43,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"The CISO implemented SIEM to detect ransomware attacks.","spans":[{"start":4,"end":8,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":21,"end":25,"label":"ACRONYM","answer":"accept","token_start":3,"token_end":3},{"start":36,"end":46,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":78488116,"_task_hash":1299651586,"tokens":[{"text":"The","start":0,"end":3,"id":0},{"text":"CISO","start":4,"end":8,"id":1},{"text":"implemented","start":9,"end":20,"id":2},{"text":"SIEM","start":21,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"detect","start":29,"end":35,"id":5},{"text":"ransomware","start":36,"end":46,"id":6},{"text":"attacks","start":47,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Crisis Management Specialist needed for enterprise security team.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-325641103,"_task_hash":811741460,"tokens":[{"text":"Crisis","start":0,"end":6,"id":0},{"text":"Management","start":7,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"needed","start":29,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"enterprise","start":40,"end":50,"id":5},{"text":"security","start":51,"end":59,"id":6},{"text":"team","start":60,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} {"text":"CI/CD certification a plus.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1024606257,"_task_hash":1277001965,"tokens":[{"text":"CI","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"CD","start":3,"end":5,"id":2},{"text":"certification","start":6,"end":19,"id":3},{"text":"a","start":20,"end":21,"id":4},{"text":"plus","start":22,"end":26,"id":5},{"text":".","start":26,"end":27,"id":6}]} {"text":"Certified SABSA working as Research Scientist, focused on Cloud Security Posture Management and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12},{"start":96,"end":100,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-224986300,"_task_hash":-1202083823,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Research","start":27,"end":35,"id":4},{"text":"Scientist","start":36,"end":45,"id":5},{"text":",","start":45,"end":46,"id":6},{"text":"focused","start":47,"end":54,"id":7},{"text":"on","start":55,"end":57,"id":8},{"text":"Cloud","start":58,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"Posture","start":73,"end":80,"id":11},{"text":"Management","start":81,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"CSRF","start":96,"end":100,"id":14},{"text":"prevention","start":101,"end":111,"id":15},{"text":".","start":111,"end":112,"id":16}]} {"text":"VP of Security with GPEN certification, expert in Mimikatz.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":20,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":4,"token_end":4},{"start":50,"end":58,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1437086526,"_task_hash":2004633689,"tokens":[{"text":"VP","start":0,"end":2,"id":0},{"text":"of","start":3,"end":5,"id":1},{"text":"Security","start":6,"end":14,"id":2},{"text":"with","start":15,"end":19,"id":3},{"text":"GPEN","start":20,"end":24,"id":4},{"text":"certification","start":25,"end":38,"id":5},{"text":",","start":38,"end":39,"id":6},{"text":"expert","start":40,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Mimikatz","start":50,"end":58,"id":9},{"text":".","start":58,"end":59,"id":10}]} {"text":"Must know Metasploit, SIEM Operations, and OWASP Top 10.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":22,"end":37,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-290458725,"_task_hash":-1049576649,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":",","start":20,"end":21,"id":3},{"text":"SIEM","start":22,"end":26,"id":4},{"text":"Operations","start":27,"end":37,"id":5},{"text":",","start":37,"end":38,"id":6},{"text":"and","start":39,"end":42,"id":7},{"text":"OWASP","start":43,"end":48,"id":8},{"text":"Top","start":49,"end":52,"id":9},{"text":"10","start":53,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} {"text":"Security Architect experienced in detecting Man-in-the-Middle attacks using Nessus.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":11},{"start":76,"end":82,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":550822876,"_task_hash":1947618975,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Architect","start":9,"end":18,"id":1},{"text":"experienced","start":19,"end":30,"id":2},{"text":"in","start":31,"end":33,"id":3},{"text":"detecting","start":34,"end":43,"id":4},{"text":"Man","start":44,"end":47,"id":5},{"text":"-","start":47,"end":48,"id":6},{"text":"in","start":48,"end":50,"id":7},{"text":"-","start":50,"end":51,"id":8},{"text":"the","start":51,"end":54,"id":9},{"text":"-","start":54,"end":55,"id":10},{"text":"Middle","start":55,"end":61,"id":11},{"text":"attacks","start":62,"end":69,"id":12},{"text":"using","start":70,"end":75,"id":13},{"text":"Nessus","start":76,"end":82,"id":14},{"text":".","start":82,"end":83,"id":15}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"Delivered Audit Program findings to executive team.","spans":[{"start":10,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2},{"start":10,"end":23,"label":"AUDIT_TERM","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1553767199,"_task_hash":1763393962,"tokens":[{"text":"Delivered","start":0,"end":9,"id":0},{"text":"Audit","start":10,"end":15,"id":1},{"text":"Program","start":16,"end":23,"id":2},{"text":"findings","start":24,"end":32,"id":3},{"text":"to","start":33,"end":35,"id":4},{"text":"executive","start":36,"end":45,"id":5},{"text":"team","start":46,"end":50,"id":6},{"text":".","start":50,"end":51,"id":7}]} {"text":"Experienced Endpoint Security Engineer specializing in Security Scanning Tools.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1002635329,"_task_hash":1603478008,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Endpoint","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Engineer","start":30,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Scanning","start":64,"end":72,"id":7},{"text":"Tools","start":73,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} {"text":"Accomplished Game Programmer specializing in Report Writing and Embedded Systems Security.","spans":[{"start":13,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1429980838,"_task_hash":-76433270,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Game","start":13,"end":17,"id":1},{"text":"Programmer","start":18,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Report","start":45,"end":51,"id":5},{"text":"Writing","start":52,"end":59,"id":6},{"text":"and","start":60,"end":63,"id":7},{"text":"Embedded","start":64,"end":72,"id":8},{"text":"Systems","start":73,"end":80,"id":9},{"text":"Security","start":81,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} {"text":"Certified OPA working as Compliance Manager, focused on Wireless Security and Privilege Escalation prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":56,"end":73,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":78,"end":98,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1129725579,"_task_hash":714739167,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OPA","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Compliance","start":25,"end":35,"id":4},{"text":"Manager","start":36,"end":43,"id":5},{"text":",","start":43,"end":44,"id":6},{"text":"focused","start":45,"end":52,"id":7},{"text":"on","start":53,"end":55,"id":8},{"text":"Wireless","start":56,"end":64,"id":9},{"text":"Security","start":65,"end":73,"id":10},{"text":"and","start":74,"end":77,"id":11},{"text":"Privilege","start":78,"end":87,"id":12},{"text":"Escalation","start":88,"end":98,"id":13},{"text":"prevention","start":99,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} {"text":"Senior Security Cryptographer skilled in RESTful APIs, Data Pipelines, and CI/CD Security.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":75,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-182323480,"_task_hash":-1732666528,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Cryptographer","start":16,"end":29,"id":2},{"text":"skilled","start":30,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"RESTful","start":41,"end":48,"id":5},{"text":"APIs","start":49,"end":53,"id":6},{"text":",","start":53,"end":54,"id":7},{"text":"Data","start":55,"end":59,"id":8},{"text":"Pipelines","start":60,"end":69,"id":9},{"text":",","start":69,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"CI","start":75,"end":77,"id":12},{"text":"/","start":77,"end":78,"id":13},{"text":"CD","start":78,"end":80,"id":14},{"text":"Security","start":81,"end":89,"id":15},{"text":".","start":89,"end":90,"id":16}]} {"text":"Mitigated ARP Spoofing through code remediation.","spans":[{"start":10,"end":22,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":451245496,"_task_hash":1704415088,"tokens":[{"text":"Mitigated","start":0,"end":9,"id":0},{"text":"ARP","start":10,"end":13,"id":1},{"text":"Spoofing","start":14,"end":22,"id":2},{"text":"through","start":23,"end":30,"id":3},{"text":"code","start":31,"end":35,"id":4},{"text":"remediation","start":36,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} {"text":"We need a Data Privacy Officer skilled in SSRF prevention and DDoS analysis using SIEM.","spans":[{"start":10,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":42,"end":46,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":8},{"start":62,"end":66,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":82,"end":86,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":250810882,"_task_hash":2032647657,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Data","start":10,"end":14,"id":3},{"text":"Privacy","start":15,"end":22,"id":4},{"text":"Officer","start":23,"end":30,"id":5},{"text":"skilled","start":31,"end":38,"id":6},{"text":"in","start":39,"end":41,"id":7},{"text":"SSRF","start":42,"end":46,"id":8},{"text":"prevention","start":47,"end":57,"id":9},{"text":"and","start":58,"end":61,"id":10},{"text":"DDoS","start":62,"end":66,"id":11},{"text":"analysis","start":67,"end":75,"id":12},{"text":"using","start":76,"end":81,"id":13},{"text":"SIEM","start":82,"end":86,"id":14},{"text":".","start":86,"end":87,"id":15}]} {"text":"Responded to script kiddie incident affecting 1000+ users.","spans":[{"start":13,"end":26,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":3},{"start":13,"end":26,"label":"THREAT_TYPE","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":186733025,"_task_hash":-687968292,"tokens":[{"text":"Responded","start":0,"end":9,"id":0},{"text":"to","start":10,"end":12,"id":1},{"text":"script","start":13,"end":19,"id":2},{"text":"kiddie","start":20,"end":26,"id":3},{"text":"incident","start":27,"end":35,"id":4},{"text":"affecting","start":36,"end":45,"id":5},{"text":"1000","start":46,"end":50,"id":6},{"text":"+","start":50,"end":51,"id":7},{"text":"users","start":52,"end":57,"id":8},{"text":".","start":57,"end":58,"id":9}]} {"text":"Expert in COPPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":849420153,"_task_hash":-371286602,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"COPPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} {"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} {"text":"SDET professional with 5+ years implementing ELK Stack and managing Penetration Testing programs.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":45,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":8},{"start":68,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1816657896,"_task_hash":600772991,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"professional","start":5,"end":17,"id":1},{"text":"with","start":18,"end":22,"id":2},{"text":"5","start":23,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"implementing","start":32,"end":44,"id":6},{"text":"ELK","start":45,"end":48,"id":7},{"text":"Stack","start":49,"end":54,"id":8},{"text":"and","start":55,"end":58,"id":9},{"text":"managing","start":59,"end":67,"id":10},{"text":"Penetration","start":68,"end":79,"id":11},{"text":"Testing","start":80,"end":87,"id":12},{"text":"programs","start":88,"end":96,"id":13},{"text":".","start":96,"end":97,"id":14}]} {"text":"Reverse engineered CVE-2020-0688 exploit for threat intelligence.","spans":[{"start":19,"end":32,"label":"CVE","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2113163516,"_task_hash":-401583181,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"engineered","start":8,"end":18,"id":1},{"text":"CVE-2020","start":19,"end":27,"id":2},{"text":"-","start":27,"end":28,"id":3},{"text":"0688","start":28,"end":32,"id":4},{"text":"exploit","start":33,"end":40,"id":5},{"text":"for","start":41,"end":44,"id":6},{"text":"threat","start":45,"end":51,"id":7},{"text":"intelligence","start":52,"end":64,"id":8},{"text":".","start":64,"end":65,"id":9}]} {"text":"Certified IAM working as Threat Intel Analyst, focused on Bluetooth Security and XSS prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":58,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":84,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1830220479,"_task_hash":-1760083531,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IAM","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Threat","start":25,"end":31,"id":4},{"text":"Intel","start":32,"end":37,"id":5},{"text":"Analyst","start":38,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"focused","start":47,"end":54,"id":8},{"text":"on","start":55,"end":57,"id":9},{"text":"Bluetooth","start":58,"end":67,"id":10},{"text":"Security","start":68,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"XSS","start":81,"end":84,"id":13},{"text":"prevention","start":85,"end":95,"id":14},{"text":".","start":95,"end":96,"id":15}]} {"text":"Experienced Enterprise Cloud Architect specializing in Security Scanning Tools.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":397961479,"_task_hash":-838354317,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Enterprise","start":12,"end":22,"id":1},{"text":"Cloud","start":23,"end":28,"id":2},{"text":"Architect","start":29,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Scanning","start":64,"end":72,"id":7},{"text":"Tools","start":73,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} {"text":"Developed detection for Kerberoasting attacks.","spans":[{"start":24,"end":37,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1245690388,"_task_hash":-876454787,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Kerberoasting","start":24,"end":37,"id":3},{"text":"attacks","start":38,"end":45,"id":4},{"text":".","start":45,"end":46,"id":5}]} {"text":"Looking for DevOps Engineer to lead GCP Security initiatives.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-313776545,"_task_hash":445121415,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"DevOps","start":12,"end":18,"id":2},{"text":"Engineer","start":19,"end":27,"id":3},{"text":"to","start":28,"end":30,"id":4},{"text":"lead","start":31,"end":35,"id":5},{"text":"GCP","start":36,"end":39,"id":6},{"text":"Security","start":40,"end":48,"id":7},{"text":"initiatives","start":49,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} {"text":"Experienced PM specializing in Email Gateway Security.","spans":[{"start":12,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":31,"end":53,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":696527191,"_task_hash":-2047869119,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"PM","start":12,"end":14,"id":1},{"text":"specializing","start":15,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"Email","start":31,"end":36,"id":4},{"text":"Gateway","start":37,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} {"text":"Mentored junior engineers in OT Security.","spans":[{"start":29,"end":40,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1933219315,"_task_hash":-812924365,"tokens":[{"text":"Mentored","start":0,"end":8,"id":0},{"text":"junior","start":9,"end":15,"id":1},{"text":"engineers","start":16,"end":25,"id":2},{"text":"in","start":26,"end":28,"id":3},{"text":"OT","start":29,"end":31,"id":4},{"text":"Security","start":32,"end":40,"id":5},{"text":".","start":40,"end":41,"id":6}]} {"text":"Ensured compliance with CFAA requirements.","spans":[{"start":24,"end":28,"label":"REGULATION","answer":"accept","token_start":3,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-208361241,"_task_hash":1726349732,"tokens":[{"text":"Ensured","start":0,"end":7,"id":0},{"text":"compliance","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"CFAA","start":24,"end":28,"id":3},{"text":"requirements","start":29,"end":41,"id":4},{"text":".","start":41,"end":42,"id":5}]} {"text":"Developed Endpoint Security strategy and roadmap.","spans":[{"start":10,"end":27,"label":"SECURITY_DOMAIN","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1433926551,"_task_hash":-829989790,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"Endpoint","start":10,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"strategy","start":28,"end":36,"id":3},{"text":"and","start":37,"end":40,"id":4},{"text":"roadmap","start":41,"end":48,"id":5},{"text":".","start":48,"end":49,"id":6}]} {"text":"Expert in Cloud Security best practices.","spans":[{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3},{"start":10,"end":24,"label":"SECURITY_DOMAIN","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1765489286,"_task_hash":889848186,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"Cloud","start":10,"end":15,"id":2},{"text":"Security","start":16,"end":24,"id":3},{"text":"best","start":25,"end":29,"id":4},{"text":"practices","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} {"text":"Security Vulnerability Analyst opportunity: Lead Container Security program, implement OWASP Top 10, manage R operations.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":87,"end":99,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":108,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1596493666,"_task_hash":687354870,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"opportunity","start":31,"end":42,"id":3},{"text":":","start":42,"end":43,"id":4},{"text":"Lead","start":44,"end":48,"id":5},{"text":"Container","start":49,"end":58,"id":6},{"text":"Security","start":59,"end":67,"id":7},{"text":"program","start":68,"end":75,"id":8},{"text":",","start":75,"end":76,"id":9},{"text":"implement","start":77,"end":86,"id":10},{"text":"OWASP","start":87,"end":92,"id":11},{"text":"Top","start":93,"end":96,"id":12},{"text":"10","start":97,"end":99,"id":13},{"text":",","start":99,"end":100,"id":14},{"text":"manage","start":101,"end":107,"id":15},{"text":"R","start":108,"end":109,"id":16},{"text":"operations","start":110,"end":120,"id":17},{"text":".","start":120,"end":121,"id":18}]} {"text":"CCPA certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2126018288,"_task_hash":-1395112851,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} {"text":"Developed detection for Reflective DLL Loading attacks.","spans":[{"start":24,"end":46,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":5},{"start":24,"end":46,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-883053769,"_task_hash":-1790845556,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Reflective","start":24,"end":34,"id":3},{"text":"DLL","start":35,"end":38,"id":4},{"text":"Loading","start":39,"end":46,"id":5},{"text":"attacks","start":47,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} {"text":"Required skills: Nessus, Hacking, SPF/DKIM/DMARC certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":32,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":34,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":976207021,"_task_hash":1229202436,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Hacking","start":25,"end":32,"id":5},{"text":",","start":32,"end":33,"id":6},{"text":"SPF","start":34,"end":37,"id":7},{"text":"/","start":37,"end":38,"id":8},{"text":"DKIM","start":38,"end":42,"id":9},{"text":"/","start":42,"end":43,"id":10},{"text":"DMARC","start":43,"end":48,"id":11},{"text":"certification","start":49,"end":62,"id":12},{"text":".","start":62,"end":63,"id":13}]} {"text":"Managed TPM infrastructure for Fortune 500 client.","spans":[{"start":8,"end":11,"label":"ACRONYM","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":1708464378,"_task_hash":-1336492455,"tokens":[{"text":"Managed","start":0,"end":7,"id":0},{"text":"TPM","start":8,"end":11,"id":1},{"text":"infrastructure","start":12,"end":26,"id":2},{"text":"for","start":27,"end":30,"id":3},{"text":"Fortune","start":31,"end":38,"id":4},{"text":"500","start":39,"end":42,"id":5},{"text":"client","start":43,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} {"text":"Accomplished Server-Side Developer specializing in Antivirus/Antimalware and Security Operations.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":51,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":77,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1012452100,"_task_hash":1190843855,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Server","start":13,"end":19,"id":1},{"text":"-","start":19,"end":20,"id":2},{"text":"Side","start":20,"end":24,"id":3},{"text":"Developer","start":25,"end":34,"id":4},{"text":"specializing","start":35,"end":47,"id":5},{"text":"in","start":48,"end":50,"id":6},{"text":"Antivirus","start":51,"end":60,"id":7},{"text":"/","start":60,"end":61,"id":8},{"text":"Antimalware","start":61,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"Operations","start":86,"end":96,"id":12},{"text":".","start":96,"end":97,"id":13}]} {"text":"Seeking Industrial IoT Security Specialist with 3+ years experience in X-Ways Forensics and Network Analysis.","spans":[{"start":8,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":92,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2045265785,"_task_hash":-2089715692,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Industrial","start":8,"end":18,"id":1},{"text":"IoT","start":19,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"Specialist","start":32,"end":42,"id":4},{"text":"with","start":43,"end":47,"id":5},{"text":"3","start":48,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"X","start":71,"end":72,"id":11},{"text":"-","start":72,"end":73,"id":12},{"text":"Ways","start":73,"end":77,"id":13},{"text":"Forensics","start":78,"end":87,"id":14},{"text":"and","start":88,"end":91,"id":15},{"text":"Network","start":92,"end":99,"id":16},{"text":"Analysis","start":100,"end":108,"id":17},{"text":".","start":108,"end":109,"id":18}]} {"text":"Lead User Experience Designer managing Infrastructure as Code and High Availability initiatives.","spans":[{"start":5,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":66,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1553302392,"_task_hash":897690669,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"User","start":5,"end":9,"id":1},{"text":"Experience","start":10,"end":20,"id":2},{"text":"Designer","start":21,"end":29,"id":3},{"text":"managing","start":30,"end":38,"id":4},{"text":"Infrastructure","start":39,"end":53,"id":5},{"text":"as","start":54,"end":56,"id":6},{"text":"Code","start":57,"end":61,"id":7},{"text":"and","start":62,"end":65,"id":8},{"text":"High","start":66,"end":70,"id":9},{"text":"Availability","start":71,"end":83,"id":10},{"text":"initiatives","start":84,"end":95,"id":11},{"text":".","start":95,"end":96,"id":12}]} {"text":"Server Administrator with expertise in OWASP Top 10 compliance and Data Analysis operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-2040134061,"_task_hash":-694766818,"tokens":[{"text":"Server","start":0,"end":6,"id":0},{"text":"Administrator","start":7,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"expertise","start":26,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"OWASP","start":39,"end":44,"id":5},{"text":"Top","start":45,"end":48,"id":6},{"text":"10","start":49,"end":51,"id":7},{"text":"compliance","start":52,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"Data","start":67,"end":71,"id":10},{"text":"Analysis","start":72,"end":80,"id":11},{"text":"operations","start":81,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} {"text":"Developed detection for Living off the Land attacks.","spans":[{"start":24,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":6},{"start":24,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":6},{"start":24,"end":43,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":6}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-525001901,"_task_hash":493823524,"tokens":[{"text":"Developed","start":0,"end":9,"id":0},{"text":"detection","start":10,"end":19,"id":1},{"text":"for","start":20,"end":23,"id":2},{"text":"Living","start":24,"end":30,"id":3},{"text":"off","start":31,"end":34,"id":4},{"text":"the","start":35,"end":38,"id":5},{"text":"Land","start":39,"end":43,"id":6},{"text":"attacks","start":44,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"Must have SIEM experience and NIST Framework knowledge.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1703965436,"_task_hash":1407445997,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"experience","start":15,"end":25,"id":3},{"text":"and","start":26,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"knowledge","start":45,"end":54,"id":7},{"text":".","start":54,"end":55,"id":8}]} {"text":"Software Development Engineer in Test experienced in detecting phishing attacks using EDR Tools.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":63,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8},{"start":86,"end":95,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":670365147,"_task_hash":890903907,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Development","start":9,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Test","start":33,"end":37,"id":4},{"text":"experienced","start":38,"end":49,"id":5},{"text":"in","start":50,"end":52,"id":6},{"text":"detecting","start":53,"end":62,"id":7},{"text":"phishing","start":63,"end":71,"id":8},{"text":"attacks","start":72,"end":79,"id":9},{"text":"using","start":80,"end":85,"id":10},{"text":"EDR","start":86,"end":89,"id":11},{"text":"Tools","start":90,"end":95,"id":12},{"text":".","start":95,"end":96,"id":13}]} {"text":"Enterprise Risk Analyst experienced in detecting malware attacks using ELK Stack.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":56,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":71,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-296309182,"_task_hash":760394514,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"experienced","start":24,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"detecting","start":39,"end":48,"id":5},{"text":"malware","start":49,"end":56,"id":6},{"text":"attacks","start":57,"end":64,"id":7},{"text":"using","start":65,"end":70,"id":8},{"text":"ELK","start":71,"end":74,"id":9},{"text":"Stack","start":75,"end":80,"id":10},{"text":".","start":80,"end":81,"id":11}]} {"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} {"text":"Cyber Forensics Analyst needed for enterprise security team.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2081256573,"_task_hash":301490327,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"needed","start":24,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"security","start":46,"end":54,"id":6},{"text":"team","start":55,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} {"text":"FERPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1817666216,"_task_hash":1295086938,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} {"text":"Trained developers on Session Hijacking prevention.","spans":[{"start":22,"end":39,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":2054012059,"_task_hash":2032604451,"tokens":[{"text":"Trained","start":0,"end":7,"id":0},{"text":"developers","start":8,"end":18,"id":1},{"text":"on","start":19,"end":21,"id":2},{"text":"Session","start":22,"end":29,"id":3},{"text":"Hijacking","start":30,"end":39,"id":4},{"text":"prevention","start":40,"end":50,"id":5},{"text":".","start":50,"end":51,"id":6}]} {"text":"PCI DSS required.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1624047420,"_task_hash":1330394467,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"DSS","start":4,"end":7,"id":1},{"text":"required","start":8,"end":16,"id":2},{"text":".","start":16,"end":17,"id":3}]} {"text":"Reported SOC 2 CC7.1 compliance status to leadership.","spans":[{"start":9,"end":20,"label":"CONTROL_ID","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1650998673,"_task_hash":274127640,"tokens":[{"text":"Reported","start":0,"end":8,"id":0},{"text":"SOC","start":9,"end":12,"id":1},{"text":"2","start":13,"end":14,"id":2},{"text":"CC7.1","start":15,"end":20,"id":3},{"text":"compliance","start":21,"end":31,"id":4},{"text":"status","start":32,"end":38,"id":5},{"text":"to","start":39,"end":41,"id":6},{"text":"leadership","start":42,"end":52,"id":7},{"text":".","start":52,"end":53,"id":8}]} {"text":"Pen Tester with hands-on experience in EDR Tools, Nessus, and Email Gateway Security.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":48,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9},{"start":50,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":62,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-2093630042,"_task_hash":1182551715,"tokens":[{"text":"Pen","start":0,"end":3,"id":0},{"text":"Tester","start":4,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"hands","start":16,"end":21,"id":3},{"text":"-","start":21,"end":22,"id":4},{"text":"on","start":22,"end":24,"id":5},{"text":"experience","start":25,"end":35,"id":6},{"text":"in","start":36,"end":38,"id":7},{"text":"EDR","start":39,"end":42,"id":8},{"text":"Tools","start":43,"end":48,"id":9},{"text":",","start":48,"end":49,"id":10},{"text":"Nessus","start":50,"end":56,"id":11},{"text":",","start":56,"end":57,"id":12},{"text":"and","start":58,"end":61,"id":13},{"text":"Email","start":62,"end":67,"id":14},{"text":"Gateway","start":68,"end":75,"id":15},{"text":"Security","start":76,"end":84,"id":16},{"text":".","start":84,"end":85,"id":17}]} {"text":"Cloud Security Architect role available: Zigbee experience required, Security Testing knowledge essential.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":41,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-769416583,"_task_hash":343370667,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Security","start":6,"end":14,"id":1},{"text":"Architect","start":15,"end":24,"id":2},{"text":"role","start":25,"end":29,"id":3},{"text":"available","start":30,"end":39,"id":4},{"text":":","start":39,"end":40,"id":5},{"text":"Zigbee","start":41,"end":47,"id":6},{"text":"experience","start":48,"end":58,"id":7},{"text":"required","start":59,"end":67,"id":8},{"text":",","start":67,"end":68,"id":9},{"text":"Security","start":69,"end":77,"id":10},{"text":"Testing","start":78,"end":85,"id":11},{"text":"knowledge","start":86,"end":95,"id":12},{"text":"essential","start":96,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} {"text":"IT Compliance Specialist with 10 years experience in Model Architecture Design, Hadoop, and Cloud Connectivity.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":10},{"start":80,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":92,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-619407199,"_task_hash":1606795546,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Compliance","start":3,"end":13,"id":1},{"text":"Specialist","start":14,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"10","start":30,"end":32,"id":4},{"text":"years","start":33,"end":38,"id":5},{"text":"experience","start":39,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Model","start":53,"end":58,"id":8},{"text":"Architecture","start":59,"end":71,"id":9},{"text":"Design","start":72,"end":78,"id":10},{"text":",","start":78,"end":79,"id":11},{"text":"Hadoop","start":80,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"and","start":88,"end":91,"id":14},{"text":"Cloud","start":92,"end":97,"id":15},{"text":"Connectivity","start":98,"end":110,"id":16},{"text":".","start":110,"end":111,"id":17}]} {"text":"Experience with SAST platforms and integration.","spans":[{"start":16,"end":20,"label":"ACRONYM","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-1680773727,"_task_hash":-614207082,"tokens":[{"text":"Experience","start":0,"end":10,"id":0},{"text":"with","start":11,"end":15,"id":1},{"text":"SAST","start":16,"end":20,"id":2},{"text":"platforms","start":21,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"integration","start":35,"end":46,"id":5},{"text":".","start":46,"end":47,"id":6}]} {"text":"Automated SEC Cyber Rules compliance monitoring.","spans":[{"start":10,"end":25,"label":"REGULATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-240737436,"_task_hash":565535120,"tokens":[{"text":"Automated","start":0,"end":9,"id":0},{"text":"SEC","start":10,"end":13,"id":1},{"text":"Cyber","start":14,"end":19,"id":2},{"text":"Rules","start":20,"end":25,"id":3},{"text":"compliance","start":26,"end":36,"id":4},{"text":"monitoring","start":37,"end":47,"id":5},{"text":".","start":47,"end":48,"id":6}]} {"text":"Product Security Engineer with 3 years experience in Marketing Copy, Business Intelligence, and Risk Management.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":96,"end":111,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":290928991,"_task_hash":-1536411780,"tokens":[{"text":"Product","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"3","start":31,"end":32,"id":4},{"text":"years","start":33,"end":38,"id":5},{"text":"experience","start":39,"end":49,"id":6},{"text":"in","start":50,"end":52,"id":7},{"text":"Marketing","start":53,"end":62,"id":8},{"text":"Copy","start":63,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Business","start":69,"end":77,"id":11},{"text":"Intelligence","start":78,"end":90,"id":12},{"text":",","start":90,"end":91,"id":13},{"text":"and","start":92,"end":95,"id":14},{"text":"Risk","start":96,"end":100,"id":15},{"text":"Management","start":101,"end":111,"id":16},{"text":".","start":111,"end":112,"id":17}]} {"text":"Lead Release Manager managing Surveillance Systems and Technical Writing initiatives.","spans":[{"start":5,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":285717096,"_task_hash":632976725,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Release","start":5,"end":12,"id":1},{"text":"Manager","start":13,"end":20,"id":2},{"text":"managing","start":21,"end":29,"id":3},{"text":"Surveillance","start":30,"end":42,"id":4},{"text":"Systems","start":43,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Technical","start":55,"end":64,"id":7},{"text":"Writing","start":65,"end":72,"id":8},{"text":"initiatives","start":73,"end":84,"id":9},{"text":".","start":84,"end":85,"id":10}]} {"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} {"text":"Must know Wireshark, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":33,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-661029319,"_task_hash":1086212867,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Nessus","start":21,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"and","start":29,"end":32,"id":6},{"text":"OWASP","start":33,"end":38,"id":7},{"text":"Top","start":39,"end":42,"id":8},{"text":"10","start":43,"end":45,"id":9},{"text":".","start":45,"end":46,"id":10}]} {"text":"Fined under GDPR for data breach notification delay.","spans":[{"start":12,"end":16,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"synthetic_improved"},"_input_hash":-115458361,"_task_hash":-1725725282,"tokens":[{"text":"Fined","start":0,"end":5,"id":0},{"text":"under","start":6,"end":11,"id":1},{"text":"GDPR","start":12,"end":16,"id":2},{"text":"for","start":17,"end":20,"id":3},{"text":"data","start":21,"end":25,"id":4},{"text":"breach","start":26,"end":32,"id":5},{"text":"notification","start":33,"end":45,"id":6},{"text":"delay","start":46,"end":51,"id":7},{"text":".","start":51,"end":52,"id":8}]} {"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} {"text":"Infrastructure Security Engineer with hands-on experience in SIEM, Splunk, and Email Gateway Security.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":61,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":67,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":101,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1091193734,"_task_hash":57239241,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"with","start":33,"end":37,"id":3},{"text":"hands","start":38,"end":43,"id":4},{"text":"-","start":43,"end":44,"id":5},{"text":"on","start":44,"end":46,"id":6},{"text":"experience","start":47,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"SIEM","start":61,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"Splunk","start":67,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Email","start":79,"end":84,"id":14},{"text":"Gateway","start":85,"end":92,"id":15},{"text":"Security","start":93,"end":101,"id":16},{"text":".","start":101,"end":102,"id":17}]}