diff --git "a/evaluation.jsonl" "b/evaluation.jsonl" new file mode 100644--- /dev/null +++ "b/evaluation.jsonl" @@ -0,0 +1,351 @@ +{"text":"Accomplished Security Compliance Officer specializing in Control Mapping and Bluetooth Security.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":77,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1179755132,"_task_hash":1551877757,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Compliance","start":22,"end":32,"id":2},{"text":"Officer","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Control","start":57,"end":64,"id":6},{"text":"Mapping","start":65,"end":72,"id":7},{"text":"and","start":73,"end":76,"id":8},{"text":"Bluetooth","start":77,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Join our team as Connected Device Security Specialist!","spans":[{"start":17,"end":53,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-800134200,"_task_hash":1575745476,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Connected","start":17,"end":26,"id":4},{"text":"Device","start":27,"end":33,"id":5},{"text":"Security","start":34,"end":42,"id":6},{"text":"Specialist","start":43,"end":53,"id":7},{"text":"!","start":53,"end":54,"id":8}]} +{"text":"Must know SIEM, QRadar, and OWASP Top 10.","spans":[{"start":10,"end":14,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1657276668,"_task_hash":-615589961,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"QRadar","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":".","start":40,"end":41,"id":10}]} +{"text":"MFA & SSO certification a plus.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":771046618,"_task_hash":-1899894933,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"certification","start":10,"end":23,"id":3},{"text":"a","start":24,"end":25,"id":4},{"text":"plus","start":26,"end":30,"id":5},{"text":".","start":30,"end":31,"id":6}]} +{"text":"Integration Specialist experienced in detecting malware attacks using Nessus.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":55,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":70,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1504909019,"_task_hash":-140585424,"tokens":[{"text":"Integration","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"malware","start":48,"end":55,"id":5},{"text":"attacks","start":56,"end":63,"id":6},{"text":"using","start":64,"end":69,"id":7},{"text":"Nessus","start":70,"end":76,"id":8},{"text":".","start":76,"end":77,"id":9}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Human Factor Security Specialist opportunity: Lead Azure Security program, implement NIST Framework, manage Performance Tuning operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":51,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8},{"start":85,"end":99,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-1990025043,"_task_hash":-921854473,"tokens":[{"text":"Human","start":0,"end":5,"id":0},{"text":"Factor","start":6,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"opportunity","start":33,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"Lead","start":46,"end":50,"id":6},{"text":"Azure","start":51,"end":56,"id":7},{"text":"Security","start":57,"end":65,"id":8},{"text":"program","start":66,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"implement","start":75,"end":84,"id":11},{"text":"NIST","start":85,"end":89,"id":12},{"text":"Framework","start":90,"end":99,"id":13},{"text":",","start":99,"end":100,"id":14},{"text":"manage","start":101,"end":107,"id":15},{"text":"Performance","start":108,"end":119,"id":16},{"text":"Tuning","start":120,"end":126,"id":17},{"text":"operations","start":127,"end":137,"id":18},{"text":".","start":137,"end":138,"id":19}]} +{"text":"Experienced IAM Engineer specializing in Cloud Security.","spans":[{"start":12,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":308036260,"_task_hash":1313167417,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IAM","start":12,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"specializing","start":25,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Cloud","start":41,"end":46,"id":5},{"text":"Security","start":47,"end":55,"id":6},{"text":".","start":55,"end":56,"id":7}]} +{"text":"Proficient in Burp Suite and Wireshark.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":74102493,"_task_hash":1528570037,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Wireshark","start":29,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} +{"text":"Accomplished Quality Assurance Engineer specializing in Model Explainability and Cisco Security.","spans":[{"start":13,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":81,"end":95,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1085597199,"_task_hash":1238925514,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Quality","start":13,"end":20,"id":1},{"text":"Assurance","start":21,"end":30,"id":2},{"text":"Engineer","start":31,"end":39,"id":3},{"text":"specializing","start":40,"end":52,"id":4},{"text":"in","start":53,"end":55,"id":5},{"text":"Model","start":56,"end":61,"id":6},{"text":"Explainability","start":62,"end":76,"id":7},{"text":"and","start":77,"end":80,"id":8},{"text":"Cisco","start":81,"end":86,"id":9},{"text":"Security","start":87,"end":95,"id":10},{"text":".","start":95,"end":96,"id":11}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"ML Research Scientist experienced in detecting ransomware attacks using CrowdStrike.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":44203192,"_task_hash":-464813632,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Research","start":3,"end":11,"id":1},{"text":"Scientist","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"CrowdStrike","start":72,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Data Privacy Analyst opportunity: Lead AI Security program, implement NIST Framework, manage API Testing operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":50,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":70,"end":84,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":93,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":949601256,"_task_hash":-563169786,"tokens":[{"text":"Data","start":0,"end":4,"id":0},{"text":"Privacy","start":5,"end":12,"id":1},{"text":"Analyst","start":13,"end":20,"id":2},{"text":"opportunity","start":21,"end":32,"id":3},{"text":":","start":32,"end":33,"id":4},{"text":"Lead","start":34,"end":38,"id":5},{"text":"AI","start":39,"end":41,"id":6},{"text":"Security","start":42,"end":50,"id":7},{"text":"program","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"implement","start":60,"end":69,"id":10},{"text":"NIST","start":70,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":",","start":84,"end":85,"id":13},{"text":"manage","start":86,"end":92,"id":14},{"text":"API","start":93,"end":96,"id":15},{"text":"Testing","start":97,"end":104,"id":16},{"text":"operations","start":105,"end":115,"id":17},{"text":".","start":115,"end":116,"id":18}]} +{"text":"Looking for Server-Side Developer to lead API Security initiatives.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":5},{"start":42,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-687060429,"_task_hash":-613256071,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Server","start":12,"end":18,"id":2},{"text":"-","start":18,"end":19,"id":3},{"text":"Side","start":19,"end":23,"id":4},{"text":"Developer","start":24,"end":33,"id":5},{"text":"to","start":34,"end":36,"id":6},{"text":"lead","start":37,"end":41,"id":7},{"text":"API","start":42,"end":45,"id":8},{"text":"Security","start":46,"end":54,"id":9},{"text":"initiatives","start":55,"end":66,"id":10},{"text":".","start":66,"end":67,"id":11}]} +{"text":"Must have QRadar experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1097696822,"_task_hash":-943825386,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"QRadar","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Experienced Endpoint Security Engineer specializing in Security Scanning Tools.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":55,"end":78,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1002635329,"_task_hash":1603478008,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Endpoint","start":12,"end":20,"id":1},{"text":"Security","start":21,"end":29,"id":2},{"text":"Engineer","start":30,"end":38,"id":3},{"text":"specializing","start":39,"end":51,"id":4},{"text":"in","start":52,"end":54,"id":5},{"text":"Security","start":55,"end":63,"id":6},{"text":"Scanning","start":64,"end":72,"id":7},{"text":"Tools","start":73,"end":78,"id":8},{"text":".","start":78,"end":79,"id":9}]} +{"text":"Proficient in EDR Platforms and Nessus.","spans":[{"start":14,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":32,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":834658253,"_task_hash":-486266097,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"EDR","start":14,"end":17,"id":2},{"text":"Platforms","start":18,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"Nessus","start":32,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} +{"text":"Looking for Software Security Engineer to lead Cloud Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1395114012,"_task_hash":-318739536,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Cloud","start":47,"end":52,"id":7},{"text":"Security","start":53,"end":61,"id":8},{"text":"Architecture","start":62,"end":74,"id":9},{"text":"initiatives","start":75,"end":86,"id":10},{"text":".","start":86,"end":87,"id":11}]} +{"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} +{"text":"Join our team as Copywriter!","spans":[{"start":17,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":264160960,"_task_hash":661764470,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Copywriter","start":17,"end":27,"id":4},{"text":"!","start":27,"end":28,"id":5}]} +{"text":"Must know SIEM Operations, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":27,"end":33,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-106006301,"_task_hash":705663433,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":",","start":25,"end":26,"id":4},{"text":"Nessus","start":27,"end":33,"id":5},{"text":",","start":33,"end":34,"id":6},{"text":"and","start":35,"end":38,"id":7},{"text":"OWASP","start":39,"end":44,"id":8},{"text":"Top","start":45,"end":48,"id":9},{"text":"10","start":49,"end":51,"id":10},{"text":".","start":51,"end":52,"id":11}]} +{"text":"NIST RMF certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1708361409,"_task_hash":252404575,"tokens":[{"text":"NIST","start":0,"end":4,"id":0},{"text":"RMF","start":5,"end":8,"id":1},{"text":"certification","start":9,"end":22,"id":2},{"text":"a","start":23,"end":24,"id":3},{"text":"plus","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} +{"text":"Senior Back-End Developer position: 7 years minimum, expert in Cisco, Documentation, and Wireless Security.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":63,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":13},{"start":70,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15},{"start":89,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-364695713,"_task_hash":1003410513,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Back","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"End","start":12,"end":15,"id":3},{"text":"Developer","start":16,"end":25,"id":4},{"text":"position","start":26,"end":34,"id":5},{"text":":","start":34,"end":35,"id":6},{"text":"7","start":36,"end":37,"id":7},{"text":"years","start":38,"end":43,"id":8},{"text":"minimum","start":44,"end":51,"id":9},{"text":",","start":51,"end":52,"id":10},{"text":"expert","start":53,"end":59,"id":11},{"text":"in","start":60,"end":62,"id":12},{"text":"Cisco","start":63,"end":68,"id":13},{"text":",","start":68,"end":69,"id":14},{"text":"Documentation","start":70,"end":83,"id":15},{"text":",","start":83,"end":84,"id":16},{"text":"and","start":85,"end":88,"id":17},{"text":"Wireless","start":89,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} +{"text":"Seeking GRC Specialist with 3+ years experience in R and Secure Multi-Party Computation.","spans":[{"start":8,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":57,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-657164487,"_task_hash":-379869526,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"GRC","start":8,"end":11,"id":1},{"text":"Specialist","start":12,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"3","start":28,"end":29,"id":4},{"text":"+","start":29,"end":30,"id":5},{"text":"years","start":31,"end":36,"id":6},{"text":"experience","start":37,"end":47,"id":7},{"text":"in","start":48,"end":50,"id":8},{"text":"R","start":51,"end":52,"id":9},{"text":"and","start":53,"end":56,"id":10},{"text":"Secure","start":57,"end":63,"id":11},{"text":"Multi","start":64,"end":69,"id":12},{"text":"-","start":69,"end":70,"id":13},{"text":"Party","start":70,"end":75,"id":14},{"text":"Computation","start":76,"end":87,"id":15},{"text":".","start":87,"end":88,"id":16}]} +{"text":"MFA & SSO required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-239499753,"_task_hash":-1526678368,"tokens":[{"text":"MFA","start":0,"end":3,"id":0},{"text":"&","start":4,"end":5,"id":1},{"text":"SSO","start":6,"end":9,"id":2},{"text":"required","start":10,"end":18,"id":3},{"text":".","start":18,"end":19,"id":4}]} +{"text":"Seeking VP Information Security with 5++ years experience in Technology Strategy and Unreal.","spans":[{"start":8,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":61,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1085413242,"_task_hash":-1026359513,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"VP","start":8,"end":10,"id":1},{"text":"Information","start":11,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"experience","start":47,"end":57,"id":7},{"text":"in","start":58,"end":60,"id":8},{"text":"Technology","start":61,"end":71,"id":9},{"text":"Strategy","start":72,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Unreal","start":85,"end":91,"id":12},{"text":".","start":91,"end":92,"id":13}]} +{"text":"C/C++ required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":699091344,"_task_hash":1704612957,"tokens":[{"text":"C","start":0,"end":1,"id":0},{"text":"/","start":1,"end":2,"id":1},{"text":"C++","start":2,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} +{"text":"Hiring Forensic Examiner for React Native and worm detection.","spans":[{"start":7,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":29,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":46,"end":50,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1241334109,"_task_hash":-1428753276,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Forensic","start":7,"end":15,"id":1},{"text":"Examiner","start":16,"end":24,"id":2},{"text":"for","start":25,"end":28,"id":3},{"text":"React","start":29,"end":34,"id":4},{"text":"Native","start":35,"end":41,"id":5},{"text":"and","start":42,"end":45,"id":6},{"text":"worm","start":46,"end":50,"id":7},{"text":"detection","start":51,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} +{"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Enterprise Cloud Architect with expertise in OWASP Top 10 compliance and Digital Forensics operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":73,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-1116201797,"_task_hash":-2036307767,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"expertise","start":32,"end":41,"id":4},{"text":"in","start":42,"end":44,"id":5},{"text":"OWASP","start":45,"end":50,"id":6},{"text":"Top","start":51,"end":54,"id":7},{"text":"10","start":55,"end":57,"id":8},{"text":"compliance","start":58,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"Digital","start":73,"end":80,"id":11},{"text":"Forensics","start":81,"end":90,"id":12},{"text":"operations","start":91,"end":101,"id":13},{"text":".","start":101,"end":102,"id":14}]} +{"text":"Senior Cloud Native Security Engineer position: 10 years minimum, expert in Content Management Systems, Ghidra, and Terraform Security.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":76,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15},{"start":104,"end":110,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":17},{"start":116,"end":134,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-567450947,"_task_hash":858755741,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Native","start":13,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"position","start":38,"end":46,"id":5},{"text":":","start":46,"end":47,"id":6},{"text":"10","start":48,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"minimum","start":57,"end":64,"id":9},{"text":",","start":64,"end":65,"id":10},{"text":"expert","start":66,"end":72,"id":11},{"text":"in","start":73,"end":75,"id":12},{"text":"Content","start":76,"end":83,"id":13},{"text":"Management","start":84,"end":94,"id":14},{"text":"Systems","start":95,"end":102,"id":15},{"text":",","start":102,"end":103,"id":16},{"text":"Ghidra","start":104,"end":110,"id":17},{"text":",","start":110,"end":111,"id":18},{"text":"and","start":112,"end":115,"id":19},{"text":"Terraform","start":116,"end":125,"id":20},{"text":"Security","start":126,"end":134,"id":21},{"text":".","start":134,"end":135,"id":22}]} +{"text":"Network Security Engineer experienced in detecting botnet attacks using SIEM.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":76,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1009607125,"_task_hash":-593704316,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Engineer","start":17,"end":25,"id":2},{"text":"experienced","start":26,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"detecting","start":41,"end":50,"id":5},{"text":"botnet","start":51,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"SIEM","start":72,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Service Incident Manager professional with 7+ years implementing ELK Stack and managing Expert Testimony programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":65,"end":74,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":88,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-780763799,"_task_hash":-347210040,"tokens":[{"text":"Service","start":0,"end":7,"id":0},{"text":"Incident","start":8,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"professional","start":25,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"7","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"implementing","start":52,"end":64,"id":8},{"text":"ELK","start":65,"end":68,"id":9},{"text":"Stack","start":69,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"managing","start":79,"end":87,"id":12},{"text":"Expert","start":88,"end":94,"id":13},{"text":"Testimony","start":95,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} +{"text":"Video Game Developer needed for enterprise security team.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":632897693,"_task_hash":-1327652147,"tokens":[{"text":"Video","start":0,"end":5,"id":0},{"text":"Game","start":6,"end":10,"id":1},{"text":"Developer","start":11,"end":20,"id":2},{"text":"needed","start":21,"end":27,"id":3},{"text":"for","start":28,"end":31,"id":4},{"text":"enterprise","start":32,"end":42,"id":5},{"text":"security","start":43,"end":51,"id":6},{"text":"team","start":52,"end":56,"id":7},{"text":".","start":56,"end":57,"id":8}]} +{"text":"Required: OSCP Certification, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":28,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":30,"end":39,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":57,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1224765620,"_task_hash":-1703529489,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"OSCP","start":10,"end":14,"id":2},{"text":"Certification","start":15,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"ELK","start":30,"end":33,"id":5},{"text":"Stack","start":34,"end":39,"id":6},{"text":",","start":39,"end":40,"id":7},{"text":"and","start":41,"end":44,"id":8},{"text":"OWASP","start":45,"end":50,"id":9},{"text":"Top","start":51,"end":54,"id":10},{"text":"10","start":55,"end":57,"id":11},{"text":"expertise","start":58,"end":67,"id":12},{"text":".","start":67,"end":68,"id":13}]} +{"text":"Seeking Game Engineer with 3+ years experience in Enterprise Risk Management and Process Improvement.","spans":[{"start":8,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":50,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":81,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":660322616,"_task_hash":-362025316,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Game","start":8,"end":12,"id":1},{"text":"Engineer","start":13,"end":21,"id":2},{"text":"with","start":22,"end":26,"id":3},{"text":"3","start":27,"end":28,"id":4},{"text":"+","start":28,"end":29,"id":5},{"text":"years","start":30,"end":35,"id":6},{"text":"experience","start":36,"end":46,"id":7},{"text":"in","start":47,"end":49,"id":8},{"text":"Enterprise","start":50,"end":60,"id":9},{"text":"Risk","start":61,"end":65,"id":10},{"text":"Management","start":66,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"Process","start":81,"end":88,"id":13},{"text":"Improvement","start":89,"end":100,"id":14},{"text":".","start":100,"end":101,"id":15}]} +{"text":"SLAM required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":45167728,"_task_hash":1981946623,"tokens":[{"text":"SLAM","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Cyberpunk Hacker with 10+ years experience in Intelligence Analysis, Third-Party Risk, and System Maintenance.","spans":[{"start":0,"end":16,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":46,"end":67,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":91,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1570087959,"_task_hash":1698623478,"tokens":[{"text":"Cyberpunk","start":0,"end":9,"id":0},{"text":"Hacker","start":10,"end":16,"id":1},{"text":"with","start":17,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"+","start":24,"end":25,"id":4},{"text":"years","start":26,"end":31,"id":5},{"text":"experience","start":32,"end":42,"id":6},{"text":"in","start":43,"end":45,"id":7},{"text":"Intelligence","start":46,"end":58,"id":8},{"text":"Analysis","start":59,"end":67,"id":9},{"text":",","start":67,"end":68,"id":10},{"text":"Third","start":69,"end":74,"id":11},{"text":"-","start":74,"end":75,"id":12},{"text":"Party","start":75,"end":80,"id":13},{"text":"Risk","start":81,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"and","start":87,"end":90,"id":16},{"text":"System","start":91,"end":97,"id":17},{"text":"Maintenance","start":98,"end":109,"id":18},{"text":".","start":109,"end":110,"id":19}]} +{"text":"Holds ISO 31000 certification.","spans":[{"start":6,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":461633574,"_task_hash":-1331949047,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"ISO","start":6,"end":9,"id":1},{"text":"31000","start":10,"end":15,"id":2},{"text":"certification","start":16,"end":29,"id":3},{"text":".","start":29,"end":30,"id":4}]} +{"text":"Senior Disaster Recovery Specialist position: 5+ years minimum, expert in Identity Lifecycle, Data Modeling, and Security Patterns.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":74,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":94,"end":107,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":113,"end":130,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-236312413,"_task_hash":505572690,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Disaster","start":7,"end":15,"id":1},{"text":"Recovery","start":16,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"position","start":36,"end":44,"id":4},{"text":":","start":44,"end":45,"id":5},{"text":"5","start":46,"end":47,"id":6},{"text":"+","start":47,"end":48,"id":7},{"text":"years","start":49,"end":54,"id":8},{"text":"minimum","start":55,"end":62,"id":9},{"text":",","start":62,"end":63,"id":10},{"text":"expert","start":64,"end":70,"id":11},{"text":"in","start":71,"end":73,"id":12},{"text":"Identity","start":74,"end":82,"id":13},{"text":"Lifecycle","start":83,"end":92,"id":14},{"text":",","start":92,"end":93,"id":15},{"text":"Data","start":94,"end":98,"id":16},{"text":"Modeling","start":99,"end":107,"id":17},{"text":",","start":107,"end":108,"id":18},{"text":"and","start":109,"end":112,"id":19},{"text":"Security","start":113,"end":121,"id":20},{"text":"Patterns","start":122,"end":130,"id":21},{"text":".","start":130,"end":131,"id":22}]} +{"text":"Looking for Ethical Hacker to lead Security Culture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":51,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1333134731,"_task_hash":506412747,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Ethical","start":12,"end":19,"id":2},{"text":"Hacker","start":20,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Security","start":35,"end":43,"id":6},{"text":"Culture","start":44,"end":51,"id":7},{"text":"initiatives","start":52,"end":63,"id":8},{"text":".","start":63,"end":64,"id":9}]} +{"text":"Must have Metasploit experience and NIST Framework knowledge.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1480510370,"_task_hash":1790832856,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":"experience","start":21,"end":31,"id":3},{"text":"and","start":32,"end":35,"id":4},{"text":"NIST","start":36,"end":40,"id":5},{"text":"Framework","start":41,"end":50,"id":6},{"text":"knowledge","start":51,"end":60,"id":7},{"text":".","start":60,"end":61,"id":8}]} +{"text":"Accomplished Sysadmin specializing in RESTful APIs and Kubernetes Security.","spans":[{"start":13,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":38,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":74,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-422357775,"_task_hash":-111400691,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Sysadmin","start":13,"end":21,"id":1},{"text":"specializing","start":22,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"RESTful","start":38,"end":45,"id":4},{"text":"APIs","start":46,"end":50,"id":5},{"text":"and","start":51,"end":54,"id":6},{"text":"Kubernetes","start":55,"end":65,"id":7},{"text":"Security","start":66,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Experienced Test Automation Engineer specializing in Pod Security.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":65,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-234572808,"_task_hash":-722647711,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Test","start":12,"end":16,"id":1},{"text":"Automation","start":17,"end":27,"id":2},{"text":"Engineer","start":28,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Pod","start":53,"end":56,"id":6},{"text":"Security","start":57,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} +{"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} +{"text":"Accomplished Compliance Manager specializing in Differential Privacy and AWS Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":73,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":881088367,"_task_hash":1812560522,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Compliance","start":13,"end":23,"id":1},{"text":"Manager","start":24,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Differential","start":48,"end":60,"id":5},{"text":"Privacy","start":61,"end":68,"id":6},{"text":"and","start":69,"end":72,"id":7},{"text":"AWS","start":73,"end":76,"id":8},{"text":"Security","start":77,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Looking for Robotic Systems Engineer to lead Hardware Security initiatives.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":45,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1265229985,"_task_hash":373716405,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Robotic","start":12,"end":19,"id":2},{"text":"Systems","start":20,"end":27,"id":3},{"text":"Engineer","start":28,"end":36,"id":4},{"text":"to","start":37,"end":39,"id":5},{"text":"lead","start":40,"end":44,"id":6},{"text":"Hardware","start":45,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} +{"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} +{"text":"Looking for Security Monitoring Analyst to lead Mobile Security initiatives.","spans":[{"start":12,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":48,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1486834487,"_task_hash":2136723309,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Security","start":12,"end":20,"id":2},{"text":"Monitoring","start":21,"end":31,"id":3},{"text":"Analyst","start":32,"end":39,"id":4},{"text":"to","start":40,"end":42,"id":5},{"text":"lead","start":43,"end":47,"id":6},{"text":"Mobile","start":48,"end":54,"id":7},{"text":"Security","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} +{"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Experienced DevOps Architect specializing in MQTT Security.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":651891005,"_task_hash":816126202,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"DevOps","start":12,"end":18,"id":1},{"text":"Architect","start":19,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"MQTT","start":45,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} +{"text":"Proficient in Splunk and EDR Tools.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1003087028,"_task_hash":1250982942,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"EDR","start":25,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":".","start":34,"end":35,"id":6}]} +{"text":"We need a Lead Software Engineer skilled in Cross-Site Scripting prevention and malware analysis using SIEM Operations.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":44,"end":64,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":11},{"start":80,"end":87,"label":"THREAT_TYPE","answer":"accept","token_start":14,"token_end":14},{"start":103,"end":118,"label":"SECURITY_TOOL","answer":"accept","token_start":17,"token_end":18}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-62018750,"_task_hash":360614429,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Lead","start":10,"end":14,"id":3},{"text":"Software","start":15,"end":23,"id":4},{"text":"Engineer","start":24,"end":32,"id":5},{"text":"skilled","start":33,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Cross","start":44,"end":49,"id":8},{"text":"-","start":49,"end":50,"id":9},{"text":"Site","start":50,"end":54,"id":10},{"text":"Scripting","start":55,"end":64,"id":11},{"text":"prevention","start":65,"end":75,"id":12},{"text":"and","start":76,"end":79,"id":13},{"text":"malware","start":80,"end":87,"id":14},{"text":"analysis","start":88,"end":96,"id":15},{"text":"using","start":97,"end":102,"id":16},{"text":"SIEM","start":103,"end":107,"id":17},{"text":"Operations","start":108,"end":118,"id":18},{"text":".","start":118,"end":119,"id":19}]} +{"text":"Lead AI/ML Security Specialist managing Model Deployment and Staff Development initiatives.","spans":[{"start":5,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":61,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1873643412,"_task_hash":-558886895,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"AI","start":5,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"ML","start":8,"end":10,"id":3},{"text":"Security","start":11,"end":19,"id":4},{"text":"Specialist","start":20,"end":30,"id":5},{"text":"managing","start":31,"end":39,"id":6},{"text":"Model","start":40,"end":45,"id":7},{"text":"Deployment","start":46,"end":56,"id":8},{"text":"and","start":57,"end":60,"id":9},{"text":"Staff","start":61,"end":66,"id":10},{"text":"Development","start":67,"end":78,"id":11},{"text":"initiatives","start":79,"end":90,"id":12},{"text":".","start":90,"end":91,"id":13}]} +{"text":"Expert in PCI-DSS compliance.","spans":[{"start":10,"end":17,"label":"REGULATION","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1404278891,"_task_hash":899131140,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"PCI","start":10,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"DSS","start":14,"end":17,"id":4},{"text":"compliance","start":18,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} +{"text":"Certified NIST RMF working as Technology Manager, focused on Security Culture and Clickjacking prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":82,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1978344870,"_task_hash":1176686237,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Technology","start":30,"end":40,"id":5},{"text":"Manager","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Security","start":61,"end":69,"id":10},{"text":"Culture","start":70,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Clickjacking","start":82,"end":94,"id":13},{"text":"prevention","start":95,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} +{"text":"Hiring Test Engineer for Shaders and trojan detection.","spans":[{"start":7,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":25,"end":32,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":37,"end":43,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1362019885,"_task_hash":1157514645,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Test","start":7,"end":11,"id":1},{"text":"Engineer","start":12,"end":20,"id":2},{"text":"for","start":21,"end":24,"id":3},{"text":"Shaders","start":25,"end":32,"id":4},{"text":"and","start":33,"end":36,"id":5},{"text":"trojan","start":37,"end":43,"id":6},{"text":"detection","start":44,"end":53,"id":7},{"text":".","start":53,"end":54,"id":8}]} +{"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} +{"text":"Business Intelligence Developer with expertise in OWASP Top 10 compliance and Responsive Design operations.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":62,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":78,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-390213284,"_task_hash":515086785,"tokens":[{"text":"Business","start":0,"end":8,"id":0},{"text":"Intelligence","start":9,"end":21,"id":1},{"text":"Developer","start":22,"end":31,"id":2},{"text":"with","start":32,"end":36,"id":3},{"text":"expertise","start":37,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"OWASP","start":50,"end":55,"id":6},{"text":"Top","start":56,"end":59,"id":7},{"text":"10","start":60,"end":62,"id":8},{"text":"compliance","start":63,"end":73,"id":9},{"text":"and","start":74,"end":77,"id":10},{"text":"Responsive","start":78,"end":88,"id":11},{"text":"Design","start":89,"end":95,"id":12},{"text":"operations","start":96,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} +{"text":"Experienced Machine Learning Product Manager specializing in Supply Chain Security.","spans":[{"start":12,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":61,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":941309924,"_task_hash":165336706,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Machine","start":12,"end":19,"id":1},{"text":"Learning","start":20,"end":28,"id":2},{"text":"Product","start":29,"end":36,"id":3},{"text":"Manager","start":37,"end":44,"id":4},{"text":"specializing","start":45,"end":57,"id":5},{"text":"in","start":58,"end":60,"id":6},{"text":"Supply","start":61,"end":67,"id":7},{"text":"Chain","start":68,"end":73,"id":8},{"text":"Security","start":74,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} +{"text":"Proficient in SIEM and QRadar.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1727736061,"_task_hash":1875785462,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"QRadar","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} +{"text":"AI with hands-on experience in SIEM, QRadar, and Security Design.","spans":[{"start":0,"end":2,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":31,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":37,"end":43,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":49,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-877152545,"_task_hash":650211727,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"with","start":3,"end":7,"id":1},{"text":"hands","start":8,"end":13,"id":2},{"text":"-","start":13,"end":14,"id":3},{"text":"on","start":14,"end":16,"id":4},{"text":"experience","start":17,"end":27,"id":5},{"text":"in","start":28,"end":30,"id":6},{"text":"SIEM","start":31,"end":35,"id":7},{"text":",","start":35,"end":36,"id":8},{"text":"QRadar","start":37,"end":43,"id":9},{"text":",","start":43,"end":44,"id":10},{"text":"and","start":45,"end":48,"id":11},{"text":"Security","start":49,"end":57,"id":12},{"text":"Design","start":58,"end":64,"id":13},{"text":".","start":64,"end":65,"id":14}]} +{"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} +{"text":"Certified ETL working as Enterprise Risk Analyst, focused on Web App Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":48,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":77,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":12},{"start":82,"end":102,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1377424861,"_task_hash":-961801186,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ETL","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Enterprise","start":25,"end":35,"id":4},{"text":"Risk","start":36,"end":40,"id":5},{"text":"Analyst","start":41,"end":48,"id":6},{"text":",","start":48,"end":49,"id":7},{"text":"focused","start":50,"end":57,"id":8},{"text":"on","start":58,"end":60,"id":9},{"text":"Web","start":61,"end":64,"id":10},{"text":"App","start":65,"end":68,"id":11},{"text":"Security","start":69,"end":77,"id":12},{"text":"and","start":78,"end":81,"id":13},{"text":"Cross","start":82,"end":87,"id":14},{"text":"-","start":87,"end":88,"id":15},{"text":"Site","start":88,"end":92,"id":16},{"text":"Scripting","start":93,"end":102,"id":17},{"text":"prevention","start":103,"end":113,"id":18},{"text":".","start":113,"end":114,"id":19}]} +{"text":"Admin with hands-on experience in CrowdStrike, EDR Tools, and Model Security.","spans":[{"start":0,"end":5,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":34,"end":45,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":62,"end":76,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":782128303,"_task_hash":-1292701544,"tokens":[{"text":"Admin","start":0,"end":5,"id":0},{"text":"with","start":6,"end":10,"id":1},{"text":"hands","start":11,"end":16,"id":2},{"text":"-","start":16,"end":17,"id":3},{"text":"on","start":17,"end":19,"id":4},{"text":"experience","start":20,"end":30,"id":5},{"text":"in","start":31,"end":33,"id":6},{"text":"CrowdStrike","start":34,"end":45,"id":7},{"text":",","start":45,"end":46,"id":8},{"text":"EDR","start":47,"end":50,"id":9},{"text":"Tools","start":51,"end":56,"id":10},{"text":",","start":56,"end":57,"id":11},{"text":"and","start":58,"end":61,"id":12},{"text":"Model","start":62,"end":67,"id":13},{"text":"Security","start":68,"end":76,"id":14},{"text":".","start":76,"end":77,"id":15}]} +{"text":"Holds SOC 2.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":556305966,"_task_hash":-2022141598,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SOC","start":6,"end":9,"id":1},{"text":"2","start":10,"end":11,"id":2},{"text":".","start":11,"end":12,"id":3}]} +{"text":"Information Specialist experienced in detecting Supply Chain Attack attacks using ELK Stack.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":48,"end":67,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":7},{"start":82,"end":91,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-351152042,"_task_hash":1935482598,"tokens":[{"text":"Information","start":0,"end":11,"id":0},{"text":"Specialist","start":12,"end":22,"id":1},{"text":"experienced","start":23,"end":34,"id":2},{"text":"in","start":35,"end":37,"id":3},{"text":"detecting","start":38,"end":47,"id":4},{"text":"Supply","start":48,"end":54,"id":5},{"text":"Chain","start":55,"end":60,"id":6},{"text":"Attack","start":61,"end":67,"id":7},{"text":"attacks","start":68,"end":75,"id":8},{"text":"using","start":76,"end":81,"id":9},{"text":"ELK","start":82,"end":85,"id":10},{"text":"Stack","start":86,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Enterprise Cloud Architect professional with 7+ years implementing EDR Platforms and managing YARA Rules programs.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":67,"end":80,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":94,"end":104,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1318026610,"_task_hash":467244188,"tokens":[{"text":"Enterprise","start":0,"end":10,"id":0},{"text":"Cloud","start":11,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"professional","start":27,"end":39,"id":3},{"text":"with","start":40,"end":44,"id":4},{"text":"7","start":45,"end":46,"id":5},{"text":"+","start":46,"end":47,"id":6},{"text":"years","start":48,"end":53,"id":7},{"text":"implementing","start":54,"end":66,"id":8},{"text":"EDR","start":67,"end":70,"id":9},{"text":"Platforms","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"managing","start":85,"end":93,"id":12},{"text":"YARA","start":94,"end":98,"id":13},{"text":"Rules","start":99,"end":104,"id":14},{"text":"programs","start":105,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} +{"text":"Certified NLP working as Full Stack Engineer, focused on CI/CD Security and SQL Injection prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":13},{"start":76,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-55874807,"_task_hash":-341092672,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Full","start":25,"end":29,"id":4},{"text":"Stack","start":30,"end":35,"id":5},{"text":"Engineer","start":36,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"CI","start":57,"end":59,"id":10},{"text":"/","start":59,"end":60,"id":11},{"text":"CD","start":60,"end":62,"id":12},{"text":"Security","start":63,"end":71,"id":13},{"text":"and","start":72,"end":75,"id":14},{"text":"SQL","start":76,"end":79,"id":15},{"text":"Injection","start":80,"end":89,"id":16},{"text":"prevention","start":90,"end":100,"id":17},{"text":".","start":100,"end":101,"id":18}]} +{"text":"Hiring AI/ML Product Manager for Psychology and adware detection.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":5},{"start":33,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7},{"start":48,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":31090923,"_task_hash":1121998727,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"AI","start":7,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"ML","start":10,"end":12,"id":3},{"text":"Product","start":13,"end":20,"id":4},{"text":"Manager","start":21,"end":28,"id":5},{"text":"for","start":29,"end":32,"id":6},{"text":"Psychology","start":33,"end":43,"id":7},{"text":"and","start":44,"end":47,"id":8},{"text":"adware","start":48,"end":54,"id":9},{"text":"detection","start":55,"end":64,"id":10},{"text":".","start":64,"end":65,"id":11}]} +{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Malware Reverse Engineer opportunity: Lead Pod Security program, implement OWASP Top 10, manage Spark operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":75,"end":87,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":13},{"start":96,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":534212351,"_task_hash":-33304797,"tokens":[{"text":"Malware","start":0,"end":7,"id":0},{"text":"Reverse","start":8,"end":15,"id":1},{"text":"Engineer","start":16,"end":24,"id":2},{"text":"opportunity","start":25,"end":36,"id":3},{"text":":","start":36,"end":37,"id":4},{"text":"Lead","start":38,"end":42,"id":5},{"text":"Pod","start":43,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"program","start":56,"end":63,"id":8},{"text":",","start":63,"end":64,"id":9},{"text":"implement","start":65,"end":74,"id":10},{"text":"OWASP","start":75,"end":80,"id":11},{"text":"Top","start":81,"end":84,"id":12},{"text":"10","start":85,"end":87,"id":13},{"text":",","start":87,"end":88,"id":14},{"text":"manage","start":89,"end":95,"id":15},{"text":"Spark","start":96,"end":101,"id":16},{"text":"operations","start":102,"end":112,"id":17},{"text":".","start":112,"end":113,"id":18}]} +{"text":"Lead Information Specialist managing Dark Web Monitoring and Motion Planning initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":6},{"start":61,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-3268458,"_task_hash":-832781846,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Information","start":5,"end":16,"id":1},{"text":"Specialist","start":17,"end":27,"id":2},{"text":"managing","start":28,"end":36,"id":3},{"text":"Dark","start":37,"end":41,"id":4},{"text":"Web","start":42,"end":45,"id":5},{"text":"Monitoring","start":46,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Motion","start":61,"end":67,"id":8},{"text":"Planning","start":68,"end":76,"id":9},{"text":"initiatives","start":77,"end":88,"id":10},{"text":".","start":88,"end":89,"id":11}]} +{"text":"Expert in FISMA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1438046706,"_task_hash":-1778807143,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FISMA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"Senior Content Marketing Specialist skilled in RESTful APIs, Compliance, and GCP Security.","spans":[{"start":7,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":47,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":61,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1114664692,"_task_hash":-723902705,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Content","start":7,"end":14,"id":1},{"text":"Marketing","start":15,"end":24,"id":2},{"text":"Specialist","start":25,"end":35,"id":3},{"text":"skilled","start":36,"end":43,"id":4},{"text":"in","start":44,"end":46,"id":5},{"text":"RESTful","start":47,"end":54,"id":6},{"text":"APIs","start":55,"end":59,"id":7},{"text":",","start":59,"end":60,"id":8},{"text":"Compliance","start":61,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"GCP","start":77,"end":80,"id":12},{"text":"Security","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} +{"text":"SAML certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1108473182,"_task_hash":-1907986411,"tokens":[{"text":"SAML","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"Looking for Game Engineer to lead Service Mesh Security initiatives.","spans":[{"start":12,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":55,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-75876538,"_task_hash":-458552846,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Game","start":12,"end":16,"id":2},{"text":"Engineer","start":17,"end":25,"id":3},{"text":"to","start":26,"end":28,"id":4},{"text":"lead","start":29,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":"Mesh","start":42,"end":46,"id":7},{"text":"Security","start":47,"end":55,"id":8},{"text":"initiatives","start":56,"end":67,"id":9},{"text":".","start":67,"end":68,"id":10}]} +{"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} +{"text":"Reverse Engineering Analyst with expertise in NIST Framework compliance and Behavioral Analysis operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":60,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":95,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":803771858,"_task_hash":1665194450,"tokens":[{"text":"Reverse","start":0,"end":7,"id":0},{"text":"Engineering","start":8,"end":19,"id":1},{"text":"Analyst","start":20,"end":27,"id":2},{"text":"with","start":28,"end":32,"id":3},{"text":"expertise","start":33,"end":42,"id":4},{"text":"in","start":43,"end":45,"id":5},{"text":"NIST","start":46,"end":50,"id":6},{"text":"Framework","start":51,"end":60,"id":7},{"text":"compliance","start":61,"end":71,"id":8},{"text":"and","start":72,"end":75,"id":9},{"text":"Behavioral","start":76,"end":86,"id":10},{"text":"Analysis","start":87,"end":95,"id":11},{"text":"operations","start":96,"end":106,"id":12},{"text":".","start":106,"end":107,"id":13}]} +{"text":"SRE with hands-on experience in SIEM, Splunk, and BYOD Security.","spans":[{"start":0,"end":3,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":32,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":38,"end":44,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":50,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1213471425,"_task_hash":1328956055,"tokens":[{"text":"SRE","start":0,"end":3,"id":0},{"text":"with","start":4,"end":8,"id":1},{"text":"hands","start":9,"end":14,"id":2},{"text":"-","start":14,"end":15,"id":3},{"text":"on","start":15,"end":17,"id":4},{"text":"experience","start":18,"end":28,"id":5},{"text":"in","start":29,"end":31,"id":6},{"text":"SIEM","start":32,"end":36,"id":7},{"text":",","start":36,"end":37,"id":8},{"text":"Splunk","start":38,"end":44,"id":9},{"text":",","start":44,"end":45,"id":10},{"text":"and","start":46,"end":49,"id":11},{"text":"BYOD","start":50,"end":54,"id":12},{"text":"Security","start":55,"end":63,"id":13},{"text":".","start":63,"end":64,"id":14}]} +{"text":"Holds GDPR.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1954961026,"_task_hash":330250471,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GDPR","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Looking for AI/ML Security Specialist to lead Database Security initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":6},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":636089356,"_task_hash":-1660686896,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"AI","start":12,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"ML","start":15,"end":17,"id":4},{"text":"Security","start":18,"end":26,"id":5},{"text":"Specialist","start":27,"end":37,"id":6},{"text":"to","start":38,"end":40,"id":7},{"text":"lead","start":41,"end":45,"id":8},{"text":"Database","start":46,"end":54,"id":9},{"text":"Security","start":55,"end":63,"id":10},{"text":"initiatives","start":64,"end":75,"id":11},{"text":".","start":75,"end":76,"id":12}]} +{"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} +{"text":"Advanced Threat Hunter with 7 years experience in Requirements Analysis, Compliance Auditing, and Change Management.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":73,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":98,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-382930363,"_task_hash":1970453596,"tokens":[{"text":"Advanced","start":0,"end":8,"id":0},{"text":"Threat","start":9,"end":15,"id":1},{"text":"Hunter","start":16,"end":22,"id":2},{"text":"with","start":23,"end":27,"id":3},{"text":"7","start":28,"end":29,"id":4},{"text":"years","start":30,"end":35,"id":5},{"text":"experience","start":36,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"Requirements","start":50,"end":62,"id":8},{"text":"Analysis","start":63,"end":71,"id":9},{"text":",","start":71,"end":72,"id":10},{"text":"Compliance","start":73,"end":83,"id":11},{"text":"Auditing","start":84,"end":92,"id":12},{"text":",","start":92,"end":93,"id":13},{"text":"and","start":94,"end":97,"id":14},{"text":"Change","start":98,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":".","start":115,"end":116,"id":17}]} +{"text":"Holds IDS/IPS certification.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-851111634,"_task_hash":1084501406,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"IDS","start":6,"end":9,"id":1},{"text":"/","start":9,"end":10,"id":2},{"text":"IPS","start":10,"end":13,"id":3},{"text":"certification","start":14,"end":27,"id":4},{"text":".","start":27,"end":28,"id":5}]} +{"text":"Cyber Forensics Analyst needed for enterprise security team.","spans":[{"start":0,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-2081256573,"_task_hash":301490327,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Forensics","start":6,"end":15,"id":1},{"text":"Analyst","start":16,"end":23,"id":2},{"text":"needed","start":24,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"enterprise","start":35,"end":45,"id":5},{"text":"security","start":46,"end":54,"id":6},{"text":"team","start":55,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} +{"text":"Required: RBAC, EDR Tools, and NIST Framework expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":5},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-712529642,"_task_hash":-1097909170,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"RBAC","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"EDR","start":16,"end":19,"id":4},{"text":"Tools","start":20,"end":25,"id":5},{"text":",","start":25,"end":26,"id":6},{"text":"and","start":27,"end":30,"id":7},{"text":"NIST","start":31,"end":35,"id":8},{"text":"Framework","start":36,"end":45,"id":9},{"text":"expertise","start":46,"end":55,"id":10},{"text":".","start":55,"end":56,"id":11}]} +{"text":"Azure Architect with expertise in NIST Framework compliance and Protocols operations.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":34,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":64,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1596711979,"_task_hash":1403576846,"tokens":[{"text":"Azure","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"expertise","start":21,"end":30,"id":3},{"text":"in","start":31,"end":33,"id":4},{"text":"NIST","start":34,"end":38,"id":5},{"text":"Framework","start":39,"end":48,"id":6},{"text":"compliance","start":49,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Protocols","start":64,"end":73,"id":9},{"text":"operations","start":74,"end":84,"id":10},{"text":".","start":84,"end":85,"id":11}]} +{"text":"Lead Asset Manager managing Vendor Management and AI Policy initiatives.","spans":[{"start":5,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":28,"end":45,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":50,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1407350326,"_task_hash":-2103742763,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Asset","start":5,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"managing","start":19,"end":27,"id":3},{"text":"Vendor","start":28,"end":34,"id":4},{"text":"Management","start":35,"end":45,"id":5},{"text":"and","start":46,"end":49,"id":6},{"text":"AI","start":50,"end":52,"id":7},{"text":"Policy","start":53,"end":59,"id":8},{"text":"initiatives","start":60,"end":71,"id":9},{"text":".","start":71,"end":72,"id":10}]} +{"text":"Expert in SOX compliance.","spans":[{"start":10,"end":13,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1225255173,"_task_hash":-348442003,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOX","start":10,"end":13,"id":2},{"text":"compliance","start":14,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} +{"text":"Senior Application Security Specialist skilled in Test Automation, Red Team Operations, and Security Tools.","spans":[{"start":7,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":11},{"start":92,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":465398997,"_task_hash":1798525568,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Application","start":7,"end":18,"id":1},{"text":"Security","start":19,"end":27,"id":2},{"text":"Specialist","start":28,"end":38,"id":3},{"text":"skilled","start":39,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Test","start":50,"end":54,"id":6},{"text":"Automation","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Red","start":67,"end":70,"id":9},{"text":"Team","start":71,"end":75,"id":10},{"text":"Operations","start":76,"end":86,"id":11},{"text":",","start":86,"end":87,"id":12},{"text":"and","start":88,"end":91,"id":13},{"text":"Security","start":92,"end":100,"id":14},{"text":"Tools","start":101,"end":106,"id":15},{"text":".","start":106,"end":107,"id":16}]} +{"text":"GCP certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1956614200,"_task_hash":-459084267,"tokens":[{"text":"GCP","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Lead Anti-Phishing Specialist managing Performance Optimization and Model Serving initiatives.","spans":[{"start":5,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":39,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":68,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1342818651,"_task_hash":-505958493,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Anti","start":5,"end":9,"id":1},{"text":"-","start":9,"end":10,"id":2},{"text":"Phishing","start":10,"end":18,"id":3},{"text":"Specialist","start":19,"end":29,"id":4},{"text":"managing","start":30,"end":38,"id":5},{"text":"Performance","start":39,"end":50,"id":6},{"text":"Optimization","start":51,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Model","start":68,"end":73,"id":9},{"text":"Serving","start":74,"end":81,"id":10},{"text":"initiatives","start":82,"end":93,"id":11},{"text":".","start":93,"end":94,"id":12}]} +{"text":"Expert in SOC 2 compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1989106606,"_task_hash":1238591181,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"SOC","start":10,"end":13,"id":2},{"text":"2","start":14,"end":15,"id":3},{"text":"compliance","start":16,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Hiring Security Operations Analyst for System Maintenance and Man-in-the-Middle detection.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":79,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":652442928,"_task_hash":-878924852,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Operations","start":16,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"for","start":35,"end":38,"id":4},{"text":"System","start":39,"end":45,"id":5},{"text":"Maintenance","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Man","start":62,"end":65,"id":8},{"text":"-","start":65,"end":66,"id":9},{"text":"in","start":66,"end":68,"id":10},{"text":"-","start":68,"end":69,"id":11},{"text":"the","start":69,"end":72,"id":12},{"text":"-","start":72,"end":73,"id":13},{"text":"Middle","start":73,"end":79,"id":14},{"text":"detection","start":80,"end":89,"id":15},{"text":".","start":89,"end":90,"id":16}]} +{"text":"CCPA compliance experience preferred.","spans":[{"start":0,"end":4,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-638328070,"_task_hash":-761878376,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"compliance","start":5,"end":15,"id":1},{"text":"experience","start":16,"end":26,"id":2},{"text":"preferred","start":27,"end":36,"id":3},{"text":".","start":36,"end":37,"id":4}]} +{"text":"Looking for Frontend Engineer to lead Web Application Security initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":38,"end":62,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-207545630,"_task_hash":-164515385,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Frontend","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"to","start":30,"end":32,"id":4},{"text":"lead","start":33,"end":37,"id":5},{"text":"Web","start":38,"end":41,"id":6},{"text":"Application","start":42,"end":53,"id":7},{"text":"Security","start":54,"end":62,"id":8},{"text":"initiatives","start":63,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} +{"text":"Must have Wireshark experience and NIST Framework knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":812520218,"_task_hash":-999024222,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":"experience","start":20,"end":30,"id":3},{"text":"and","start":31,"end":34,"id":4},{"text":"NIST","start":35,"end":39,"id":5},{"text":"Framework","start":40,"end":49,"id":6},{"text":"knowledge","start":50,"end":59,"id":7},{"text":".","start":59,"end":60,"id":8}]} +{"text":"Certified SABSA working as Research Scientist, focused on Cloud Security Posture Management and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":58,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":12},{"start":96,"end":100,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-224986300,"_task_hash":-1202083823,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SABSA","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Research","start":27,"end":35,"id":4},{"text":"Scientist","start":36,"end":45,"id":5},{"text":",","start":45,"end":46,"id":6},{"text":"focused","start":47,"end":54,"id":7},{"text":"on","start":55,"end":57,"id":8},{"text":"Cloud","start":58,"end":63,"id":9},{"text":"Security","start":64,"end":72,"id":10},{"text":"Posture","start":73,"end":80,"id":11},{"text":"Management","start":81,"end":91,"id":12},{"text":"and","start":92,"end":95,"id":13},{"text":"CSRF","start":96,"end":100,"id":14},{"text":"prevention","start":101,"end":111,"id":15},{"text":".","start":111,"end":112,"id":16}]} +{"text":"Senior Video Game Developer skilled in Version Control, Threat Assessment, and Azure Security.","spans":[{"start":7,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":39,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2126103856,"_task_hash":57899092,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Video","start":7,"end":12,"id":1},{"text":"Game","start":13,"end":17,"id":2},{"text":"Developer","start":18,"end":27,"id":3},{"text":"skilled","start":28,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"Version","start":39,"end":46,"id":6},{"text":"Control","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"Threat","start":56,"end":62,"id":9},{"text":"Assessment","start":63,"end":73,"id":10},{"text":",","start":73,"end":74,"id":11},{"text":"and","start":75,"end":78,"id":12},{"text":"Azure","start":79,"end":84,"id":13},{"text":"Security","start":85,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} +{"text":"AWS certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":151569128,"_task_hash":446804433,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Certified ISO 31000 working as ML Ops Engineer, focused on Security Champions Program and Session Hijacking prevention.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":46,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":7},{"start":59,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13},{"start":90,"end":107,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1369026444,"_task_hash":778344688,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"ISO","start":10,"end":13,"id":1},{"text":"31000","start":14,"end":19,"id":2},{"text":"working","start":20,"end":27,"id":3},{"text":"as","start":28,"end":30,"id":4},{"text":"ML","start":31,"end":33,"id":5},{"text":"Ops","start":34,"end":37,"id":6},{"text":"Engineer","start":38,"end":46,"id":7},{"text":",","start":46,"end":47,"id":8},{"text":"focused","start":48,"end":55,"id":9},{"text":"on","start":56,"end":58,"id":10},{"text":"Security","start":59,"end":67,"id":11},{"text":"Champions","start":68,"end":77,"id":12},{"text":"Program","start":78,"end":85,"id":13},{"text":"and","start":86,"end":89,"id":14},{"text":"Session","start":90,"end":97,"id":15},{"text":"Hijacking","start":98,"end":107,"id":16},{"text":"prevention","start":108,"end":118,"id":17},{"text":".","start":118,"end":119,"id":18}]} +{"text":"SDET experienced in detecting adware attacks using QRadar.","spans":[{"start":0,"end":4,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":0},{"start":30,"end":36,"label":"THREAT_TYPE","answer":"accept","token_start":4,"token_end":4},{"start":51,"end":57,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1421940359,"_task_hash":-1250206968,"tokens":[{"text":"SDET","start":0,"end":4,"id":0},{"text":"experienced","start":5,"end":16,"id":1},{"text":"in","start":17,"end":19,"id":2},{"text":"detecting","start":20,"end":29,"id":3},{"text":"adware","start":30,"end":36,"id":4},{"text":"attacks","start":37,"end":44,"id":5},{"text":"using","start":45,"end":50,"id":6},{"text":"QRadar","start":51,"end":57,"id":7},{"text":".","start":57,"end":58,"id":8}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"IT Manager with 10 years experience in HTML/CSS, Bash, and Endpoint Detection and Response.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":49,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":59,"end":90,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":270561966,"_task_hash":-730834628,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"with","start":11,"end":15,"id":2},{"text":"10","start":16,"end":18,"id":3},{"text":"years","start":19,"end":24,"id":4},{"text":"experience","start":25,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"HTML","start":39,"end":43,"id":7},{"text":"/","start":43,"end":44,"id":8},{"text":"CSS","start":44,"end":47,"id":9},{"text":",","start":47,"end":48,"id":10},{"text":"Bash","start":49,"end":53,"id":11},{"text":",","start":53,"end":54,"id":12},{"text":"and","start":55,"end":58,"id":13},{"text":"Endpoint","start":59,"end":67,"id":14},{"text":"Detection","start":68,"end":77,"id":15},{"text":"and","start":78,"end":81,"id":16},{"text":"Response","start":82,"end":90,"id":17},{"text":".","start":90,"end":91,"id":18}]} +{"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Join our team as IT Incident Manager!","spans":[{"start":17,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-1898086970,"_task_hash":-1402998369,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"IT","start":17,"end":19,"id":4},{"text":"Incident","start":20,"end":28,"id":5},{"text":"Manager","start":29,"end":36,"id":6},{"text":"!","start":36,"end":37,"id":7}]} +{"text":"Must know Wireshark, CrowdStrike, and NIST Framework.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":506850155,"_task_hash":-1192668616,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"CrowdStrike","start":21,"end":32,"id":4},{"text":",","start":32,"end":33,"id":5},{"text":"and","start":34,"end":37,"id":6},{"text":"NIST","start":38,"end":42,"id":7},{"text":"Framework","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} +{"text":"OSCP Certification certification a plus.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":177069532,"_task_hash":1789774490,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"certification","start":19,"end":32,"id":2},{"text":"a","start":33,"end":34,"id":3},{"text":"plus","start":35,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Looking for Network Security Engineer to lead Security Scanning initiatives.","spans":[{"start":12,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":46,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-78234140,"_task_hash":1697654637,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Network","start":12,"end":19,"id":2},{"text":"Security","start":20,"end":28,"id":3},{"text":"Engineer","start":29,"end":37,"id":4},{"text":"to","start":38,"end":40,"id":5},{"text":"lead","start":41,"end":45,"id":6},{"text":"Security","start":46,"end":54,"id":7},{"text":"Scanning","start":55,"end":63,"id":8},{"text":"initiatives","start":64,"end":75,"id":9},{"text":".","start":75,"end":76,"id":10}]} +{"text":"Must have SIEM Operations experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-151256284,"_task_hash":1844433007,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"OWASP","start":41,"end":46,"id":6},{"text":"Top","start":47,"end":50,"id":7},{"text":"10","start":51,"end":53,"id":8},{"text":"knowledge","start":54,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} +{"text":"AI Ethics Specialist with expertise in NIST Framework compliance and Solution Frameworks operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":53,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":69,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-240303149,"_task_hash":1250505949,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Ethics","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"NIST","start":39,"end":43,"id":6},{"text":"Framework","start":44,"end":53,"id":7},{"text":"compliance","start":54,"end":64,"id":8},{"text":"and","start":65,"end":68,"id":9},{"text":"Solution","start":69,"end":77,"id":10},{"text":"Frameworks","start":78,"end":88,"id":11},{"text":"operations","start":89,"end":99,"id":12},{"text":".","start":99,"end":100,"id":13}]} +{"text":"Cryptology Expert experienced in detecting ransomware attacks using EDR Tools.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":385310314,"_task_hash":1076110720,"tokens":[{"text":"Cryptology","start":0,"end":10,"id":0},{"text":"Expert","start":11,"end":17,"id":1},{"text":"experienced","start":18,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"detecting","start":33,"end":42,"id":4},{"text":"ransomware","start":43,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"EDR","start":68,"end":71,"id":8},{"text":"Tools","start":72,"end":77,"id":9},{"text":".","start":77,"end":78,"id":10}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Lead Security Systems Consultant managing Manual Testing and Software Architecture initiatives.","spans":[{"start":5,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":61,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-940573475,"_task_hash":-468058517,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Systems","start":14,"end":21,"id":2},{"text":"Consultant","start":22,"end":32,"id":3},{"text":"managing","start":33,"end":41,"id":4},{"text":"Manual","start":42,"end":48,"id":5},{"text":"Testing","start":49,"end":56,"id":6},{"text":"and","start":57,"end":60,"id":7},{"text":"Software","start":61,"end":69,"id":8},{"text":"Architecture","start":70,"end":82,"id":9},{"text":"initiatives","start":83,"end":94,"id":10},{"text":".","start":94,"end":95,"id":11}]} +{"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Experienced Security Assessor specializing in AWS Security.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":46,"end":58,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":104640891,"_task_hash":1047363618,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Security","start":12,"end":20,"id":1},{"text":"Assessor","start":21,"end":29,"id":2},{"text":"specializing","start":30,"end":42,"id":3},{"text":"in","start":43,"end":45,"id":4},{"text":"AWS","start":46,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":".","start":58,"end":59,"id":7}]} +{"text":"Proficient in SIEM Operations and SIEM.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":38,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":1572595690,"_task_hash":1138698751,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":".","start":38,"end":39,"id":6}]} +{"text":"Experienced Cyber Operations Manager specializing in Security Operations.","spans":[{"start":12,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-804042884,"_task_hash":755021497,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Cyber","start":12,"end":17,"id":1},{"text":"Operations","start":18,"end":28,"id":2},{"text":"Manager","start":29,"end":36,"id":3},{"text":"specializing","start":37,"end":49,"id":4},{"text":"in","start":50,"end":52,"id":5},{"text":"Security","start":53,"end":61,"id":6},{"text":"Operations","start":62,"end":72,"id":7},{"text":".","start":72,"end":73,"id":8}]} +{"text":"Proficient in Burp Suite and Nessus.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":5}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":892841199,"_task_hash":930776333,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Burp","start":14,"end":18,"id":2},{"text":"Suite","start":19,"end":24,"id":3},{"text":"and","start":25,"end":28,"id":4},{"text":"Nessus","start":29,"end":35,"id":5},{"text":".","start":35,"end":36,"id":6}]} +{"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and Technical Leadership operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":784981389,"_task_hash":-1885566748,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"Technical","start":82,"end":91,"id":13},{"text":"Leadership","start":92,"end":102,"id":14},{"text":"operations","start":103,"end":113,"id":15},{"text":".","start":113,"end":114,"id":16}]} +{"text":"Endpoint Security Specialist with 10 years experience in Version Control, User Activity Monitoring, and Protocols.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":74,"end":98,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13},{"start":104,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-1504376676,"_task_hash":1854625531,"tokens":[{"text":"Endpoint","start":0,"end":8,"id":0},{"text":"Security","start":9,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"10","start":34,"end":36,"id":4},{"text":"years","start":37,"end":42,"id":5},{"text":"experience","start":43,"end":53,"id":6},{"text":"in","start":54,"end":56,"id":7},{"text":"Version","start":57,"end":64,"id":8},{"text":"Control","start":65,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"User","start":74,"end":78,"id":11},{"text":"Activity","start":79,"end":87,"id":12},{"text":"Monitoring","start":88,"end":98,"id":13},{"text":",","start":98,"end":99,"id":14},{"text":"and","start":100,"end":103,"id":15},{"text":"Protocols","start":104,"end":113,"id":16},{"text":".","start":113,"end":114,"id":17}]} +{"text":"Holds C/C++ certification.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":-2048269921,"_task_hash":2131181631,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":"certification","start":12,"end":25,"id":4},{"text":".","start":25,"end":26,"id":5}]} +{"text":"Senior Compliance Officer skilled in Log Analysis, Data Governance, and Security Patterns.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":49,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":51,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":72,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2078451862,"_task_hash":1844235398,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Compliance","start":7,"end":17,"id":1},{"text":"Officer","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Log","start":37,"end":40,"id":5},{"text":"Analysis","start":41,"end":49,"id":6},{"text":",","start":49,"end":50,"id":7},{"text":"Data","start":51,"end":55,"id":8},{"text":"Governance","start":56,"end":66,"id":9},{"text":",","start":66,"end":67,"id":10},{"text":"and","start":68,"end":71,"id":11},{"text":"Security","start":72,"end":80,"id":12},{"text":"Patterns","start":81,"end":89,"id":13},{"text":".","start":89,"end":90,"id":14}]} +{"text":"VR/AR certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":311753143,"_task_hash":1135622316,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"certified","start":6,"end":15,"id":3},{"text":".","start":15,"end":16,"id":4}]} +{"text":"Senior Cyber Threat Hunter position: 7 years minimum, expert in GDPR, Critical Thinking, and BYOD Security.","spans":[{"start":7,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12},{"start":70,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15},{"start":93,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":18,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1325779348,"_task_hash":1187695402,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Threat","start":13,"end":19,"id":2},{"text":"Hunter","start":20,"end":26,"id":3},{"text":"position","start":27,"end":35,"id":4},{"text":":","start":35,"end":36,"id":5},{"text":"7","start":37,"end":38,"id":6},{"text":"years","start":39,"end":44,"id":7},{"text":"minimum","start":45,"end":52,"id":8},{"text":",","start":52,"end":53,"id":9},{"text":"expert","start":54,"end":60,"id":10},{"text":"in","start":61,"end":63,"id":11},{"text":"GDPR","start":64,"end":68,"id":12},{"text":",","start":68,"end":69,"id":13},{"text":"Critical","start":70,"end":78,"id":14},{"text":"Thinking","start":79,"end":87,"id":15},{"text":",","start":87,"end":88,"id":16},{"text":"and","start":89,"end":92,"id":17},{"text":"BYOD","start":93,"end":97,"id":18},{"text":"Security","start":98,"end":106,"id":19},{"text":".","start":106,"end":107,"id":20}]} +{"text":"Immediate opening for API Developer.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1332043392,"_task_hash":821647175,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"API","start":22,"end":25,"id":3},{"text":"Developer","start":26,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Required skills: Burp Suite, Ethics Training, ISO 31000 certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":55,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1832737523,"_task_hash":-1621820757,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Ethics","start":29,"end":35,"id":6},{"text":"Training","start":36,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"ISO","start":46,"end":49,"id":9},{"text":"31000","start":50,"end":55,"id":10},{"text":"certification","start":56,"end":69,"id":11},{"text":".","start":69,"end":70,"id":12}]} +{"text":"Join our team as Enterprise Solutions Architect!","spans":[{"start":17,"end":47,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1867499106,"_task_hash":-1236583068,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Enterprise","start":17,"end":27,"id":4},{"text":"Solutions","start":28,"end":37,"id":5},{"text":"Architect","start":38,"end":47,"id":6},{"text":"!","start":47,"end":48,"id":7}]} +{"text":"Must know Nessus, QRadar, and NIST Framework.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":18,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-967030673,"_task_hash":479774730,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":",","start":16,"end":17,"id":3},{"text":"QRadar","start":18,"end":24,"id":4},{"text":",","start":24,"end":25,"id":5},{"text":"and","start":26,"end":29,"id":6},{"text":"NIST","start":30,"end":34,"id":7},{"text":"Framework","start":35,"end":44,"id":8},{"text":".","start":44,"end":45,"id":9}]} +{"text":"TLS/SSL certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":241661517,"_task_hash":-921594864,"tokens":[{"text":"TLS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"SSL","start":4,"end":7,"id":2},{"text":"certification","start":8,"end":21,"id":3},{"text":"a","start":22,"end":23,"id":4},{"text":"plus","start":24,"end":28,"id":5},{"text":".","start":28,"end":29,"id":6}]} +{"text":"Hiring Security Awareness Specialist for Sketch and rootkit detection.","spans":[{"start":7,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":52,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1806641871,"_task_hash":288333503,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Security","start":7,"end":15,"id":1},{"text":"Awareness","start":16,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"Sketch","start":41,"end":47,"id":5},{"text":"and","start":48,"end":51,"id":6},{"text":"rootkit","start":52,"end":59,"id":7},{"text":"detection","start":60,"end":69,"id":8},{"text":".","start":69,"end":70,"id":9}]} +{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Technical Project Manager role available: Cloud Architecture experience required, Security knowledge essential.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":42,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":82,"end":90,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-1314791684,"_task_hash":-1031533739,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Project","start":10,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"role","start":26,"end":30,"id":3},{"text":"available","start":31,"end":40,"id":4},{"text":":","start":40,"end":41,"id":5},{"text":"Cloud","start":42,"end":47,"id":6},{"text":"Architecture","start":48,"end":60,"id":7},{"text":"experience","start":61,"end":71,"id":8},{"text":"required","start":72,"end":80,"id":9},{"text":",","start":80,"end":81,"id":10},{"text":"Security","start":82,"end":90,"id":11},{"text":"knowledge","start":91,"end":100,"id":12},{"text":"essential","start":101,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} +{"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Accomplished Server-Side Developer specializing in Antivirus/Antimalware and Security Operations.","spans":[{"start":13,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":51,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":9},{"start":77,"end":96,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1012452100,"_task_hash":1190843855,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Server","start":13,"end":19,"id":1},{"text":"-","start":19,"end":20,"id":2},{"text":"Side","start":20,"end":24,"id":3},{"text":"Developer","start":25,"end":34,"id":4},{"text":"specializing","start":35,"end":47,"id":5},{"text":"in","start":48,"end":50,"id":6},{"text":"Antivirus","start":51,"end":60,"id":7},{"text":"/","start":60,"end":61,"id":8},{"text":"Antimalware","start":61,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"Operations","start":86,"end":96,"id":12},{"text":".","start":96,"end":97,"id":13}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Join our team as Technical Support Analyst!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-573217798,"_task_hash":1767487203,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Technical","start":17,"end":26,"id":4},{"text":"Support","start":27,"end":34,"id":5},{"text":"Analyst","start":35,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} +{"text":"Must know Wireshark, Wireshark, and OWASP Top 10.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-112823401,"_task_hash":-2093315552,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Wireshark","start":10,"end":19,"id":2},{"text":",","start":19,"end":20,"id":3},{"text":"Wireshark","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"and","start":32,"end":35,"id":6},{"text":"OWASP","start":36,"end":41,"id":7},{"text":"Top","start":42,"end":45,"id":8},{"text":"10","start":46,"end":48,"id":9},{"text":".","start":48,"end":49,"id":10}]} +{"text":"AWS certification a plus.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":411302902,"_task_hash":-651527579,"tokens":[{"text":"AWS","start":0,"end":3,"id":0},{"text":"certification","start":4,"end":17,"id":1},{"text":"a","start":18,"end":19,"id":2},{"text":"plus","start":20,"end":24,"id":3},{"text":".","start":24,"end":25,"id":4}]} +{"text":"Front-End Developer professional with 3++ years implementing EDR Tools and managing Privacy-Preserving ML programs.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":61,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":84,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-946005144,"_task_hash":-1347406546,"tokens":[{"text":"Front","start":0,"end":5,"id":0},{"text":"-","start":5,"end":6,"id":1},{"text":"End","start":6,"end":9,"id":2},{"text":"Developer","start":10,"end":19,"id":3},{"text":"professional","start":20,"end":32,"id":4},{"text":"with","start":33,"end":37,"id":5},{"text":"3++","start":38,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"implementing","start":48,"end":60,"id":8},{"text":"EDR","start":61,"end":64,"id":9},{"text":"Tools","start":65,"end":70,"id":10},{"text":"and","start":71,"end":74,"id":11},{"text":"managing","start":75,"end":83,"id":12},{"text":"Privacy","start":84,"end":91,"id":13},{"text":"-","start":91,"end":92,"id":14},{"text":"Preserving","start":92,"end":102,"id":15},{"text":"ML","start":103,"end":105,"id":16},{"text":"programs","start":106,"end":114,"id":17},{"text":".","start":114,"end":115,"id":18}]} +{"text":"Senior Cybersecurity Analyst position: 7 years minimum, expert in Content Creation, Hacking, and Cloud Security Architecture.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":66,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":84,"end":91,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":97,"end":124,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":504363669,"_task_hash":278479788,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cybersecurity","start":7,"end":20,"id":1},{"text":"Analyst","start":21,"end":28,"id":2},{"text":"position","start":29,"end":37,"id":3},{"text":":","start":37,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"minimum","start":47,"end":54,"id":7},{"text":",","start":54,"end":55,"id":8},{"text":"expert","start":56,"end":62,"id":9},{"text":"in","start":63,"end":65,"id":10},{"text":"Content","start":66,"end":73,"id":11},{"text":"Creation","start":74,"end":82,"id":12},{"text":",","start":82,"end":83,"id":13},{"text":"Hacking","start":84,"end":91,"id":14},{"text":",","start":91,"end":92,"id":15},{"text":"and","start":93,"end":96,"id":16},{"text":"Cloud","start":97,"end":102,"id":17},{"text":"Security","start":103,"end":111,"id":18},{"text":"Architecture","start":112,"end":124,"id":19},{"text":".","start":124,"end":125,"id":20}]} +{"text":"Senior Cloud Security Specialist position: 5 years minimum, expert in Secure Multi-Party Computation, Financial Analysis, and Security Frameworks.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":70,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":16},{"start":102,"end":120,"label":"TECHNICAL_SKILL","answer":"accept","token_start":18,"token_end":19},{"start":126,"end":145,"label":"SECURITY_DOMAIN","answer":"accept","token_start":22,"token_end":23}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":1549225190,"_task_hash":-1011319881,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cloud","start":7,"end":12,"id":1},{"text":"Security","start":13,"end":21,"id":2},{"text":"Specialist","start":22,"end":32,"id":3},{"text":"position","start":33,"end":41,"id":4},{"text":":","start":41,"end":42,"id":5},{"text":"5","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"minimum","start":51,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"expert","start":60,"end":66,"id":10},{"text":"in","start":67,"end":69,"id":11},{"text":"Secure","start":70,"end":76,"id":12},{"text":"Multi","start":77,"end":82,"id":13},{"text":"-","start":82,"end":83,"id":14},{"text":"Party","start":83,"end":88,"id":15},{"text":"Computation","start":89,"end":100,"id":16},{"text":",","start":100,"end":101,"id":17},{"text":"Financial","start":102,"end":111,"id":18},{"text":"Analysis","start":112,"end":120,"id":19},{"text":",","start":120,"end":121,"id":20},{"text":"and","start":122,"end":125,"id":21},{"text":"Security","start":126,"end":134,"id":22},{"text":"Frameworks","start":135,"end":145,"id":23},{"text":".","start":145,"end":146,"id":24}]} +{"text":"Release Manager experienced in detecting adware attacks using Splunk.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":41,"end":47,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-288890557,"_task_hash":-1953510225,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"experienced","start":16,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"detecting","start":31,"end":40,"id":4},{"text":"adware","start":41,"end":47,"id":5},{"text":"attacks","start":48,"end":55,"id":6},{"text":"using","start":56,"end":61,"id":7},{"text":"Splunk","start":62,"end":68,"id":8},{"text":".","start":68,"end":69,"id":9}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Hiring Risk Analyst for UEBA Tools and APT detection.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":24,"end":34,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":39,"end":42,"label":"THREAT_TYPE","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1745793283,"_task_hash":-1037340783,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"for","start":20,"end":23,"id":3},{"text":"UEBA","start":24,"end":28,"id":4},{"text":"Tools","start":29,"end":34,"id":5},{"text":"and","start":35,"end":38,"id":6},{"text":"APT","start":39,"end":42,"id":7},{"text":"detection","start":43,"end":52,"id":8},{"text":".","start":52,"end":53,"id":9}]} +{"text":"PCI-DSS compliance experience preferred.","spans":[{"start":0,"end":7,"label":"REGULATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1829455208,"_task_hash":1390445460,"tokens":[{"text":"PCI","start":0,"end":3,"id":0},{"text":"-","start":3,"end":4,"id":1},{"text":"DSS","start":4,"end":7,"id":2},{"text":"compliance","start":8,"end":18,"id":3},{"text":"experience","start":19,"end":29,"id":4},{"text":"preferred","start":30,"end":39,"id":5},{"text":".","start":39,"end":40,"id":6}]} +{"text":"Accomplished Assistant specializing in Statistical Analysis and Security Policies.","spans":[{"start":13,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":39,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":64,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1776072673,"_task_hash":958763054,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Assistant","start":13,"end":22,"id":1},{"text":"specializing","start":23,"end":35,"id":2},{"text":"in","start":36,"end":38,"id":3},{"text":"Statistical","start":39,"end":50,"id":4},{"text":"Analysis","start":51,"end":59,"id":5},{"text":"and","start":60,"end":63,"id":6},{"text":"Security","start":64,"end":72,"id":7},{"text":"Policies","start":73,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Seeking Industrial IoT Security Specialist with 3+ years experience in X-Ways Forensics and Network Analysis.","spans":[{"start":8,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":14},{"start":92,"end":108,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2045265785,"_task_hash":-2089715692,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Industrial","start":8,"end":18,"id":1},{"text":"IoT","start":19,"end":22,"id":2},{"text":"Security","start":23,"end":31,"id":3},{"text":"Specialist","start":32,"end":42,"id":4},{"text":"with","start":43,"end":47,"id":5},{"text":"3","start":48,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"X","start":71,"end":72,"id":11},{"text":"-","start":72,"end":73,"id":12},{"text":"Ways","start":73,"end":77,"id":13},{"text":"Forensics","start":78,"end":87,"id":14},{"text":"and","start":88,"end":91,"id":15},{"text":"Network","start":92,"end":99,"id":16},{"text":"Analysis","start":100,"end":108,"id":17},{"text":".","start":108,"end":109,"id":18}]} +{"text":"VR/AR required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1837477982,"_task_hash":-1254758870,"tokens":[{"text":"VR","start":0,"end":2,"id":0},{"text":"/","start":2,"end":3,"id":1},{"text":"AR","start":3,"end":5,"id":2},{"text":"required","start":6,"end":14,"id":3},{"text":".","start":14,"end":15,"id":4}]} +{"text":"Cloud Architect with hands-on experience in Splunk, EDR Platforms, and Wireless Security.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":50,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":52,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":71,"end":88,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":124512732,"_task_hash":-677473886,"tokens":[{"text":"Cloud","start":0,"end":5,"id":0},{"text":"Architect","start":6,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"Splunk","start":44,"end":50,"id":8},{"text":",","start":50,"end":51,"id":9},{"text":"EDR","start":52,"end":55,"id":10},{"text":"Platforms","start":56,"end":65,"id":11},{"text":",","start":65,"end":66,"id":12},{"text":"and","start":67,"end":70,"id":13},{"text":"Wireless","start":71,"end":79,"id":14},{"text":"Security","start":80,"end":88,"id":15},{"text":".","start":88,"end":89,"id":16}]} +{"text":"Holds PRINCE2.","spans":[{"start":6,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1460297396,"_task_hash":-885041091,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"PRINCE2","start":6,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Computer Forensics Investigator experienced in detecting rootkit attacks using SIEM.","spans":[{"start":0,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":57,"end":64,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":79,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":362333874,"_task_hash":1552502746,"tokens":[{"text":"Computer","start":0,"end":8,"id":0},{"text":"Forensics","start":9,"end":18,"id":1},{"text":"Investigator","start":19,"end":31,"id":2},{"text":"experienced","start":32,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"detecting","start":47,"end":56,"id":5},{"text":"rootkit","start":57,"end":64,"id":6},{"text":"attacks","start":65,"end":72,"id":7},{"text":"using","start":73,"end":78,"id":8},{"text":"SIEM","start":79,"end":83,"id":9},{"text":".","start":83,"end":84,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Certified SLAM working as Infrastructure Security Engineer, focused on MQTT Security and Buffer Overflow prevention.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":26,"end":58,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":71,"end":84,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":89,"end":104,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-222279151,"_task_hash":-398945424,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"SLAM","start":10,"end":14,"id":1},{"text":"working","start":15,"end":22,"id":2},{"text":"as","start":23,"end":25,"id":3},{"text":"Infrastructure","start":26,"end":40,"id":4},{"text":"Security","start":41,"end":49,"id":5},{"text":"Engineer","start":50,"end":58,"id":6},{"text":",","start":58,"end":59,"id":7},{"text":"focused","start":60,"end":67,"id":8},{"text":"on","start":68,"end":70,"id":9},{"text":"MQTT","start":71,"end":75,"id":10},{"text":"Security","start":76,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Buffer","start":89,"end":95,"id":13},{"text":"Overflow","start":96,"end":104,"id":14},{"text":"prevention","start":105,"end":115,"id":15},{"text":".","start":115,"end":116,"id":16}]} +{"text":"Accomplished Interface Designer specializing in Tailwind CSS and Network Security.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":60,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":81,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":2130861941,"_task_hash":1775570633,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Interface","start":13,"end":22,"id":1},{"text":"Designer","start":23,"end":31,"id":2},{"text":"specializing","start":32,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"Tailwind","start":48,"end":56,"id":5},{"text":"CSS","start":57,"end":60,"id":6},{"text":"and","start":61,"end":64,"id":7},{"text":"Network","start":65,"end":72,"id":8},{"text":"Security","start":73,"end":81,"id":9},{"text":".","start":81,"end":82,"id":10}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Lead Defensive Security Analyst managing Sandbox Analysis and Regression Testing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-318402082,"_task_hash":1417241188,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Defensive","start":5,"end":14,"id":1},{"text":"Security","start":15,"end":23,"id":2},{"text":"Analyst","start":24,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Sandbox","start":41,"end":48,"id":5},{"text":"Analysis","start":49,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Regression","start":62,"end":72,"id":8},{"text":"Testing","start":73,"end":80,"id":9},{"text":"initiatives","start":81,"end":92,"id":10},{"text":".","start":92,"end":93,"id":11}]} +{"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Seeking Malware Researcher with 3++ years experience in Insurance Frameworks and Feature Prioritization.","spans":[{"start":8,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":56,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":81,"end":103,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1884486082,"_task_hash":1627153437,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Malware","start":8,"end":15,"id":1},{"text":"Researcher","start":16,"end":26,"id":2},{"text":"with","start":27,"end":31,"id":3},{"text":"3++","start":32,"end":35,"id":4},{"text":"years","start":36,"end":41,"id":5},{"text":"experience","start":42,"end":52,"id":6},{"text":"in","start":53,"end":55,"id":7},{"text":"Insurance","start":56,"end":65,"id":8},{"text":"Frameworks","start":66,"end":76,"id":9},{"text":"and","start":77,"end":80,"id":10},{"text":"Feature","start":81,"end":88,"id":11},{"text":"Prioritization","start":89,"end":103,"id":12},{"text":".","start":103,"end":104,"id":13}]} +{"text":"OSCP Certification required.","spans":[{"start":0,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1225465137,"_task_hash":997524556,"tokens":[{"text":"OSCP","start":0,"end":4,"id":0},{"text":"Certification","start":5,"end":18,"id":1},{"text":"required","start":19,"end":27,"id":2},{"text":".","start":27,"end":28,"id":3}]} +{"text":"Software Development Engineer in Test professional with 5++ years implementing SIEM Operations and managing Awareness Programs programs.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":79,"end":94,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":108,"end":126,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1512058564,"_task_hash":1122793132,"tokens":[{"text":"Software","start":0,"end":8,"id":0},{"text":"Development","start":9,"end":20,"id":1},{"text":"Engineer","start":21,"end":29,"id":2},{"text":"in","start":30,"end":32,"id":3},{"text":"Test","start":33,"end":37,"id":4},{"text":"professional","start":38,"end":50,"id":5},{"text":"with","start":51,"end":55,"id":6},{"text":"5++","start":56,"end":59,"id":7},{"text":"years","start":60,"end":65,"id":8},{"text":"implementing","start":66,"end":78,"id":9},{"text":"SIEM","start":79,"end":83,"id":10},{"text":"Operations","start":84,"end":94,"id":11},{"text":"and","start":95,"end":98,"id":12},{"text":"managing","start":99,"end":107,"id":13},{"text":"Awareness","start":108,"end":117,"id":14},{"text":"Programs","start":118,"end":126,"id":15},{"text":"programs","start":127,"end":135,"id":16},{"text":".","start":135,"end":136,"id":17}]} +{"text":"Seeking Technical Support Specialist with 3+ years experience in Zero Trust Architecture and Cloud Networking.","spans":[{"start":8,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":65,"end":88,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":12},{"start":93,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-199143287,"_task_hash":967970076,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Technical","start":8,"end":17,"id":1},{"text":"Support","start":18,"end":25,"id":2},{"text":"Specialist","start":26,"end":36,"id":3},{"text":"with","start":37,"end":41,"id":4},{"text":"3","start":42,"end":43,"id":5},{"text":"+","start":43,"end":44,"id":6},{"text":"years","start":45,"end":50,"id":7},{"text":"experience","start":51,"end":61,"id":8},{"text":"in","start":62,"end":64,"id":9},{"text":"Zero","start":65,"end":69,"id":10},{"text":"Trust","start":70,"end":75,"id":11},{"text":"Architecture","start":76,"end":88,"id":12},{"text":"and","start":89,"end":92,"id":13},{"text":"Cloud","start":93,"end":98,"id":14},{"text":"Networking","start":99,"end":109,"id":15},{"text":".","start":109,"end":110,"id":16}]} +{"text":"SQL required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":206140740,"_task_hash":-284236833,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} +{"text":"ML Security Architect professional with 7+ years implementing QRadar and managing Endpoint Detection and Response programs.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":62,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":82,"end":113,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1038733348,"_task_hash":710933685,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"professional","start":22,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"7","start":40,"end":41,"id":5},{"text":"+","start":41,"end":42,"id":6},{"text":"years","start":43,"end":48,"id":7},{"text":"implementing","start":49,"end":61,"id":8},{"text":"QRadar","start":62,"end":68,"id":9},{"text":"and","start":69,"end":72,"id":10},{"text":"managing","start":73,"end":81,"id":11},{"text":"Endpoint","start":82,"end":90,"id":12},{"text":"Detection","start":91,"end":100,"id":13},{"text":"and","start":101,"end":104,"id":14},{"text":"Response","start":105,"end":113,"id":15},{"text":"programs","start":114,"end":122,"id":16},{"text":".","start":122,"end":123,"id":17}]} +{"text":"Certified NLP working as Project Manager, focused on Security Frameworks and Clickjacking prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":72,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":77,"end":89,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-1880065528,"_task_hash":-1366109314,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NLP","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"Project","start":25,"end":32,"id":4},{"text":"Manager","start":33,"end":40,"id":5},{"text":",","start":40,"end":41,"id":6},{"text":"focused","start":42,"end":49,"id":7},{"text":"on","start":50,"end":52,"id":8},{"text":"Security","start":53,"end":61,"id":9},{"text":"Frameworks","start":62,"end":72,"id":10},{"text":"and","start":73,"end":76,"id":11},{"text":"Clickjacking","start":77,"end":89,"id":12},{"text":"prevention","start":90,"end":100,"id":13},{"text":".","start":100,"end":101,"id":14}]} +{"text":"ML Security Architect experienced in detecting ransomware attacks using Splunk.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":47,"end":57,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":732322781,"_task_hash":-2000809147,"tokens":[{"text":"ML","start":0,"end":2,"id":0},{"text":"Security","start":3,"end":11,"id":1},{"text":"Architect","start":12,"end":21,"id":2},{"text":"experienced","start":22,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"detecting","start":37,"end":46,"id":5},{"text":"ransomware","start":47,"end":57,"id":6},{"text":"attacks","start":58,"end":65,"id":7},{"text":"using","start":66,"end":71,"id":8},{"text":"Splunk","start":72,"end":78,"id":9},{"text":".","start":78,"end":79,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Immediate opening for Autonomous Systems Engineer.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-597487692,"_task_hash":1798677782,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Autonomous","start":22,"end":32,"id":3},{"text":"Systems","start":33,"end":40,"id":4},{"text":"Engineer","start":41,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Required skills: Splunk, Customer Service, TOGAF certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":41,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":43,"end":48,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-783739186,"_task_hash":-344535861,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Customer","start":25,"end":33,"id":5},{"text":"Service","start":34,"end":41,"id":6},{"text":",","start":41,"end":42,"id":7},{"text":"TOGAF","start":43,"end":48,"id":8},{"text":"certification","start":49,"end":62,"id":9},{"text":".","start":62,"end":63,"id":10}]} +{"text":"Lead Security Director managing Product Strategy and Computer Vision initiatives.","spans":[{"start":5,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":32,"end":48,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":5},{"start":53,"end":68,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1201132838,"_task_hash":2042293184,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Security","start":5,"end":13,"id":1},{"text":"Director","start":14,"end":22,"id":2},{"text":"managing","start":23,"end":31,"id":3},{"text":"Product","start":32,"end":39,"id":4},{"text":"Strategy","start":40,"end":48,"id":5},{"text":"and","start":49,"end":52,"id":6},{"text":"Computer","start":53,"end":61,"id":7},{"text":"Vision","start":62,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} +{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"Accomplished IT Solutions Architect specializing in Remote Support Tools and AWS Security.","spans":[{"start":13,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":52,"end":72,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":8},{"start":77,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1109085814,"_task_hash":574276668,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"IT","start":13,"end":15,"id":1},{"text":"Solutions","start":16,"end":25,"id":2},{"text":"Architect","start":26,"end":35,"id":3},{"text":"specializing","start":36,"end":48,"id":4},{"text":"in","start":49,"end":51,"id":5},{"text":"Remote","start":52,"end":58,"id":6},{"text":"Support","start":59,"end":66,"id":7},{"text":"Tools","start":67,"end":72,"id":8},{"text":"and","start":73,"end":76,"id":9},{"text":"AWS","start":77,"end":80,"id":10},{"text":"Security","start":81,"end":89,"id":11},{"text":".","start":89,"end":90,"id":12}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Identity & Access Management Expert with hands-on experience in Nessus, Splunk, and Cloud Access Security Broker.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":64,"end":70,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":72,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13},{"start":84,"end":112,"label":"SECURITY_DOMAIN","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-190648664,"_task_hash":-38965933,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"hands","start":41,"end":46,"id":6},{"text":"-","start":46,"end":47,"id":7},{"text":"on","start":47,"end":49,"id":8},{"text":"experience","start":50,"end":60,"id":9},{"text":"in","start":61,"end":63,"id":10},{"text":"Nessus","start":64,"end":70,"id":11},{"text":",","start":70,"end":71,"id":12},{"text":"Splunk","start":72,"end":78,"id":13},{"text":",","start":78,"end":79,"id":14},{"text":"and","start":80,"end":83,"id":15},{"text":"Cloud","start":84,"end":89,"id":16},{"text":"Access","start":90,"end":96,"id":17},{"text":"Security","start":97,"end":105,"id":18},{"text":"Broker","start":106,"end":112,"id":19},{"text":".","start":112,"end":113,"id":20}]} +{"text":"Holds CCPA.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1461629167,"_task_hash":-1129438821,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"CCPA","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Certified NIST RMF working as Security Tester, focused on Physical Security and XXE prevention.","spans":[{"start":10,"end":18,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":5,"token_end":6},{"start":58,"end":75,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":80,"end":83,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-779515662,"_task_hash":2120551588,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"NIST","start":10,"end":14,"id":1},{"text":"RMF","start":15,"end":18,"id":2},{"text":"working","start":19,"end":26,"id":3},{"text":"as","start":27,"end":29,"id":4},{"text":"Security","start":30,"end":38,"id":5},{"text":"Tester","start":39,"end":45,"id":6},{"text":",","start":45,"end":46,"id":7},{"text":"focused","start":47,"end":54,"id":8},{"text":"on","start":55,"end":57,"id":9},{"text":"Physical","start":58,"end":66,"id":10},{"text":"Security","start":67,"end":75,"id":11},{"text":"and","start":76,"end":79,"id":12},{"text":"XXE","start":80,"end":83,"id":13},{"text":"prevention","start":84,"end":94,"id":14},{"text":".","start":94,"end":95,"id":15}]} +{"text":"Anti-Phishing Specialist professional with 3+ years implementing EDR Platforms and managing ML Lifecycle Management programs.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":65,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":92,"end":115,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":857789555,"_task_hash":-1431808319,"tokens":[{"text":"Anti","start":0,"end":4,"id":0},{"text":"-","start":4,"end":5,"id":1},{"text":"Phishing","start":5,"end":13,"id":2},{"text":"Specialist","start":14,"end":24,"id":3},{"text":"professional","start":25,"end":37,"id":4},{"text":"with","start":38,"end":42,"id":5},{"text":"3","start":43,"end":44,"id":6},{"text":"+","start":44,"end":45,"id":7},{"text":"years","start":46,"end":51,"id":8},{"text":"implementing","start":52,"end":64,"id":9},{"text":"EDR","start":65,"end":68,"id":10},{"text":"Platforms","start":69,"end":78,"id":11},{"text":"and","start":79,"end":82,"id":12},{"text":"managing","start":83,"end":91,"id":13},{"text":"ML","start":92,"end":94,"id":14},{"text":"Lifecycle","start":95,"end":104,"id":15},{"text":"Management","start":105,"end":115,"id":16},{"text":"programs","start":116,"end":124,"id":17},{"text":".","start":124,"end":125,"id":18}]} +{"text":"Hiring Digital Forensics Investigator for URL Analysis and Supply Chain Attack detection.","spans":[{"start":7,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":42,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":59,"end":78,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":56341108,"_task_hash":317276067,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Digital","start":7,"end":14,"id":1},{"text":"Forensics","start":15,"end":24,"id":2},{"text":"Investigator","start":25,"end":37,"id":3},{"text":"for","start":38,"end":41,"id":4},{"text":"URL","start":42,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":"and","start":55,"end":58,"id":7},{"text":"Supply","start":59,"end":65,"id":8},{"text":"Chain","start":66,"end":71,"id":9},{"text":"Attack","start":72,"end":78,"id":10},{"text":"detection","start":79,"end":88,"id":11},{"text":".","start":88,"end":89,"id":12}]} +{"text":"FISMA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1159449825,"_task_hash":869222594,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Infrastructure Security Engineer experienced in detecting APT attacks using EDR Platforms.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":58,"end":61,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":76,"end":89,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":530715541,"_task_hash":-1313114088,"tokens":[{"text":"Infrastructure","start":0,"end":14,"id":0},{"text":"Security","start":15,"end":23,"id":1},{"text":"Engineer","start":24,"end":32,"id":2},{"text":"experienced","start":33,"end":44,"id":3},{"text":"in","start":45,"end":47,"id":4},{"text":"detecting","start":48,"end":57,"id":5},{"text":"APT","start":58,"end":61,"id":6},{"text":"attacks","start":62,"end":69,"id":7},{"text":"using","start":70,"end":75,"id":8},{"text":"EDR","start":76,"end":79,"id":9},{"text":"Platforms","start":80,"end":89,"id":10},{"text":".","start":89,"end":90,"id":11}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Release Manager with hands-on experience in SIEM, EDR Tools, and Cloud Security Architecture.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":44,"end":48,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":50,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":11},{"start":65,"end":92,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1136955115,"_task_hash":-451709780,"tokens":[{"text":"Release","start":0,"end":7,"id":0},{"text":"Manager","start":8,"end":15,"id":1},{"text":"with","start":16,"end":20,"id":2},{"text":"hands","start":21,"end":26,"id":3},{"text":"-","start":26,"end":27,"id":4},{"text":"on","start":27,"end":29,"id":5},{"text":"experience","start":30,"end":40,"id":6},{"text":"in","start":41,"end":43,"id":7},{"text":"SIEM","start":44,"end":48,"id":8},{"text":",","start":48,"end":49,"id":9},{"text":"EDR","start":50,"end":53,"id":10},{"text":"Tools","start":54,"end":59,"id":11},{"text":",","start":59,"end":60,"id":12},{"text":"and","start":61,"end":64,"id":13},{"text":"Cloud","start":65,"end":70,"id":14},{"text":"Security","start":71,"end":79,"id":15},{"text":"Architecture","start":80,"end":92,"id":16},{"text":".","start":92,"end":93,"id":17}]} +{"text":"Holds C++.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":526977190,"_task_hash":-1557661950,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C++","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} +{"text":"We need a Cryptographic Engineer skilled in CSRF prevention and spyware analysis using Metasploit.","spans":[{"start":10,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":44,"end":48,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":64,"end":71,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":87,"end":97,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-673593938,"_task_hash":-1050807372,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Cryptographic","start":10,"end":23,"id":3},{"text":"Engineer","start":24,"end":32,"id":4},{"text":"skilled","start":33,"end":40,"id":5},{"text":"in","start":41,"end":43,"id":6},{"text":"CSRF","start":44,"end":48,"id":7},{"text":"prevention","start":49,"end":59,"id":8},{"text":"and","start":60,"end":63,"id":9},{"text":"spyware","start":64,"end":71,"id":10},{"text":"analysis","start":72,"end":80,"id":11},{"text":"using","start":81,"end":86,"id":12},{"text":"Metasploit","start":87,"end":97,"id":13},{"text":".","start":97,"end":98,"id":14}]} +{"text":"Lead Computer Forensics Investigator managing Grafana and Replication initiatives.","spans":[{"start":5,"end":36,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":46,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":58,"end":69,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-552827263,"_task_hash":-338070767,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Computer","start":5,"end":13,"id":1},{"text":"Forensics","start":14,"end":23,"id":2},{"text":"Investigator","start":24,"end":36,"id":3},{"text":"managing","start":37,"end":45,"id":4},{"text":"Grafana","start":46,"end":53,"id":5},{"text":"and","start":54,"end":57,"id":6},{"text":"Replication","start":58,"end":69,"id":7},{"text":"initiatives","start":70,"end":81,"id":8},{"text":".","start":81,"end":82,"id":9}]} +{"text":"Expert in NIS2 compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":235790343,"_task_hash":-2130422658,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"NIS2","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Seeking CTI Analyst with 3+ years experience in Audit and Database Management.","spans":[{"start":8,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":48,"end":53,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":9},{"start":58,"end":77,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1305089989,"_task_hash":-346214418,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"CTI","start":8,"end":11,"id":1},{"text":"Analyst","start":12,"end":19,"id":2},{"text":"with","start":20,"end":24,"id":3},{"text":"3","start":25,"end":26,"id":4},{"text":"+","start":26,"end":27,"id":5},{"text":"years","start":28,"end":33,"id":6},{"text":"experience","start":34,"end":44,"id":7},{"text":"in","start":45,"end":47,"id":8},{"text":"Audit","start":48,"end":53,"id":9},{"text":"and","start":54,"end":57,"id":10},{"text":"Database","start":58,"end":66,"id":11},{"text":"Management","start":67,"end":77,"id":12},{"text":".","start":77,"end":78,"id":13}]} +{"text":"ISO 22301 required.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":824458430,"_task_hash":1338890337,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"required","start":10,"end":18,"id":2},{"text":".","start":18,"end":19,"id":3}]} +{"text":"Experienced IT Department Manager specializing in Security Scanning.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":312317294,"_task_hash":1659375320,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Security","start":50,"end":58,"id":6},{"text":"Scanning","start":59,"end":67,"id":7},{"text":".","start":67,"end":68,"id":8}]} +{"text":"Proficient in Nessus and Wireshark.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":34,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":659279639,"_task_hash":400504924,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Nessus","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"Wireshark","start":25,"end":34,"id":4},{"text":".","start":34,"end":35,"id":5}]} +{"text":"Senior Anti-Phishing Specialist skilled in Packet Analysis, Privacy Frameworks, and Service Mesh Security.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":43,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":7,"token_end":8},{"start":60,"end":78,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":84,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-658030376,"_task_hash":2138689841,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Anti","start":7,"end":11,"id":1},{"text":"-","start":11,"end":12,"id":2},{"text":"Phishing","start":12,"end":20,"id":3},{"text":"Specialist","start":21,"end":31,"id":4},{"text":"skilled","start":32,"end":39,"id":5},{"text":"in","start":40,"end":42,"id":6},{"text":"Packet","start":43,"end":49,"id":7},{"text":"Analysis","start":50,"end":58,"id":8},{"text":",","start":58,"end":59,"id":9},{"text":"Privacy","start":60,"end":67,"id":10},{"text":"Frameworks","start":68,"end":78,"id":11},{"text":",","start":78,"end":79,"id":12},{"text":"and","start":80,"end":83,"id":13},{"text":"Service","start":84,"end":91,"id":14},{"text":"Mesh","start":92,"end":96,"id":15},{"text":"Security","start":97,"end":105,"id":16},{"text":".","start":105,"end":106,"id":17}]} +{"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Experienced IT Department Manager specializing in Runtime Security.","spans":[{"start":12,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":50,"end":66,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-371951751,"_task_hash":1179138797,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"IT","start":12,"end":14,"id":1},{"text":"Department","start":15,"end":25,"id":2},{"text":"Manager","start":26,"end":33,"id":3},{"text":"specializing","start":34,"end":46,"id":4},{"text":"in","start":47,"end":49,"id":5},{"text":"Runtime","start":50,"end":57,"id":6},{"text":"Security","start":58,"end":66,"id":7},{"text":".","start":66,"end":67,"id":8}]} +{"text":"Proficient in SIEM and Nessus.","spans":[{"start":14,"end":18,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1177038604,"_task_hash":1302057457,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"and","start":19,"end":22,"id":3},{"text":"Nessus","start":23,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} +{"text":"Looking for Endpoint Security Engineer to lead Security Architecture initiatives.","spans":[{"start":12,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":47,"end":68,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1797885356,"_task_hash":-924742124,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Endpoint","start":12,"end":20,"id":2},{"text":"Security","start":21,"end":29,"id":3},{"text":"Engineer","start":30,"end":38,"id":4},{"text":"to","start":39,"end":41,"id":5},{"text":"lead","start":42,"end":46,"id":6},{"text":"Security","start":47,"end":55,"id":7},{"text":"Architecture","start":56,"end":68,"id":8},{"text":"initiatives","start":69,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} +{"text":"Must have EDR Tools experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":19,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":47,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1251175216,"_task_hash":1403746886,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"EDR","start":10,"end":13,"id":2},{"text":"Tools","start":14,"end":19,"id":3},{"text":"experience","start":20,"end":30,"id":4},{"text":"and","start":31,"end":34,"id":5},{"text":"OWASP","start":35,"end":40,"id":6},{"text":"Top","start":41,"end":44,"id":7},{"text":"10","start":45,"end":47,"id":8},{"text":"knowledge","start":48,"end":57,"id":9},{"text":".","start":57,"end":58,"id":10}]} +{"text":"Experienced Application Security Engineer specializing in API Security.","spans":[{"start":12,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":58,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1868467689,"_task_hash":-2063311556,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Application","start":12,"end":23,"id":1},{"text":"Security","start":24,"end":32,"id":2},{"text":"Engineer","start":33,"end":41,"id":3},{"text":"specializing","start":42,"end":54,"id":4},{"text":"in","start":55,"end":57,"id":5},{"text":"API","start":58,"end":61,"id":6},{"text":"Security","start":62,"end":70,"id":7},{"text":".","start":70,"end":71,"id":8}]} +{"text":"Proficient in Splunk and SIEM.","spans":[{"start":14,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":25,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1369442593,"_task_hash":1934435184,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Splunk","start":14,"end":20,"id":2},{"text":"and","start":21,"end":24,"id":3},{"text":"SIEM","start":25,"end":29,"id":4},{"text":".","start":29,"end":30,"id":5}]} +{"text":"Immediate opening for Security Architect.","spans":[{"start":22,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-414517898,"_task_hash":-2011743341,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Architect","start":31,"end":40,"id":4},{"text":".","start":40,"end":41,"id":5}]} +{"text":"Required skills: CrowdStrike, Solution Architecture, PRINCE2 certification.","spans":[{"start":17,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":30,"end":51,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":53,"end":60,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1054653285,"_task_hash":300786099,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"CrowdStrike","start":17,"end":28,"id":3},{"text":",","start":28,"end":29,"id":4},{"text":"Solution","start":30,"end":38,"id":5},{"text":"Architecture","start":39,"end":51,"id":6},{"text":",","start":51,"end":52,"id":7},{"text":"PRINCE2","start":53,"end":60,"id":8},{"text":"certification","start":61,"end":74,"id":9},{"text":".","start":74,"end":75,"id":10}]} +{"text":"Security Defense Analyst with expertise in OWASP Top 10 compliance and Phishing Ops operations.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":43,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":71,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":946099774,"_task_hash":-1889771119,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Defense","start":9,"end":16,"id":1},{"text":"Analyst","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"expertise","start":30,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"OWASP","start":43,"end":48,"id":6},{"text":"Top","start":49,"end":52,"id":7},{"text":"10","start":53,"end":55,"id":8},{"text":"compliance","start":56,"end":66,"id":9},{"text":"and","start":67,"end":70,"id":10},{"text":"Phishing","start":71,"end":79,"id":11},{"text":"Ops","start":80,"end":83,"id":12},{"text":"operations","start":84,"end":94,"id":13},{"text":".","start":94,"end":95,"id":14}]} +{"text":"Identity Management Engineer professional with 7+ years implementing Wireshark and managing Terraform programs.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":69,"end":78,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":92,"end":101,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":1606958766,"_task_hash":882389241,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"Management","start":9,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"professional","start":29,"end":41,"id":3},{"text":"with","start":42,"end":46,"id":4},{"text":"7","start":47,"end":48,"id":5},{"text":"+","start":48,"end":49,"id":6},{"text":"years","start":50,"end":55,"id":7},{"text":"implementing","start":56,"end":68,"id":8},{"text":"Wireshark","start":69,"end":78,"id":9},{"text":"and","start":79,"end":82,"id":10},{"text":"managing","start":83,"end":91,"id":11},{"text":"Terraform","start":92,"end":101,"id":12},{"text":"programs","start":102,"end":110,"id":13},{"text":".","start":110,"end":111,"id":14}]} +{"text":"Seeking Emergency Response Manager with 5++ years experience in Memory Forensics and Vendor Evaluation.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1632682232,"_task_hash":2139675679,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Emergency","start":8,"end":17,"id":1},{"text":"Response","start":18,"end":26,"id":2},{"text":"Manager","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Memory","start":64,"end":70,"id":9},{"text":"Forensics","start":71,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Vendor","start":85,"end":91,"id":12},{"text":"Evaluation","start":92,"end":102,"id":13},{"text":".","start":102,"end":103,"id":14}]} +{"text":"TOGAF required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":190519494,"_task_hash":-1135331299,"tokens":[{"text":"TOGAF","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"We need a QA Engineer skilled in Command Injection prevention and ransomware analysis using Splunk.","spans":[{"start":10,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":33,"end":50,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":8},{"start":66,"end":76,"label":"THREAT_TYPE","answer":"accept","token_start":11,"token_end":11},{"start":92,"end":98,"label":"SECURITY_TOOL","answer":"accept","token_start":14,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1246329902,"_task_hash":360578031,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"QA","start":10,"end":12,"id":3},{"text":"Engineer","start":13,"end":21,"id":4},{"text":"skilled","start":22,"end":29,"id":5},{"text":"in","start":30,"end":32,"id":6},{"text":"Command","start":33,"end":40,"id":7},{"text":"Injection","start":41,"end":50,"id":8},{"text":"prevention","start":51,"end":61,"id":9},{"text":"and","start":62,"end":65,"id":10},{"text":"ransomware","start":66,"end":76,"id":11},{"text":"analysis","start":77,"end":85,"id":12},{"text":"using","start":86,"end":91,"id":13},{"text":"Splunk","start":92,"end":98,"id":14},{"text":".","start":98,"end":99,"id":15}]} +{"text":"Senior Malware Reverse Engineer skilled in Stakeholder Management, Model Versioning, and Security Culture.","spans":[{"start":7,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":43,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":89,"end":105,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1043238395,"_task_hash":-2060402775,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Malware","start":7,"end":14,"id":1},{"text":"Reverse","start":15,"end":22,"id":2},{"text":"Engineer","start":23,"end":31,"id":3},{"text":"skilled","start":32,"end":39,"id":4},{"text":"in","start":40,"end":42,"id":5},{"text":"Stakeholder","start":43,"end":54,"id":6},{"text":"Management","start":55,"end":65,"id":7},{"text":",","start":65,"end":66,"id":8},{"text":"Model","start":67,"end":72,"id":9},{"text":"Versioning","start":73,"end":83,"id":10},{"text":",","start":83,"end":84,"id":11},{"text":"and","start":85,"end":88,"id":12},{"text":"Security","start":89,"end":97,"id":13},{"text":"Culture","start":98,"end":105,"id":14},{"text":".","start":105,"end":106,"id":15}]} +{"text":"CCPA certified.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2126018288,"_task_hash":-1395112851,"tokens":[{"text":"CCPA","start":0,"end":4,"id":0},{"text":"certified","start":5,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"Privacy Officer role available: Remote Support Tools experience required, Database Security knowledge essential.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":52,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":74,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":1734485722,"_task_hash":1457814816,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Officer","start":8,"end":15,"id":1},{"text":"role","start":16,"end":20,"id":2},{"text":"available","start":21,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"Remote","start":32,"end":38,"id":5},{"text":"Support","start":39,"end":46,"id":6},{"text":"Tools","start":47,"end":52,"id":7},{"text":"experience","start":53,"end":63,"id":8},{"text":"required","start":64,"end":72,"id":9},{"text":",","start":72,"end":73,"id":10},{"text":"Database","start":74,"end":82,"id":11},{"text":"Security","start":83,"end":91,"id":12},{"text":"knowledge","start":92,"end":101,"id":13},{"text":"essential","start":102,"end":111,"id":14},{"text":".","start":111,"end":112,"id":15}]} +{"text":"COPPA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":-2025099901,"_task_hash":-1439247960,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Technical Solutions Architect needed for enterprise security team.","spans":[{"start":0,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-848380258,"_task_hash":-1007982442,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Solutions","start":10,"end":19,"id":1},{"text":"Architect","start":20,"end":29,"id":2},{"text":"needed","start":30,"end":36,"id":3},{"text":"for","start":37,"end":40,"id":4},{"text":"enterprise","start":41,"end":51,"id":5},{"text":"security","start":52,"end":60,"id":6},{"text":"team","start":61,"end":65,"id":7},{"text":".","start":65,"end":66,"id":8}]} +{"text":"Required: GDPR, Nessus, and OWASP Top 10 expertise.","spans":[{"start":10,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":2},{"start":16,"end":22,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":28,"end":40,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1255872532,"_task_hash":-520021751,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":",","start":14,"end":15,"id":3},{"text":"Nessus","start":16,"end":22,"id":4},{"text":",","start":22,"end":23,"id":5},{"text":"and","start":24,"end":27,"id":6},{"text":"OWASP","start":28,"end":33,"id":7},{"text":"Top","start":34,"end":37,"id":8},{"text":"10","start":38,"end":40,"id":9},{"text":"expertise","start":41,"end":50,"id":10},{"text":".","start":50,"end":51,"id":11}]} +{"text":"Insider Threat Analyst opportunity: Lead Cybersecurity program, implement OWASP Top 10, manage Mathematics operations.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":41,"end":54,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":86,"label":"FRAMEWORK","answer":"accept","token_start":10,"token_end":12},{"start":95,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1487542894,"_task_hash":-1931596651,"tokens":[{"text":"Insider","start":0,"end":7,"id":0},{"text":"Threat","start":8,"end":14,"id":1},{"text":"Analyst","start":15,"end":22,"id":2},{"text":"opportunity","start":23,"end":34,"id":3},{"text":":","start":34,"end":35,"id":4},{"text":"Lead","start":36,"end":40,"id":5},{"text":"Cybersecurity","start":41,"end":54,"id":6},{"text":"program","start":55,"end":62,"id":7},{"text":",","start":62,"end":63,"id":8},{"text":"implement","start":64,"end":73,"id":9},{"text":"OWASP","start":74,"end":79,"id":10},{"text":"Top","start":80,"end":83,"id":11},{"text":"10","start":84,"end":86,"id":12},{"text":",","start":86,"end":87,"id":13},{"text":"manage","start":88,"end":94,"id":14},{"text":"Mathematics","start":95,"end":106,"id":15},{"text":"operations","start":107,"end":117,"id":16},{"text":".","start":117,"end":118,"id":17}]} +{"text":"Senior IAM Engineer skilled in Build Tools, Windows/Mac Support, and Application Security Architecture.","spans":[{"start":7,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":31,"end":42,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":44,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":11},{"start":69,"end":102,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1203031739,"_task_hash":1793382399,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"IAM","start":7,"end":10,"id":1},{"text":"Engineer","start":11,"end":19,"id":2},{"text":"skilled","start":20,"end":27,"id":3},{"text":"in","start":28,"end":30,"id":4},{"text":"Build","start":31,"end":36,"id":5},{"text":"Tools","start":37,"end":42,"id":6},{"text":",","start":42,"end":43,"id":7},{"text":"Windows","start":44,"end":51,"id":8},{"text":"/","start":51,"end":52,"id":9},{"text":"Mac","start":52,"end":55,"id":10},{"text":"Support","start":56,"end":63,"id":11},{"text":",","start":63,"end":64,"id":12},{"text":"and","start":65,"end":68,"id":13},{"text":"Application","start":69,"end":80,"id":14},{"text":"Security","start":81,"end":89,"id":15},{"text":"Architecture","start":90,"end":102,"id":16},{"text":".","start":102,"end":103,"id":17}]} +{"text":"SQL certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-398199805,"_task_hash":863642449,"tokens":[{"text":"SQL","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Analytics Specialist with expertise in OWASP Top 10 compliance and Framework Design operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7},{"start":67,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1472802493,"_task_hash":-1240698101,"tokens":[{"text":"Analytics","start":0,"end":9,"id":0},{"text":"Specialist","start":10,"end":20,"id":1},{"text":"with","start":21,"end":25,"id":2},{"text":"expertise","start":26,"end":35,"id":3},{"text":"in","start":36,"end":38,"id":4},{"text":"OWASP","start":39,"end":44,"id":5},{"text":"Top","start":45,"end":48,"id":6},{"text":"10","start":49,"end":51,"id":7},{"text":"compliance","start":52,"end":62,"id":8},{"text":"and","start":63,"end":66,"id":9},{"text":"Framework","start":67,"end":76,"id":10},{"text":"Design","start":77,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} +{"text":"Hiring Container Security Expert for AI Regulation and Man-in-the-Middle detection.","spans":[{"start":7,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":55,"end":72,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1024865759,"_task_hash":110508288,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Container","start":7,"end":16,"id":1},{"text":"Security","start":17,"end":25,"id":2},{"text":"Expert","start":26,"end":32,"id":3},{"text":"for","start":33,"end":36,"id":4},{"text":"AI","start":37,"end":39,"id":5},{"text":"Regulation","start":40,"end":50,"id":6},{"text":"and","start":51,"end":54,"id":7},{"text":"Man","start":55,"end":58,"id":8},{"text":"-","start":58,"end":59,"id":9},{"text":"in","start":59,"end":61,"id":10},{"text":"-","start":61,"end":62,"id":11},{"text":"the","start":62,"end":65,"id":12},{"text":"-","start":65,"end":66,"id":13},{"text":"Middle","start":66,"end":72,"id":14},{"text":"detection","start":73,"end":82,"id":15},{"text":".","start":82,"end":83,"id":16}]} +{"text":"SOX compliance experience preferred.","spans":[{"start":0,"end":3,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1793846879,"_task_hash":-1502382604,"tokens":[{"text":"SOX","start":0,"end":3,"id":0},{"text":"compliance","start":4,"end":14,"id":1},{"text":"experience","start":15,"end":25,"id":2},{"text":"preferred","start":26,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Hiring Industrial IoT Security Specialist for Wireframing and Supply Chain Attack detection.","spans":[{"start":7,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":46,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":62,"end":81,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-163062240,"_task_hash":797017760,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Industrial","start":7,"end":17,"id":1},{"text":"IoT","start":18,"end":21,"id":2},{"text":"Security","start":22,"end":30,"id":3},{"text":"Specialist","start":31,"end":41,"id":4},{"text":"for","start":42,"end":45,"id":5},{"text":"Wireframing","start":46,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Supply","start":62,"end":68,"id":8},{"text":"Chain","start":69,"end":74,"id":9},{"text":"Attack","start":75,"end":81,"id":10},{"text":"detection","start":82,"end":91,"id":11},{"text":".","start":91,"end":92,"id":12}]} +{"text":"COPPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-467222272,"_task_hash":59755085,"tokens":[{"text":"COPPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"Join our team as Social Engineering Tester!","spans":[{"start":17,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1577165343,"_task_hash":-1784659638,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Social","start":17,"end":23,"id":4},{"text":"Engineering","start":24,"end":35,"id":5},{"text":"Tester","start":36,"end":42,"id":6},{"text":"!","start":42,"end":43,"id":7}]} +{"text":"Must know Metasploit, Nessus, and OWASP Top 10.","spans":[{"start":10,"end":20,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":22,"end":28,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":34,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1591159605,"_task_hash":-2075389288,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"Metasploit","start":10,"end":20,"id":2},{"text":",","start":20,"end":21,"id":3},{"text":"Nessus","start":22,"end":28,"id":4},{"text":",","start":28,"end":29,"id":5},{"text":"and","start":30,"end":33,"id":6},{"text":"OWASP","start":34,"end":39,"id":7},{"text":"Top","start":40,"end":43,"id":8},{"text":"10","start":44,"end":46,"id":9},{"text":".","start":46,"end":47,"id":10}]} +{"text":"PRINCE2 certification a plus.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":439813503,"_task_hash":1835233461,"tokens":[{"text":"PRINCE2","start":0,"end":7,"id":0},{"text":"certification","start":8,"end":21,"id":1},{"text":"a","start":22,"end":23,"id":2},{"text":"plus","start":24,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"QA Analyst needed for enterprise security team.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-584819457,"_task_hash":-518739282,"tokens":[{"text":"QA","start":0,"end":2,"id":0},{"text":"Analyst","start":3,"end":10,"id":1},{"text":"needed","start":11,"end":17,"id":2},{"text":"for","start":18,"end":21,"id":3},{"text":"enterprise","start":22,"end":32,"id":4},{"text":"security","start":33,"end":41,"id":5},{"text":"team","start":42,"end":46,"id":6},{"text":".","start":46,"end":47,"id":7}]} +{"text":"Required: ISO 31000, ELK Stack, and OWASP Top 10 expertise.","spans":[{"start":10,"end":19,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":3},{"start":21,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6},{"start":36,"end":48,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-23046429,"_task_hash":1737669960,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"ISO","start":10,"end":13,"id":2},{"text":"31000","start":14,"end":19,"id":3},{"text":",","start":19,"end":20,"id":4},{"text":"ELK","start":21,"end":24,"id":5},{"text":"Stack","start":25,"end":30,"id":6},{"text":",","start":30,"end":31,"id":7},{"text":"and","start":32,"end":35,"id":8},{"text":"OWASP","start":36,"end":41,"id":9},{"text":"Top","start":42,"end":45,"id":10},{"text":"10","start":46,"end":48,"id":11},{"text":"expertise","start":49,"end":58,"id":12},{"text":".","start":58,"end":59,"id":13}]} +{"text":"Immediate opening for Hardware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-787263074,"_task_hash":-216303877,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Hardware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Required skills: EDR Platforms, Media Relations, TLS/SSL certification.","spans":[{"start":17,"end":30,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":32,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":49,"end":56,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1416774968,"_task_hash":-1963616318,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"EDR","start":17,"end":20,"id":3},{"text":"Platforms","start":21,"end":30,"id":4},{"text":",","start":30,"end":31,"id":5},{"text":"Media","start":32,"end":37,"id":6},{"text":"Relations","start":38,"end":47,"id":7},{"text":",","start":47,"end":48,"id":8},{"text":"TLS","start":49,"end":52,"id":9},{"text":"/","start":52,"end":53,"id":10},{"text":"SSL","start":53,"end":56,"id":11},{"text":"certification","start":57,"end":70,"id":12},{"text":".","start":70,"end":71,"id":13}]} +{"text":"Seeking Product Security Engineer with 7+ years experience in Message Queues and CCTV Systems.","spans":[{"start":8,"end":33,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":62,"end":76,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11},{"start":81,"end":93,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":2119018111,"_task_hash":930113890,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Product","start":8,"end":15,"id":1},{"text":"Security","start":16,"end":24,"id":2},{"text":"Engineer","start":25,"end":33,"id":3},{"text":"with","start":34,"end":38,"id":4},{"text":"7","start":39,"end":40,"id":5},{"text":"+","start":40,"end":41,"id":6},{"text":"years","start":42,"end":47,"id":7},{"text":"experience","start":48,"end":58,"id":8},{"text":"in","start":59,"end":61,"id":9},{"text":"Message","start":62,"end":69,"id":10},{"text":"Queues","start":70,"end":76,"id":11},{"text":"and","start":77,"end":80,"id":12},{"text":"CCTV","start":81,"end":85,"id":13},{"text":"Systems","start":86,"end":93,"id":14},{"text":".","start":93,"end":94,"id":15}]} +{"text":"OSINT required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1609453577,"_task_hash":-644759626,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"Senior Threat Detection Specialist position: 3 years minimum, expert in IOC Analysis, Privacy Engineering, and Security Awareness Platforms.","spans":[{"start":7,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":72,"end":84,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":86,"end":105,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16},{"start":111,"end":139,"label":"SECURITY_DOMAIN","answer":"accept","token_start":19,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-2096425349,"_task_hash":1140006178,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Threat","start":7,"end":13,"id":1},{"text":"Detection","start":14,"end":23,"id":2},{"text":"Specialist","start":24,"end":34,"id":3},{"text":"position","start":35,"end":43,"id":4},{"text":":","start":43,"end":44,"id":5},{"text":"3","start":45,"end":46,"id":6},{"text":"years","start":47,"end":52,"id":7},{"text":"minimum","start":53,"end":60,"id":8},{"text":",","start":60,"end":61,"id":9},{"text":"expert","start":62,"end":68,"id":10},{"text":"in","start":69,"end":71,"id":11},{"text":"IOC","start":72,"end":75,"id":12},{"text":"Analysis","start":76,"end":84,"id":13},{"text":",","start":84,"end":85,"id":14},{"text":"Privacy","start":86,"end":93,"id":15},{"text":"Engineering","start":94,"end":105,"id":16},{"text":",","start":105,"end":106,"id":17},{"text":"and","start":107,"end":110,"id":18},{"text":"Security","start":111,"end":119,"id":19},{"text":"Awareness","start":120,"end":129,"id":20},{"text":"Platforms","start":130,"end":139,"id":21},{"text":".","start":139,"end":140,"id":22}]} +{"text":"We need a Disaster Recovery Specialist skilled in SQL Injection prevention and spyware analysis using Splunk.","spans":[{"start":10,"end":38,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5},{"start":50,"end":63,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":86,"label":"THREAT_TYPE","answer":"accept","token_start":12,"token_end":12},{"start":102,"end":108,"label":"SECURITY_TOOL","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":1964696388,"_task_hash":662300423,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"Disaster","start":10,"end":18,"id":3},{"text":"Recovery","start":19,"end":27,"id":4},{"text":"Specialist","start":28,"end":38,"id":5},{"text":"skilled","start":39,"end":46,"id":6},{"text":"in","start":47,"end":49,"id":7},{"text":"SQL","start":50,"end":53,"id":8},{"text":"Injection","start":54,"end":63,"id":9},{"text":"prevention","start":64,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"spyware","start":79,"end":86,"id":12},{"text":"analysis","start":87,"end":95,"id":13},{"text":"using","start":96,"end":101,"id":14},{"text":"Splunk","start":102,"end":108,"id":15},{"text":".","start":108,"end":109,"id":16}]} +{"text":"Looking for Threat Analyst to lead Network Security Architecture initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":64,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-1963810898,"_task_hash":243527044,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Threat","start":12,"end":18,"id":2},{"text":"Analyst","start":19,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Network","start":35,"end":42,"id":6},{"text":"Security","start":43,"end":51,"id":7},{"text":"Architecture","start":52,"end":64,"id":8},{"text":"initiatives","start":65,"end":76,"id":9},{"text":".","start":76,"end":77,"id":10}]} +{"text":"Must have SIEM Operations experience and NIST Framework knowledge.","spans":[{"start":10,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":41,"end":55,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-71242630,"_task_hash":1609321126,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"SIEM","start":10,"end":14,"id":2},{"text":"Operations","start":15,"end":25,"id":3},{"text":"experience","start":26,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"NIST","start":41,"end":45,"id":6},{"text":"Framework","start":46,"end":55,"id":7},{"text":"knowledge","start":56,"end":65,"id":8},{"text":".","start":65,"end":66,"id":9}]} +{"text":"DevSecOps Engineer needed for enterprise security team.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1867819265,"_task_hash":-81217904,"tokens":[{"text":"DevSecOps","start":0,"end":9,"id":0},{"text":"Engineer","start":10,"end":18,"id":1},{"text":"needed","start":19,"end":25,"id":2},{"text":"for","start":26,"end":29,"id":3},{"text":"enterprise","start":30,"end":40,"id":4},{"text":"security","start":41,"end":49,"id":5},{"text":"team","start":50,"end":54,"id":6},{"text":".","start":54,"end":55,"id":7}]} +{"text":"Required: STIX/TAXII, Metasploit, and OWASP Top 10 expertise.","spans":[{"start":10,"end":20,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":22,"end":32,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":38,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":-1492126283,"_task_hash":-836102027,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"STIX","start":10,"end":14,"id":2},{"text":"/","start":14,"end":15,"id":3},{"text":"TAXII","start":15,"end":20,"id":4},{"text":",","start":20,"end":21,"id":5},{"text":"Metasploit","start":22,"end":32,"id":6},{"text":",","start":32,"end":33,"id":7},{"text":"and","start":34,"end":37,"id":8},{"text":"OWASP","start":38,"end":43,"id":9},{"text":"Top","start":44,"end":47,"id":10},{"text":"10","start":48,"end":50,"id":11},{"text":"expertise","start":51,"end":60,"id":12},{"text":".","start":60,"end":61,"id":13}]} +{"text":"Certified IDS/IPS working as Code Reviewer, focused on Email Security and Cross-Site Scripting prevention.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3},{"start":29,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":6,"token_end":7},{"start":55,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":12},{"start":74,"end":94,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":1117287645,"_task_hash":386808135,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"IDS","start":10,"end":13,"id":1},{"text":"/","start":13,"end":14,"id":2},{"text":"IPS","start":14,"end":17,"id":3},{"text":"working","start":18,"end":25,"id":4},{"text":"as","start":26,"end":28,"id":5},{"text":"Code","start":29,"end":33,"id":6},{"text":"Reviewer","start":34,"end":42,"id":7},{"text":",","start":42,"end":43,"id":8},{"text":"focused","start":44,"end":51,"id":9},{"text":"on","start":52,"end":54,"id":10},{"text":"Email","start":55,"end":60,"id":11},{"text":"Security","start":61,"end":69,"id":12},{"text":"and","start":70,"end":73,"id":13},{"text":"Cross","start":74,"end":79,"id":14},{"text":"-","start":79,"end":80,"id":15},{"text":"Site","start":80,"end":84,"id":16},{"text":"Scripting","start":85,"end":94,"id":17},{"text":"prevention","start":95,"end":105,"id":18},{"text":".","start":105,"end":106,"id":19}]} +{"text":"AI Policy Specialist with hands-on experience in SIEM, ELK Stack, and Cloud Native Security.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":49,"end":53,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":55,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":12},{"start":70,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1416263145,"_task_hash":1915343407,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"hands","start":26,"end":31,"id":4},{"text":"-","start":31,"end":32,"id":5},{"text":"on","start":32,"end":34,"id":6},{"text":"experience","start":35,"end":45,"id":7},{"text":"in","start":46,"end":48,"id":8},{"text":"SIEM","start":49,"end":53,"id":9},{"text":",","start":53,"end":54,"id":10},{"text":"ELK","start":55,"end":58,"id":11},{"text":"Stack","start":59,"end":64,"id":12},{"text":",","start":64,"end":65,"id":13},{"text":"and","start":66,"end":69,"id":14},{"text":"Cloud","start":70,"end":75,"id":15},{"text":"Native","start":76,"end":82,"id":16},{"text":"Security","start":83,"end":91,"id":17},{"text":".","start":91,"end":92,"id":18}]} +{"text":"Holds STIX/TAXII.","spans":[{"start":6,"end":16,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1193636213,"_task_hash":1518402376,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"STIX","start":6,"end":10,"id":1},{"text":"/","start":10,"end":11,"id":2},{"text":"TAXII","start":11,"end":16,"id":3},{"text":".","start":16,"end":17,"id":4}]} +{"text":"Experienced PM specializing in Email Gateway Security.","spans":[{"start":12,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":1},{"start":31,"end":53,"label":"SECURITY_DOMAIN","answer":"accept","token_start":4,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":696527191,"_task_hash":-2047869119,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"PM","start":12,"end":14,"id":1},{"text":"specializing","start":15,"end":27,"id":2},{"text":"in","start":28,"end":30,"id":3},{"text":"Email","start":31,"end":36,"id":4},{"text":"Gateway","start":37,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":".","start":53,"end":54,"id":7}]} +{"text":"Proficient in CrowdStrike and Nessus.","spans":[{"start":14,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":30,"end":36,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1837103489,"_task_hash":693235503,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"CrowdStrike","start":14,"end":25,"id":2},{"text":"and","start":26,"end":29,"id":3},{"text":"Nessus","start":30,"end":36,"id":4},{"text":".","start":36,"end":37,"id":5}]} +{"text":"Content Marketing Specialist needed for enterprise security team.","spans":[{"start":0,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1184693823,"_task_hash":696041599,"tokens":[{"text":"Content","start":0,"end":7,"id":0},{"text":"Marketing","start":8,"end":17,"id":1},{"text":"Specialist","start":18,"end":28,"id":2},{"text":"needed","start":29,"end":35,"id":3},{"text":"for","start":36,"end":39,"id":4},{"text":"enterprise","start":40,"end":50,"id":5},{"text":"security","start":51,"end":59,"id":6},{"text":"team","start":60,"end":64,"id":7},{"text":".","start":64,"end":65,"id":8}]} +{"text":"Required: BDD/TDD, Nessus, and NIST Framework expertise.","spans":[{"start":10,"end":17,"label":"CERTIFICATION","answer":"accept","token_start":2,"token_end":4},{"start":19,"end":25,"label":"SECURITY_TOOL","answer":"accept","token_start":6,"token_end":6},{"start":31,"end":45,"label":"FRAMEWORK","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"{role} needed for enterprise security team. Required: {cert}, {tool}, and {framework} expertise."},"_input_hash":1528274654,"_task_hash":-12450306,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":":","start":8,"end":9,"id":1},{"text":"BDD","start":10,"end":13,"id":2},{"text":"/","start":13,"end":14,"id":3},{"text":"TDD","start":14,"end":17,"id":4},{"text":",","start":17,"end":18,"id":5},{"text":"Nessus","start":19,"end":25,"id":6},{"text":",","start":25,"end":26,"id":7},{"text":"and","start":27,"end":30,"id":8},{"text":"NIST","start":31,"end":35,"id":9},{"text":"Framework","start":36,"end":45,"id":10},{"text":"expertise","start":46,"end":55,"id":11},{"text":".","start":55,"end":56,"id":12}]} +{"text":"Security Vulnerability Analyst with hands-on experience in Burp Suite, Splunk, and Security.","spans":[{"start":0,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":59,"end":69,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10},{"start":71,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":12,"token_end":12},{"start":83,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":15,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":726599488,"_task_hash":-2014331586,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Vulnerability","start":9,"end":22,"id":1},{"text":"Analyst","start":23,"end":30,"id":2},{"text":"with","start":31,"end":35,"id":3},{"text":"hands","start":36,"end":41,"id":4},{"text":"-","start":41,"end":42,"id":5},{"text":"on","start":42,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"in","start":56,"end":58,"id":8},{"text":"Burp","start":59,"end":63,"id":9},{"text":"Suite","start":64,"end":69,"id":10},{"text":",","start":69,"end":70,"id":11},{"text":"Splunk","start":71,"end":77,"id":12},{"text":",","start":77,"end":78,"id":13},{"text":"and","start":79,"end":82,"id":14},{"text":"Security","start":83,"end":91,"id":15},{"text":".","start":91,"end":92,"id":16}]} +{"text":"Holds RBAC.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1050074114,"_task_hash":896161982,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"RBAC","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Experienced Information Specialist specializing in Security Culture.","spans":[{"start":12,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":51,"end":67,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-2070465964,"_task_hash":1039474500,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Information","start":12,"end":23,"id":1},{"text":"Specialist","start":24,"end":34,"id":2},{"text":"specializing","start":35,"end":47,"id":3},{"text":"in","start":48,"end":50,"id":4},{"text":"Security","start":51,"end":59,"id":5},{"text":"Culture","start":60,"end":67,"id":6},{"text":".","start":67,"end":68,"id":7}]} +{"text":"Proficient in SIEM Operations and SIEM Operations.","spans":[{"start":14,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":3},{"start":34,"end":49,"label":"SECURITY_TOOL","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-805624968,"_task_hash":-2030563451,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"SIEM","start":14,"end":18,"id":2},{"text":"Operations","start":19,"end":29,"id":3},{"text":"and","start":30,"end":33,"id":4},{"text":"SIEM","start":34,"end":38,"id":5},{"text":"Operations","start":39,"end":49,"id":6},{"text":".","start":49,"end":50,"id":7}]} +{"text":"Accomplished Security Monitoring Analyst specializing in Data Pipelines and Security Awareness Platforms.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":71,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":76,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-32440618,"_task_hash":-1272989664,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Security","start":13,"end":21,"id":1},{"text":"Monitoring","start":22,"end":32,"id":2},{"text":"Analyst","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"Data","start":57,"end":61,"id":6},{"text":"Pipelines","start":62,"end":71,"id":7},{"text":"and","start":72,"end":75,"id":8},{"text":"Security","start":76,"end":84,"id":9},{"text":"Awareness","start":85,"end":94,"id":10},{"text":"Platforms","start":95,"end":104,"id":11},{"text":".","start":104,"end":105,"id":12}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"IT Project Manager professional with 5++ years implementing QRadar and managing ETL programs.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":60,"end":66,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":80,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-137095938,"_task_hash":-1794201956,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Project","start":3,"end":10,"id":1},{"text":"Manager","start":11,"end":18,"id":2},{"text":"professional","start":19,"end":31,"id":3},{"text":"with","start":32,"end":36,"id":4},{"text":"5++","start":37,"end":40,"id":5},{"text":"years","start":41,"end":46,"id":6},{"text":"implementing","start":47,"end":59,"id":7},{"text":"QRadar","start":60,"end":66,"id":8},{"text":"and","start":67,"end":70,"id":9},{"text":"managing","start":71,"end":79,"id":10},{"text":"ETL","start":80,"end":83,"id":11},{"text":"programs","start":84,"end":92,"id":12},{"text":".","start":92,"end":93,"id":13}]} +{"text":"Immediate opening for DevOps Specialist.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1016738327,"_task_hash":-1715349065,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"DevOps","start":22,"end":28,"id":3},{"text":"Specialist","start":29,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Required skills: ELK Stack, Android, SABSA certification.","spans":[{"start":17,"end":26,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":28,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":37,"end":42,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1954669909,"_task_hash":1060091812,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"ELK","start":17,"end":20,"id":3},{"text":"Stack","start":21,"end":26,"id":4},{"text":",","start":26,"end":27,"id":5},{"text":"Android","start":28,"end":35,"id":6},{"text":",","start":35,"end":36,"id":7},{"text":"SABSA","start":37,"end":42,"id":8},{"text":"certification","start":43,"end":56,"id":9},{"text":".","start":56,"end":57,"id":10}]} +{"text":"Cyber Operations Manager with hands-on experience in QRadar, Metasploit, and Network Security Architecture.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":61,"end":71,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":77,"end":106,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":16}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1059300965,"_task_hash":-286348287,"tokens":[{"text":"Cyber","start":0,"end":5,"id":0},{"text":"Operations","start":6,"end":16,"id":1},{"text":"Manager","start":17,"end":24,"id":2},{"text":"with","start":25,"end":29,"id":3},{"text":"hands","start":30,"end":35,"id":4},{"text":"-","start":35,"end":36,"id":5},{"text":"on","start":36,"end":38,"id":6},{"text":"experience","start":39,"end":49,"id":7},{"text":"in","start":50,"end":52,"id":8},{"text":"QRadar","start":53,"end":59,"id":9},{"text":",","start":59,"end":60,"id":10},{"text":"Metasploit","start":61,"end":71,"id":11},{"text":",","start":71,"end":72,"id":12},{"text":"and","start":73,"end":76,"id":13},{"text":"Network","start":77,"end":84,"id":14},{"text":"Security","start":85,"end":93,"id":15},{"text":"Architecture","start":94,"end":106,"id":16},{"text":".","start":106,"end":107,"id":17}]} +{"text":"Holds C/C++.","spans":[{"start":6,"end":11,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-840917921,"_task_hash":-1037521268,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"C","start":6,"end":7,"id":1},{"text":"/","start":7,"end":8,"id":2},{"text":"C++","start":8,"end":11,"id":3},{"text":".","start":11,"end":12,"id":4}]} +{"text":"Identity & Access Management Expert with expertise in OWASP Top 10 compliance and SQL Server operations.","spans":[{"start":0,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":4},{"start":54,"end":66,"label":"FRAMEWORK","answer":"accept","token_start":8,"token_end":10},{"start":82,"end":92,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1343628236,"_task_hash":1810185313,"tokens":[{"text":"Identity","start":0,"end":8,"id":0},{"text":"&","start":9,"end":10,"id":1},{"text":"Access","start":11,"end":17,"id":2},{"text":"Management","start":18,"end":28,"id":3},{"text":"Expert","start":29,"end":35,"id":4},{"text":"with","start":36,"end":40,"id":5},{"text":"expertise","start":41,"end":50,"id":6},{"text":"in","start":51,"end":53,"id":7},{"text":"OWASP","start":54,"end":59,"id":8},{"text":"Top","start":60,"end":63,"id":9},{"text":"10","start":64,"end":66,"id":10},{"text":"compliance","start":67,"end":77,"id":11},{"text":"and","start":78,"end":81,"id":12},{"text":"SQL","start":82,"end":85,"id":13},{"text":"Server","start":86,"end":92,"id":14},{"text":"operations","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} +{"text":"Lead Cloud Security Analyst managing Quantitative Research and Kinematics initiatives.","spans":[{"start":5,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":37,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":63,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1741886891,"_task_hash":-534428039,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cloud","start":5,"end":10,"id":1},{"text":"Security","start":11,"end":19,"id":2},{"text":"Analyst","start":20,"end":27,"id":3},{"text":"managing","start":28,"end":36,"id":4},{"text":"Quantitative","start":37,"end":49,"id":5},{"text":"Research","start":50,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Kinematics","start":63,"end":73,"id":8},{"text":"initiatives","start":74,"end":85,"id":9},{"text":".","start":85,"end":86,"id":10}]} +{"text":"Expert in FERPA compliance.","spans":[{"start":10,"end":15,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":361762368,"_task_hash":-550446663,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"FERPA","start":10,"end":15,"id":2},{"text":"compliance","start":16,"end":26,"id":3},{"text":".","start":26,"end":27,"id":4}]} +{"text":"Seeking Autonomous Systems Engineer with 10++ years experience in Evidence Collection and Content Strategy.","spans":[{"start":8,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":66,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":90,"end":106,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":597576979,"_task_hash":1243724796,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Autonomous","start":8,"end":18,"id":1},{"text":"Systems","start":19,"end":26,"id":2},{"text":"Engineer","start":27,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"10++","start":41,"end":45,"id":5},{"text":"years","start":46,"end":51,"id":6},{"text":"experience","start":52,"end":62,"id":7},{"text":"in","start":63,"end":65,"id":8},{"text":"Evidence","start":66,"end":74,"id":9},{"text":"Collection","start":75,"end":85,"id":10},{"text":"and","start":86,"end":89,"id":11},{"text":"Content","start":90,"end":97,"id":12},{"text":"Strategy","start":98,"end":106,"id":13},{"text":".","start":106,"end":107,"id":14}]} +{"text":"HIPAA required.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":1370665845,"_task_hash":-1113010267,"tokens":[{"text":"HIPAA","start":0,"end":5,"id":0},{"text":"required","start":6,"end":14,"id":1},{"text":".","start":14,"end":15,"id":2}]} +{"text":"Lead Cyber Insurance Consultant managing Project Coordination and Ticketing initiatives.","spans":[{"start":5,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":41,"end":61,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":75,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":591145128,"_task_hash":1345228390,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Cyber","start":5,"end":10,"id":1},{"text":"Insurance","start":11,"end":20,"id":2},{"text":"Consultant","start":21,"end":31,"id":3},{"text":"managing","start":32,"end":40,"id":4},{"text":"Project","start":41,"end":48,"id":5},{"text":"Coordination","start":49,"end":61,"id":6},{"text":"and","start":62,"end":65,"id":7},{"text":"Ticketing","start":66,"end":75,"id":8},{"text":"initiatives","start":76,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} +{"text":"Expert in GDPR compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1029532099,"_task_hash":2123248540,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"GDPR","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Senior Chief Privacy Officer skilled in PowerShell, Cisco, and Cloud Access Security Broker.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":50,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":52,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":63,"end":91,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":537234154,"_task_hash":1750376172,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Chief","start":7,"end":12,"id":1},{"text":"Privacy","start":13,"end":20,"id":2},{"text":"Officer","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"PowerShell","start":40,"end":50,"id":6},{"text":",","start":50,"end":51,"id":7},{"text":"Cisco","start":52,"end":57,"id":8},{"text":",","start":57,"end":58,"id":9},{"text":"and","start":59,"end":62,"id":10},{"text":"Cloud","start":63,"end":68,"id":11},{"text":"Access","start":69,"end":75,"id":12},{"text":"Security","start":76,"end":84,"id":13},{"text":"Broker","start":85,"end":91,"id":14},{"text":".","start":91,"end":92,"id":15}]} +{"text":"SPF/DKIM/DMARC certified.","spans":[{"start":0,"end":14,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":1109510584,"_task_hash":-1427205232,"tokens":[{"text":"SPF","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DKIM","start":4,"end":8,"id":2},{"text":"/","start":8,"end":9,"id":3},{"text":"DMARC","start":9,"end":14,"id":4},{"text":"certified","start":15,"end":24,"id":5},{"text":".","start":24,"end":25,"id":6}]} +{"text":"Immediate opening for Threat Hunter.","spans":[{"start":22,"end":35,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-541991024,"_task_hash":1506961299,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Hunter","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]} +{"text":"Required skills: Splunk, Audit Coordination, ITIL certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":43,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":45,"end":49,"label":"CERTIFICATION","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1759538557,"_task_hash":-1019708283,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Splunk","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Audit","start":25,"end":30,"id":5},{"text":"Coordination","start":31,"end":43,"id":6},{"text":",","start":43,"end":44,"id":7},{"text":"ITIL","start":45,"end":49,"id":8},{"text":"certification","start":50,"end":63,"id":9},{"text":".","start":63,"end":64,"id":10}]} +{"text":"Front\u2011End Developer with expertise in NIST Framework compliance and Compliance Auditing operations.","spans":[{"start":0,"end":19,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":38,"end":52,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":68,"end":87,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":1977940895,"_task_hash":-1501817275,"tokens":[{"text":"Front\u2011End","start":0,"end":9,"id":0},{"text":"Developer","start":10,"end":19,"id":1},{"text":"with","start":20,"end":24,"id":2},{"text":"expertise","start":25,"end":34,"id":3},{"text":"in","start":35,"end":37,"id":4},{"text":"NIST","start":38,"end":42,"id":5},{"text":"Framework","start":43,"end":52,"id":6},{"text":"compliance","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Compliance","start":68,"end":78,"id":9},{"text":"Auditing","start":79,"end":87,"id":10},{"text":"operations","start":88,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} +{"text":"Hiring Risk Assessment Analyst for Blog Writing and botnet detection.","spans":[{"start":7,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":35,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":52,"end":58,"label":"THREAT_TYPE","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":-1489530019,"_task_hash":-832746498,"tokens":[{"text":"Hiring","start":0,"end":6,"id":0},{"text":"Risk","start":7,"end":11,"id":1},{"text":"Assessment","start":12,"end":22,"id":2},{"text":"Analyst","start":23,"end":30,"id":3},{"text":"for","start":31,"end":34,"id":4},{"text":"Blog","start":35,"end":39,"id":5},{"text":"Writing","start":40,"end":47,"id":6},{"text":"and","start":48,"end":51,"id":7},{"text":"botnet","start":52,"end":58,"id":8},{"text":"detection","start":59,"end":68,"id":9},{"text":".","start":68,"end":69,"id":10}]} +{"text":"FERPA compliance experience preferred.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Hiring {role} for {skill} and {threat_type} detection. {regulation} compliance experience preferred."},"_input_hash":650352106,"_task_hash":-1565678402,"tokens":[{"text":"FERPA","start":0,"end":5,"id":0},{"text":"compliance","start":6,"end":16,"id":1},{"text":"experience","start":17,"end":27,"id":2},{"text":"preferred","start":28,"end":37,"id":3},{"text":".","start":37,"end":38,"id":4}]} +{"text":"AI Policy Specialist with expertise in OWASP Top 10 compliance and Ethical Framework Development operations.","spans":[{"start":0,"end":20,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":39,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":8},{"start":67,"end":96,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":2006460857,"_task_hash":1740363865,"tokens":[{"text":"AI","start":0,"end":2,"id":0},{"text":"Policy","start":3,"end":9,"id":1},{"text":"Specialist","start":10,"end":20,"id":2},{"text":"with","start":21,"end":25,"id":3},{"text":"expertise","start":26,"end":35,"id":4},{"text":"in","start":36,"end":38,"id":5},{"text":"OWASP","start":39,"end":44,"id":6},{"text":"Top","start":45,"end":48,"id":7},{"text":"10","start":49,"end":51,"id":8},{"text":"compliance","start":52,"end":62,"id":9},{"text":"and","start":63,"end":66,"id":10},{"text":"Ethical","start":67,"end":74,"id":11},{"text":"Framework","start":75,"end":84,"id":12},{"text":"Development","start":85,"end":96,"id":13},{"text":"operations","start":97,"end":107,"id":14},{"text":".","start":107,"end":108,"id":15}]} +{"text":"Cybersecurity Threat Hunter experienced in detecting trojan attacks using EDR Tools.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1520846597,"_task_hash":930636680,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Threat","start":14,"end":20,"id":1},{"text":"Hunter","start":21,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"EDR","start":74,"end":77,"id":9},{"text":"Tools","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"Unity Developer professional with 3++ years implementing CrowdStrike and managing Transparency programs.","spans":[{"start":0,"end":15,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":57,"end":68,"label":"SECURITY_TOOL","answer":"accept","token_start":7,"token_end":7},{"start":82,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":199479432,"_task_hash":-1071167892,"tokens":[{"text":"Unity","start":0,"end":5,"id":0},{"text":"Developer","start":6,"end":15,"id":1},{"text":"professional","start":16,"end":28,"id":2},{"text":"with","start":29,"end":33,"id":3},{"text":"3++","start":34,"end":37,"id":4},{"text":"years","start":38,"end":43,"id":5},{"text":"implementing","start":44,"end":56,"id":6},{"text":"CrowdStrike","start":57,"end":68,"id":7},{"text":"and","start":69,"end":72,"id":8},{"text":"managing","start":73,"end":81,"id":9},{"text":"Transparency","start":82,"end":94,"id":10},{"text":"programs","start":95,"end":103,"id":11},{"text":".","start":103,"end":104,"id":12}]} +{"text":"Privacy Specialist with hands-on experience in Wireshark, QRadar, and Security Operations.","spans":[{"start":0,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":56,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":58,"end":64,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":70,"end":89,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":95477045,"_task_hash":-2127779324,"tokens":[{"text":"Privacy","start":0,"end":7,"id":0},{"text":"Specialist","start":8,"end":18,"id":1},{"text":"with","start":19,"end":23,"id":2},{"text":"hands","start":24,"end":29,"id":3},{"text":"-","start":29,"end":30,"id":4},{"text":"on","start":30,"end":32,"id":5},{"text":"experience","start":33,"end":43,"id":6},{"text":"in","start":44,"end":46,"id":7},{"text":"Wireshark","start":47,"end":56,"id":8},{"text":",","start":56,"end":57,"id":9},{"text":"QRadar","start":58,"end":64,"id":10},{"text":",","start":64,"end":65,"id":11},{"text":"and","start":66,"end":69,"id":12},{"text":"Security","start":70,"end":78,"id":13},{"text":"Operations","start":79,"end":89,"id":14},{"text":".","start":89,"end":90,"id":15}]} +{"text":"Holds GCP.","spans":[{"start":6,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":491008461,"_task_hash":874544795,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"GCP","start":6,"end":9,"id":1},{"text":".","start":9,"end":10,"id":2}]} +{"text":"Certified OPA working as IT Incident Manager, focused on Aqua Security and Password Spraying prevention.","spans":[{"start":10,"end":13,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":25,"end":44,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":6},{"start":57,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11},{"start":75,"end":92,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":-271006774,"_task_hash":-1777354481,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"OPA","start":10,"end":13,"id":1},{"text":"working","start":14,"end":21,"id":2},{"text":"as","start":22,"end":24,"id":3},{"text":"IT","start":25,"end":27,"id":4},{"text":"Incident","start":28,"end":36,"id":5},{"text":"Manager","start":37,"end":44,"id":6},{"text":",","start":44,"end":45,"id":7},{"text":"focused","start":46,"end":53,"id":8},{"text":"on","start":54,"end":56,"id":9},{"text":"Aqua","start":57,"end":61,"id":10},{"text":"Security","start":62,"end":70,"id":11},{"text":"and","start":71,"end":74,"id":12},{"text":"Password","start":75,"end":83,"id":13},{"text":"Spraying","start":84,"end":92,"id":14},{"text":"prevention","start":93,"end":103,"id":15},{"text":".","start":103,"end":104,"id":16}]} +{"text":"Looking for Red Team Operator to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":4},{"start":38,"end":60,"label":"SECURITY_DOMAIN","answer":"accept","token_start":7,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":1012923588,"_task_hash":-275250338,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"Red","start":12,"end":15,"id":2},{"text":"Team","start":16,"end":20,"id":3},{"text":"Operator","start":21,"end":29,"id":4},{"text":"to","start":30,"end":32,"id":5},{"text":"lead","start":33,"end":37,"id":6},{"text":"Cloud","start":38,"end":43,"id":7},{"text":"Security","start":44,"end":52,"id":8},{"text":"Testing","start":53,"end":60,"id":9},{"text":"initiatives","start":61,"end":72,"id":10},{"text":".","start":72,"end":73,"id":11}]} +{"text":"Must have CrowdStrike experience and NIST Framework knowledge.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":37,"end":51,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-3577102,"_task_hash":1298442445,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":"experience","start":22,"end":32,"id":3},{"text":"and","start":33,"end":36,"id":4},{"text":"NIST","start":37,"end":41,"id":5},{"text":"Framework","start":42,"end":51,"id":6},{"text":"knowledge","start":52,"end":61,"id":7},{"text":".","start":61,"end":62,"id":8}]} +{"text":"Accomplished Android Developer specializing in Adversary Emulation and CI/CD Security.","spans":[{"start":13,"end":30,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":47,"end":66,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-2082157368,"_task_hash":-130450683,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Android","start":13,"end":20,"id":1},{"text":"Developer","start":21,"end":30,"id":2},{"text":"specializing","start":31,"end":43,"id":3},{"text":"in","start":44,"end":46,"id":4},{"text":"Adversary","start":47,"end":56,"id":5},{"text":"Emulation","start":57,"end":66,"id":6},{"text":"and","start":67,"end":70,"id":7},{"text":"CI","start":71,"end":73,"id":8},{"text":"/","start":73,"end":74,"id":9},{"text":"CD","start":74,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":".","start":85,"end":86,"id":12}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"Immediate opening for Phishing Defense Expert.","spans":[{"start":22,"end":45,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-58762404,"_task_hash":-1002142669,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Phishing","start":22,"end":30,"id":3},{"text":"Defense","start":31,"end":38,"id":4},{"text":"Expert","start":39,"end":45,"id":5},{"text":".","start":45,"end":46,"id":6}]} +{"text":"Required skills: Burp Suite, Offline Storage, PMP Certification certification.","spans":[{"start":17,"end":27,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":4},{"start":29,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":46,"end":63,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":284157875,"_task_hash":300311886,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Burp","start":17,"end":21,"id":3},{"text":"Suite","start":22,"end":27,"id":4},{"text":",","start":27,"end":28,"id":5},{"text":"Offline","start":29,"end":36,"id":6},{"text":"Storage","start":37,"end":44,"id":7},{"text":",","start":44,"end":45,"id":8},{"text":"PMP","start":46,"end":49,"id":9},{"text":"Certification","start":50,"end":63,"id":10},{"text":"certification","start":64,"end":77,"id":11},{"text":".","start":77,"end":78,"id":12}]} +{"text":"Immediate opening for Firmware Engineer.","spans":[{"start":22,"end":39,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1376834588,"_task_hash":-102165587,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Firmware","start":22,"end":30,"id":3},{"text":"Engineer","start":31,"end":39,"id":4},{"text":".","start":39,"end":40,"id":5}]} +{"text":"Required skills: Nessus, Governance, ROS certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":35,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":37,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1591218166,"_task_hash":586434627,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Governance","start":25,"end":35,"id":5},{"text":",","start":35,"end":36,"id":6},{"text":"ROS","start":37,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Technical Support Analyst with hands-on experience in CrowdStrike, QRadar, and Cloud Access Security Broker.","spans":[{"start":0,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":54,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":67,"end":73,"label":"SECURITY_TOOL","answer":"accept","token_start":11,"token_end":11},{"start":79,"end":107,"label":"SECURITY_DOMAIN","answer":"accept","token_start":14,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":-1390465447,"_task_hash":-1532673348,"tokens":[{"text":"Technical","start":0,"end":9,"id":0},{"text":"Support","start":10,"end":17,"id":1},{"text":"Analyst","start":18,"end":25,"id":2},{"text":"with","start":26,"end":30,"id":3},{"text":"hands","start":31,"end":36,"id":4},{"text":"-","start":36,"end":37,"id":5},{"text":"on","start":37,"end":39,"id":6},{"text":"experience","start":40,"end":50,"id":7},{"text":"in","start":51,"end":53,"id":8},{"text":"CrowdStrike","start":54,"end":65,"id":9},{"text":",","start":65,"end":66,"id":10},{"text":"QRadar","start":67,"end":73,"id":11},{"text":",","start":73,"end":74,"id":12},{"text":"and","start":75,"end":78,"id":13},{"text":"Cloud","start":79,"end":84,"id":14},{"text":"Access","start":85,"end":91,"id":15},{"text":"Security","start":92,"end":100,"id":16},{"text":"Broker","start":101,"end":107,"id":17},{"text":".","start":107,"end":108,"id":18}]} +{"text":"Holds LDAP.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1805087655,"_task_hash":149409793,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"LDAP","start":6,"end":10,"id":1},{"text":".","start":10,"end":11,"id":2}]} +{"text":"Senior Technology Manager skilled in Business Analysis, Secret Management, and Security Tools.","spans":[{"start":7,"end":25,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":37,"end":54,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":56,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":79,"end":93,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-2099725091,"_task_hash":-1102378120,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Technology","start":7,"end":17,"id":1},{"text":"Manager","start":18,"end":25,"id":2},{"text":"skilled","start":26,"end":33,"id":3},{"text":"in","start":34,"end":36,"id":4},{"text":"Business","start":37,"end":45,"id":5},{"text":"Analysis","start":46,"end":54,"id":6},{"text":",","start":54,"end":55,"id":7},{"text":"Secret","start":56,"end":62,"id":8},{"text":"Management","start":63,"end":73,"id":9},{"text":",","start":73,"end":74,"id":10},{"text":"and","start":75,"end":78,"id":11},{"text":"Security","start":79,"end":87,"id":12},{"text":"Tools","start":88,"end":93,"id":13},{"text":".","start":93,"end":94,"id":14}]} +{"text":"OSINT certified.","spans":[{"start":0,"end":5,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":524401982,"_task_hash":688717848,"tokens":[{"text":"OSINT","start":0,"end":5,"id":0},{"text":"certified","start":6,"end":15,"id":1},{"text":".","start":15,"end":16,"id":2}]} +{"text":"Governance Risk Compliance Specialist with 5+ years experience in Investigations, Microsoft Defender, and Cloud Hardening.","spans":[{"start":0,"end":37,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":3},{"start":66,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":10},{"start":82,"end":100,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":13},{"start":106,"end":121,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1759893546,"_task_hash":-2095591746,"tokens":[{"text":"Governance","start":0,"end":10,"id":0},{"text":"Risk","start":11,"end":15,"id":1},{"text":"Compliance","start":16,"end":26,"id":2},{"text":"Specialist","start":27,"end":37,"id":3},{"text":"with","start":38,"end":42,"id":4},{"text":"5","start":43,"end":44,"id":5},{"text":"+","start":44,"end":45,"id":6},{"text":"years","start":46,"end":51,"id":7},{"text":"experience","start":52,"end":62,"id":8},{"text":"in","start":63,"end":65,"id":9},{"text":"Investigations","start":66,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"Microsoft","start":82,"end":91,"id":12},{"text":"Defender","start":92,"end":100,"id":13},{"text":",","start":100,"end":101,"id":14},{"text":"and","start":102,"end":105,"id":15},{"text":"Cloud","start":106,"end":111,"id":16},{"text":"Hardening","start":112,"end":121,"id":17},{"text":".","start":121,"end":122,"id":18}]} +{"text":"Holds SAML certification.","spans":[{"start":6,"end":10,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with {years} years experience in {skill1}, {skill2}, and {skill3}. Holds {cert} certification."},"_input_hash":1163993454,"_task_hash":2026522681,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"SAML","start":6,"end":10,"id":1},{"text":"certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Accomplished Vendor Manager specializing in Agile Testing and Security Standards.","spans":[{"start":13,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":44,"end":57,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":80,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-891686759,"_task_hash":-1538601991,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Vendor","start":13,"end":19,"id":1},{"text":"Manager","start":20,"end":27,"id":2},{"text":"specializing","start":28,"end":40,"id":3},{"text":"in","start":41,"end":43,"id":4},{"text":"Agile","start":44,"end":49,"id":5},{"text":"Testing","start":50,"end":57,"id":6},{"text":"and","start":58,"end":61,"id":7},{"text":"Security","start":62,"end":70,"id":8},{"text":"Standards","start":71,"end":80,"id":9},{"text":".","start":80,"end":81,"id":10}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Creative Content Strategist experienced in detecting trojan attacks using ELK Stack.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":53,"end":59,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":74,"end":83,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":1503164354,"_task_hash":545052805,"tokens":[{"text":"Creative","start":0,"end":8,"id":0},{"text":"Content","start":9,"end":16,"id":1},{"text":"Strategist","start":17,"end":27,"id":2},{"text":"experienced","start":28,"end":39,"id":3},{"text":"in","start":40,"end":42,"id":4},{"text":"detecting","start":43,"end":52,"id":5},{"text":"trojan","start":53,"end":59,"id":6},{"text":"attacks","start":60,"end":67,"id":7},{"text":"using","start":68,"end":73,"id":8},{"text":"ELK","start":74,"end":77,"id":9},{"text":"Stack","start":78,"end":83,"id":10},{"text":".","start":83,"end":84,"id":11}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Join our team as Program Manager!","spans":[{"start":17,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-300991477,"_task_hash":319892983,"tokens":[{"text":"Join","start":0,"end":4,"id":0},{"text":"our","start":5,"end":8,"id":1},{"text":"team","start":9,"end":13,"id":2},{"text":"as","start":14,"end":16,"id":3},{"text":"Program","start":17,"end":24,"id":4},{"text":"Manager","start":25,"end":32,"id":5},{"text":"!","start":32,"end":33,"id":6}]} +{"text":"Must know CrowdStrike, Splunk, and NIST Framework.","spans":[{"start":10,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":23,"end":29,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4},{"start":35,"end":49,"label":"FRAMEWORK","answer":"accept","token_start":7,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":1557234610,"_task_hash":-1728313749,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"know","start":5,"end":9,"id":1},{"text":"CrowdStrike","start":10,"end":21,"id":2},{"text":",","start":21,"end":22,"id":3},{"text":"Splunk","start":23,"end":29,"id":4},{"text":",","start":29,"end":30,"id":5},{"text":"and","start":31,"end":34,"id":6},{"text":"NIST","start":35,"end":39,"id":7},{"text":"Framework","start":40,"end":49,"id":8},{"text":".","start":49,"end":50,"id":9}]} +{"text":"DNS/DHCP certification a plus.","spans":[{"start":0,"end":8,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"job_template","template":"Join our team as {role}! Must know {tool1}, {tool2}, and {framework}. {cert} certification a plus."},"_input_hash":-554524723,"_task_hash":1346368627,"tokens":[{"text":"DNS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"DHCP","start":4,"end":8,"id":2},{"text":"certification","start":9,"end":22,"id":3},{"text":"a","start":23,"end":24,"id":4},{"text":"plus","start":25,"end":29,"id":5},{"text":".","start":29,"end":30,"id":6}]} +{"text":"Senior Information Specialist skilled in Reinforcement Learning, Digital Forensics, and Cloud Security Testing.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":41,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":65,"end":82,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":9},{"start":88,"end":110,"label":"SECURITY_DOMAIN","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-210607438,"_task_hash":-513952164,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Information","start":7,"end":18,"id":1},{"text":"Specialist","start":19,"end":29,"id":2},{"text":"skilled","start":30,"end":37,"id":3},{"text":"in","start":38,"end":40,"id":4},{"text":"Reinforcement","start":41,"end":54,"id":5},{"text":"Learning","start":55,"end":63,"id":6},{"text":",","start":63,"end":64,"id":7},{"text":"Digital","start":65,"end":72,"id":8},{"text":"Forensics","start":73,"end":82,"id":9},{"text":",","start":82,"end":83,"id":10},{"text":"and","start":84,"end":87,"id":11},{"text":"Cloud","start":88,"end":93,"id":12},{"text":"Security","start":94,"end":102,"id":13},{"text":"Testing","start":103,"end":110,"id":14},{"text":".","start":110,"end":111,"id":15}]} +{"text":"IAM certified.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-71584496,"_task_hash":-1130812141,"tokens":[{"text":"IAM","start":0,"end":3,"id":0},{"text":"certified","start":4,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Accomplished Cryptography Expert specializing in Issue Resolution and Physical Security.","spans":[{"start":13,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":49,"end":65,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":70,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-1037935585,"_task_hash":-67997519,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Cryptography","start":13,"end":25,"id":1},{"text":"Expert","start":26,"end":32,"id":2},{"text":"specializing","start":33,"end":45,"id":3},{"text":"in","start":46,"end":48,"id":4},{"text":"Issue","start":49,"end":54,"id":5},{"text":"Resolution","start":55,"end":65,"id":6},{"text":"and","start":66,"end":69,"id":7},{"text":"Physical","start":70,"end":78,"id":8},{"text":"Security","start":79,"end":87,"id":9},{"text":".","start":87,"end":88,"id":10}]} +{"text":"Implemented OWASP Top 10 controls.","spans":[{"start":12,"end":24,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-358757885,"_task_hash":-743918532,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"OWASP","start":12,"end":17,"id":1},{"text":"Top","start":18,"end":21,"id":2},{"text":"10","start":22,"end":24,"id":3},{"text":"controls","start":25,"end":33,"id":4},{"text":".","start":33,"end":34,"id":5}]} +{"text":"Major Incident Manager professional with 5+ years implementing Wireshark and managing Third-Party Risk programs.","spans":[{"start":0,"end":22,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":63,"end":72,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9},{"start":86,"end":102,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":15}],"answer":"accept","meta":{"source":"cv_template","template":"{role} professional with {years}+ years implementing {tool} and managing {skill} programs."},"_input_hash":-1061602331,"_task_hash":-1066062002,"tokens":[{"text":"Major","start":0,"end":5,"id":0},{"text":"Incident","start":6,"end":14,"id":1},{"text":"Manager","start":15,"end":22,"id":2},{"text":"professional","start":23,"end":35,"id":3},{"text":"with","start":36,"end":40,"id":4},{"text":"5","start":41,"end":42,"id":5},{"text":"+","start":42,"end":43,"id":6},{"text":"years","start":44,"end":49,"id":7},{"text":"implementing","start":50,"end":62,"id":8},{"text":"Wireshark","start":63,"end":72,"id":9},{"text":"and","start":73,"end":76,"id":10},{"text":"managing","start":77,"end":85,"id":11},{"text":"Third","start":86,"end":91,"id":12},{"text":"-","start":91,"end":92,"id":13},{"text":"Party","start":92,"end":97,"id":14},{"text":"Risk","start":98,"end":102,"id":15},{"text":"programs","start":103,"end":111,"id":16},{"text":".","start":111,"end":112,"id":17}]} +{"text":"Security Compliance Officer opportunity: Lead Security Scanning Tools program, implement NIST Framework, manage Privacy-Preserving ML operations.","spans":[{"start":0,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":46,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":112,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":237325066,"_task_hash":-1992424386,"tokens":[{"text":"Security","start":0,"end":8,"id":0},{"text":"Compliance","start":9,"end":19,"id":1},{"text":"Officer","start":20,"end":27,"id":2},{"text":"opportunity","start":28,"end":39,"id":3},{"text":":","start":39,"end":40,"id":4},{"text":"Lead","start":41,"end":45,"id":5},{"text":"Security","start":46,"end":54,"id":6},{"text":"Scanning","start":55,"end":63,"id":7},{"text":"Tools","start":64,"end":69,"id":8},{"text":"program","start":70,"end":77,"id":9},{"text":",","start":77,"end":78,"id":10},{"text":"implement","start":79,"end":88,"id":11},{"text":"NIST","start":89,"end":93,"id":12},{"text":"Framework","start":94,"end":103,"id":13},{"text":",","start":103,"end":104,"id":14},{"text":"manage","start":105,"end":111,"id":15},{"text":"Privacy","start":112,"end":119,"id":16},{"text":"-","start":119,"end":120,"id":17},{"text":"Preserving","start":120,"end":130,"id":18},{"text":"ML","start":131,"end":133,"id":19},{"text":"operations","start":134,"end":144,"id":20},{"text":".","start":144,"end":145,"id":21}]} +{"text":"Looking for DevOps Engineer to lead GCP Security initiatives.","spans":[{"start":12,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":36,"end":48,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-313776545,"_task_hash":445121415,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"DevOps","start":12,"end":18,"id":2},{"text":"Engineer","start":19,"end":27,"id":3},{"text":"to","start":28,"end":30,"id":4},{"text":"lead","start":31,"end":35,"id":5},{"text":"GCP","start":36,"end":39,"id":6},{"text":"Security","start":40,"end":48,"id":7},{"text":"initiatives","start":49,"end":60,"id":8},{"text":".","start":60,"end":61,"id":9}]} +{"text":"Must have Splunk experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-992876351,"_task_hash":263104763,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Splunk","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Seeking Defensive Security Analyst with 5++ years experience in Model Deployment and Network Traffic Analysis.","spans":[{"start":8,"end":34,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":64,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":85,"end":109,"label":"TECHNICAL_SKILL","answer":"accept","token_start":12,"token_end":14}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-444322514,"_task_hash":642474622,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Defensive","start":8,"end":17,"id":1},{"text":"Security","start":18,"end":26,"id":2},{"text":"Analyst","start":27,"end":34,"id":3},{"text":"with","start":35,"end":39,"id":4},{"text":"5++","start":40,"end":43,"id":5},{"text":"years","start":44,"end":49,"id":6},{"text":"experience","start":50,"end":60,"id":7},{"text":"in","start":61,"end":63,"id":8},{"text":"Model","start":64,"end":69,"id":9},{"text":"Deployment","start":70,"end":80,"id":10},{"text":"and","start":81,"end":84,"id":11},{"text":"Network","start":85,"end":92,"id":12},{"text":"Traffic","start":93,"end":100,"id":13},{"text":"Analysis","start":101,"end":109,"id":14},{"text":".","start":109,"end":110,"id":15}]} +{"text":"PKI required.","spans":[{"start":0,"end":3,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-2132396321,"_task_hash":1739596969,"tokens":[{"text":"PKI","start":0,"end":3,"id":0},{"text":"required","start":4,"end":12,"id":1},{"text":".","start":12,"end":13,"id":2}]} +{"text":"Immediate opening for Business Data Analyst.","spans":[{"start":22,"end":43,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":1295879884,"_task_hash":1315078640,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Business","start":22,"end":30,"id":3},{"text":"Data","start":31,"end":35,"id":4},{"text":"Analyst","start":36,"end":43,"id":5},{"text":".","start":43,"end":44,"id":6}]} +{"text":"Required skills: SIEM, IDS/IPS, ETL certification.","spans":[{"start":17,"end":21,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":23,"end":30,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":32,"end":35,"label":"CERTIFICATION","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-697463645,"_task_hash":434575365,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"SIEM","start":17,"end":21,"id":3},{"text":",","start":21,"end":22,"id":4},{"text":"IDS","start":23,"end":26,"id":5},{"text":"/","start":26,"end":27,"id":6},{"text":"IPS","start":27,"end":30,"id":7},{"text":",","start":30,"end":31,"id":8},{"text":"ETL","start":32,"end":35,"id":9},{"text":"certification","start":36,"end":49,"id":10},{"text":".","start":49,"end":50,"id":11}]} +{"text":"IT Manager role available: Coverage Analysis experience required, Kubernetes Security knowledge essential.","spans":[{"start":0,"end":10,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":27,"end":44,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":66,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":70417682,"_task_hash":863908192,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Manager","start":3,"end":10,"id":1},{"text":"role","start":11,"end":15,"id":2},{"text":"available","start":16,"end":25,"id":3},{"text":":","start":25,"end":26,"id":4},{"text":"Coverage","start":27,"end":35,"id":5},{"text":"Analysis","start":36,"end":44,"id":6},{"text":"experience","start":45,"end":55,"id":7},{"text":"required","start":56,"end":64,"id":8},{"text":",","start":64,"end":65,"id":9},{"text":"Kubernetes","start":66,"end":76,"id":10},{"text":"Security","start":77,"end":85,"id":11},{"text":"knowledge","start":86,"end":95,"id":12},{"text":"essential","start":96,"end":105,"id":13},{"text":".","start":105,"end":106,"id":14}]} +{"text":"FISMA familiarity needed.","spans":[{"start":0,"end":5,"label":"REGULATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"{role} role available: {skill} experience required, {domain} knowledge essential. {regulation} familiarity needed."},"_input_hash":559084573,"_task_hash":-1523409177,"tokens":[{"text":"FISMA","start":0,"end":5,"id":0},{"text":"familiarity","start":6,"end":17,"id":1},{"text":"needed","start":18,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Senior Lead Software Engineer position: 10+ years minimum, expert in Python Scripting, Risk Metrics, and Security Culture.","spans":[{"start":7,"end":29,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":69,"end":85,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":14},{"start":87,"end":99,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17},{"start":105,"end":121,"label":"SECURITY_DOMAIN","answer":"accept","token_start":20,"token_end":21}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":-607272320,"_task_hash":1345620220,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Lead","start":7,"end":11,"id":1},{"text":"Software","start":12,"end":20,"id":2},{"text":"Engineer","start":21,"end":29,"id":3},{"text":"position","start":30,"end":38,"id":4},{"text":":","start":38,"end":39,"id":5},{"text":"10","start":40,"end":42,"id":6},{"text":"+","start":42,"end":43,"id":7},{"text":"years","start":44,"end":49,"id":8},{"text":"minimum","start":50,"end":57,"id":9},{"text":",","start":57,"end":58,"id":10},{"text":"expert","start":59,"end":65,"id":11},{"text":"in","start":66,"end":68,"id":12},{"text":"Python","start":69,"end":75,"id":13},{"text":"Scripting","start":76,"end":85,"id":14},{"text":",","start":85,"end":86,"id":15},{"text":"Risk","start":87,"end":91,"id":16},{"text":"Metrics","start":92,"end":99,"id":17},{"text":",","start":99,"end":100,"id":18},{"text":"and","start":101,"end":104,"id":19},{"text":"Security","start":105,"end":113,"id":20},{"text":"Culture","start":114,"end":121,"id":21},{"text":".","start":121,"end":122,"id":22}]} +{"text":"Cybersecurity Analyst experienced in detecting adware attacks using Wireshark.","spans":[{"start":0,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":47,"end":53,"label":"THREAT_TYPE","answer":"accept","token_start":5,"token_end":5},{"start":68,"end":77,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":996495949,"_task_hash":1603530611,"tokens":[{"text":"Cybersecurity","start":0,"end":13,"id":0},{"text":"Analyst","start":14,"end":21,"id":1},{"text":"experienced","start":22,"end":33,"id":2},{"text":"in","start":34,"end":36,"id":3},{"text":"detecting","start":37,"end":46,"id":4},{"text":"adware","start":47,"end":53,"id":5},{"text":"attacks","start":54,"end":61,"id":6},{"text":"using","start":62,"end":67,"id":7},{"text":"Wireshark","start":68,"end":77,"id":8},{"text":".","start":77,"end":78,"id":9}]} +{"text":"Familiar with OWASP Top 10.","spans":[{"start":14,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":42858187,"_task_hash":1899390478,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"OWASP","start":14,"end":19,"id":2},{"text":"Top","start":20,"end":23,"id":3},{"text":"10","start":24,"end":26,"id":4},{"text":".","start":26,"end":27,"id":5}]} +{"text":"Senior VP Security skilled in Device Management, Unreal, and Cloud Security Testing.","spans":[{"start":7,"end":18,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":30,"end":47,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":6},{"start":49,"end":55,"label":"TECHNICAL_SKILL","answer":"accept","token_start":8,"token_end":8},{"start":61,"end":83,"label":"SECURITY_DOMAIN","answer":"accept","token_start":11,"token_end":13}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":849986476,"_task_hash":-1104901216,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"VP","start":7,"end":9,"id":1},{"text":"Security","start":10,"end":18,"id":2},{"text":"skilled","start":19,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"Device","start":30,"end":36,"id":5},{"text":"Management","start":37,"end":47,"id":6},{"text":",","start":47,"end":48,"id":7},{"text":"Unreal","start":49,"end":55,"id":8},{"text":",","start":55,"end":56,"id":9},{"text":"and","start":57,"end":60,"id":10},{"text":"Cloud","start":61,"end":66,"id":11},{"text":"Security","start":67,"end":75,"id":12},{"text":"Testing","start":76,"end":83,"id":13},{"text":".","start":83,"end":84,"id":14}]} +{"text":"ISO 22301 certified.","spans":[{"start":0,"end":9,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":1}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":-1486434936,"_task_hash":-892801137,"tokens":[{"text":"ISO","start":0,"end":3,"id":0},{"text":"22301","start":4,"end":9,"id":1},{"text":"certified","start":10,"end":19,"id":2},{"text":".","start":19,"end":20,"id":3}]} +{"text":"UX Designer with expertise in NIST Framework compliance and Sensor Fusion operations.","spans":[{"start":0,"end":11,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":30,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":60,"end":73,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-473935881,"_task_hash":1042614845,"tokens":[{"text":"UX","start":0,"end":2,"id":0},{"text":"Designer","start":3,"end":11,"id":1},{"text":"with","start":12,"end":16,"id":2},{"text":"expertise","start":17,"end":26,"id":3},{"text":"in","start":27,"end":29,"id":4},{"text":"NIST","start":30,"end":34,"id":5},{"text":"Framework","start":35,"end":44,"id":6},{"text":"compliance","start":45,"end":55,"id":7},{"text":"and","start":56,"end":59,"id":8},{"text":"Sensor","start":60,"end":66,"id":9},{"text":"Fusion","start":67,"end":73,"id":10},{"text":"operations","start":74,"end":84,"id":11},{"text":".","start":84,"end":85,"id":12}]} +{"text":"Threat Analyst with hands-on experience in CrowdStrike, Wireshark, and Cloud Security.","spans":[{"start":0,"end":14,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":43,"end":54,"label":"SECURITY_TOOL","answer":"accept","token_start":8,"token_end":8},{"start":56,"end":65,"label":"SECURITY_TOOL","answer":"accept","token_start":10,"token_end":10},{"start":71,"end":85,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":1637800776,"_task_hash":-714012994,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Analyst","start":7,"end":14,"id":1},{"text":"with","start":15,"end":19,"id":2},{"text":"hands","start":20,"end":25,"id":3},{"text":"-","start":25,"end":26,"id":4},{"text":"on","start":26,"end":28,"id":5},{"text":"experience","start":29,"end":39,"id":6},{"text":"in","start":40,"end":42,"id":7},{"text":"CrowdStrike","start":43,"end":54,"id":8},{"text":",","start":54,"end":55,"id":9},{"text":"Wireshark","start":56,"end":65,"id":10},{"text":",","start":65,"end":66,"id":11},{"text":"and","start":67,"end":70,"id":12},{"text":"Cloud","start":71,"end":76,"id":13},{"text":"Security","start":77,"end":85,"id":14},{"text":".","start":85,"end":86,"id":15}]} +{"text":"Holds OSCP Certification.","spans":[{"start":6,"end":24,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with hands-on experience in {tool1}, {tool2}, and {domain}. Holds {cert}."},"_input_hash":851475902,"_task_hash":270501489,"tokens":[{"text":"Holds","start":0,"end":5,"id":0},{"text":"OSCP","start":6,"end":10,"id":1},{"text":"Certification","start":11,"end":24,"id":2},{"text":".","start":24,"end":25,"id":3}]} +{"text":"Seeking Cyber Threat Intelligence Analyst with 10+ years experience in Mentoring and Sass/SCSS.","spans":[{"start":8,"end":41,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":4},{"start":71,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":11},{"start":85,"end":94,"label":"TECHNICAL_SKILL","answer":"accept","token_start":13,"token_end":15}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1498746376,"_task_hash":1261694452,"tokens":[{"text":"Seeking","start":0,"end":7,"id":0},{"text":"Cyber","start":8,"end":13,"id":1},{"text":"Threat","start":14,"end":20,"id":2},{"text":"Intelligence","start":21,"end":33,"id":3},{"text":"Analyst","start":34,"end":41,"id":4},{"text":"with","start":42,"end":46,"id":5},{"text":"10","start":47,"end":49,"id":6},{"text":"+","start":49,"end":50,"id":7},{"text":"years","start":51,"end":56,"id":8},{"text":"experience","start":57,"end":67,"id":9},{"text":"in","start":68,"end":70,"id":10},{"text":"Mentoring","start":71,"end":80,"id":11},{"text":"and","start":81,"end":84,"id":12},{"text":"Sass","start":85,"end":89,"id":13},{"text":"/","start":89,"end":90,"id":14},{"text":"SCSS","start":90,"end":94,"id":15},{"text":".","start":94,"end":95,"id":16}]} +{"text":"RBAC required.","spans":[{"start":0,"end":4,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":0}],"answer":"accept","meta":{"source":"job_template","template":"Seeking {role} with {years}+ years experience in {skill1} and {skill2}. {cert} required."},"_input_hash":-1198453295,"_task_hash":1243055279,"tokens":[{"text":"RBAC","start":0,"end":4,"id":0},{"text":"required","start":5,"end":13,"id":1},{"text":".","start":13,"end":14,"id":2}]} +{"text":"Accomplished AI Product Manager specializing in Governance and Security Automation.","spans":[{"start":13,"end":31,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":48,"end":58,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":6},{"start":63,"end":82,"label":"SECURITY_DOMAIN","answer":"accept","token_start":8,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":989925616,"_task_hash":1847595968,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"AI","start":13,"end":15,"id":1},{"text":"Product","start":16,"end":23,"id":2},{"text":"Manager","start":24,"end":31,"id":3},{"text":"specializing","start":32,"end":44,"id":4},{"text":"in","start":45,"end":47,"id":5},{"text":"Governance","start":48,"end":58,"id":6},{"text":"and","start":59,"end":62,"id":7},{"text":"Security","start":63,"end":71,"id":8},{"text":"Automation","start":72,"end":82,"id":9},{"text":".","start":82,"end":83,"id":10}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"IT Network Administrator experienced in detecting DDoS attacks using Metasploit.","spans":[{"start":0,"end":24,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":50,"end":54,"label":"THREAT_TYPE","answer":"accept","token_start":6,"token_end":6},{"start":69,"end":79,"label":"SECURITY_TOOL","answer":"accept","token_start":9,"token_end":9}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1587380385,"_task_hash":-485960657,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"Network","start":3,"end":10,"id":1},{"text":"Administrator","start":11,"end":24,"id":2},{"text":"experienced","start":25,"end":36,"id":3},{"text":"in","start":37,"end":39,"id":4},{"text":"detecting","start":40,"end":49,"id":5},{"text":"DDoS","start":50,"end":54,"id":6},{"text":"attacks","start":55,"end":62,"id":7},{"text":"using","start":63,"end":68,"id":8},{"text":"Metasploit","start":69,"end":79,"id":9},{"text":".","start":79,"end":80,"id":10}]} +{"text":"Familiar with NIST Framework.","spans":[{"start":14,"end":28,"label":"FRAMEWORK","answer":"accept","token_start":2,"token_end":3}],"answer":"accept","meta":{"source":"cv_template","template":"{role} experienced in detecting {threat_type} attacks using {tool}. Familiar with {framework}."},"_input_hash":-1457554871,"_task_hash":-317810919,"tokens":[{"text":"Familiar","start":0,"end":8,"id":0},{"text":"with","start":9,"end":13,"id":1},{"text":"NIST","start":14,"end":18,"id":2},{"text":"Framework","start":19,"end":28,"id":3},{"text":".","start":28,"end":29,"id":4}]} +{"text":"We need a DevOps Specialist skilled in XXE prevention and spyware analysis using Nessus.","spans":[{"start":10,"end":27,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":4},{"start":39,"end":42,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":7,"token_end":7},{"start":58,"end":65,"label":"THREAT_TYPE","answer":"accept","token_start":10,"token_end":10},{"start":81,"end":87,"label":"SECURITY_TOOL","answer":"accept","token_start":13,"token_end":13}],"answer":"accept","meta":{"source":"job_template","template":"We need a {role} skilled in {attack_technique} prevention and {threat_type} analysis using {tool}."},"_input_hash":-2141627285,"_task_hash":1782367803,"tokens":[{"text":"We","start":0,"end":2,"id":0},{"text":"need","start":3,"end":7,"id":1},{"text":"a","start":8,"end":9,"id":2},{"text":"DevOps","start":10,"end":16,"id":3},{"text":"Specialist","start":17,"end":27,"id":4},{"text":"skilled","start":28,"end":35,"id":5},{"text":"in","start":36,"end":38,"id":6},{"text":"XXE","start":39,"end":42,"id":7},{"text":"prevention","start":43,"end":53,"id":8},{"text":"and","start":54,"end":57,"id":9},{"text":"spyware","start":58,"end":65,"id":10},{"text":"analysis","start":66,"end":74,"id":11},{"text":"using","start":75,"end":80,"id":12},{"text":"Nessus","start":81,"end":87,"id":13},{"text":".","start":87,"end":88,"id":14}]} +{"text":"Vulnerability Assessment Analyst opportunity: Lead Terraform Security program, implement NIST Framework, manage Data Synchronization operations.","spans":[{"start":0,"end":32,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":51,"end":69,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":7},{"start":89,"end":103,"label":"FRAMEWORK","answer":"accept","token_start":11,"token_end":12},{"start":112,"end":132,"label":"TECHNICAL_SKILL","answer":"accept","token_start":15,"token_end":16}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":1987686193,"_task_hash":-1698901697,"tokens":[{"text":"Vulnerability","start":0,"end":13,"id":0},{"text":"Assessment","start":14,"end":24,"id":1},{"text":"Analyst","start":25,"end":32,"id":2},{"text":"opportunity","start":33,"end":44,"id":3},{"text":":","start":44,"end":45,"id":4},{"text":"Lead","start":46,"end":50,"id":5},{"text":"Terraform","start":51,"end":60,"id":6},{"text":"Security","start":61,"end":69,"id":7},{"text":"program","start":70,"end":77,"id":8},{"text":",","start":77,"end":78,"id":9},{"text":"implement","start":79,"end":88,"id":10},{"text":"NIST","start":89,"end":93,"id":11},{"text":"Framework","start":94,"end":103,"id":12},{"text":",","start":103,"end":104,"id":13},{"text":"manage","start":105,"end":111,"id":14},{"text":"Data","start":112,"end":116,"id":15},{"text":"Synchronization","start":117,"end":132,"id":16},{"text":"operations","start":133,"end":143,"id":17},{"text":".","start":143,"end":144,"id":18}]} +{"text":"Immediate opening for Threat Detection Specialist.","spans":[{"start":22,"end":49,"label":"SECURITY_ROLE","answer":"accept","token_start":3,"token_end":5}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":544574104,"_task_hash":2010994894,"tokens":[{"text":"Immediate","start":0,"end":9,"id":0},{"text":"opening","start":10,"end":17,"id":1},{"text":"for","start":18,"end":21,"id":2},{"text":"Threat","start":22,"end":28,"id":3},{"text":"Detection","start":29,"end":38,"id":4},{"text":"Specialist","start":39,"end":49,"id":5},{"text":".","start":49,"end":50,"id":6}]} +{"text":"Required skills: Nessus, Kotlin, PRINCE2 certification.","spans":[{"start":17,"end":23,"label":"SECURITY_TOOL","answer":"accept","token_start":3,"token_end":3},{"start":25,"end":31,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":5},{"start":33,"end":40,"label":"CERTIFICATION","answer":"accept","token_start":7,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Immediate opening for {role}. Required skills: {tool}, {skill}, {cert} certification."},"_input_hash":-1542057596,"_task_hash":-578400523,"tokens":[{"text":"Required","start":0,"end":8,"id":0},{"text":"skills","start":9,"end":15,"id":1},{"text":":","start":15,"end":16,"id":2},{"text":"Nessus","start":17,"end":23,"id":3},{"text":",","start":23,"end":24,"id":4},{"text":"Kotlin","start":25,"end":31,"id":5},{"text":",","start":31,"end":32,"id":6},{"text":"PRINCE2","start":33,"end":40,"id":7},{"text":"certification","start":41,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Senior Cyber Defense Analyst skilled in Active Directory, Architecture Standards, and Security Protocols.","spans":[{"start":7,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":40,"end":56,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":58,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10},{"start":86,"end":104,"label":"SECURITY_DOMAIN","answer":"accept","token_start":13,"token_end":14}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":2002458632,"_task_hash":-999554446,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Cyber","start":7,"end":12,"id":1},{"text":"Defense","start":13,"end":20,"id":2},{"text":"Analyst","start":21,"end":28,"id":3},{"text":"skilled","start":29,"end":36,"id":4},{"text":"in","start":37,"end":39,"id":5},{"text":"Active","start":40,"end":46,"id":6},{"text":"Directory","start":47,"end":56,"id":7},{"text":",","start":56,"end":57,"id":8},{"text":"Architecture","start":58,"end":70,"id":9},{"text":"Standards","start":71,"end":80,"id":10},{"text":",","start":80,"end":81,"id":11},{"text":"and","start":82,"end":85,"id":12},{"text":"Security","start":86,"end":94,"id":13},{"text":"Protocols","start":95,"end":104,"id":14},{"text":".","start":104,"end":105,"id":15}]} +{"text":"IDS/IPS certified.","spans":[{"start":0,"end":7,"label":"CERTIFICATION","answer":"accept","token_start":0,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Senior {role} skilled in {skill1}, {skill2}, and {domain}. {cert} certified."},"_input_hash":10066054,"_task_hash":-1532123537,"tokens":[{"text":"IDS","start":0,"end":3,"id":0},{"text":"/","start":3,"end":4,"id":1},{"text":"IPS","start":4,"end":7,"id":2},{"text":"certified","start":8,"end":17,"id":3},{"text":".","start":17,"end":18,"id":4}]} +{"text":"Network Security Architect opportunity: Lead Security Culture Building program, implement NIST Framework, manage Playbook Development operations.","spans":[{"start":0,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":45,"end":70,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8},{"start":90,"end":104,"label":"FRAMEWORK","answer":"accept","token_start":12,"token_end":13},{"start":113,"end":133,"label":"TECHNICAL_SKILL","answer":"accept","token_start":16,"token_end":17}],"answer":"accept","meta":{"source":"job_template","template":"{role} opportunity: Lead {domain} program, implement {framework}, manage {skill} operations."},"_input_hash":-867673426,"_task_hash":1230241513,"tokens":[{"text":"Network","start":0,"end":7,"id":0},{"text":"Security","start":8,"end":16,"id":1},{"text":"Architect","start":17,"end":26,"id":2},{"text":"opportunity","start":27,"end":38,"id":3},{"text":":","start":38,"end":39,"id":4},{"text":"Lead","start":40,"end":44,"id":5},{"text":"Security","start":45,"end":53,"id":6},{"text":"Culture","start":54,"end":61,"id":7},{"text":"Building","start":62,"end":70,"id":8},{"text":"program","start":71,"end":78,"id":9},{"text":",","start":78,"end":79,"id":10},{"text":"implement","start":80,"end":89,"id":11},{"text":"NIST","start":90,"end":94,"id":12},{"text":"Framework","start":95,"end":104,"id":13},{"text":",","start":104,"end":105,"id":14},{"text":"manage","start":106,"end":112,"id":15},{"text":"Playbook","start":113,"end":121,"id":16},{"text":"Development","start":122,"end":133,"id":17},{"text":"operations","start":134,"end":144,"id":18},{"text":".","start":144,"end":145,"id":19}]} +{"text":"Lead DevSecOps Engineer managing PKI and Autonomous Navigation initiatives.","spans":[{"start":5,"end":23,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":33,"end":36,"label":"TECHNICAL_SKILL","answer":"accept","token_start":4,"token_end":4},{"start":41,"end":62,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-2010469057,"_task_hash":-1195419762,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"DevSecOps","start":5,"end":14,"id":1},{"text":"Engineer","start":15,"end":23,"id":2},{"text":"managing","start":24,"end":32,"id":3},{"text":"PKI","start":33,"end":36,"id":4},{"text":"and","start":37,"end":40,"id":5},{"text":"Autonomous","start":41,"end":51,"id":6},{"text":"Navigation","start":52,"end":62,"id":7},{"text":"initiatives","start":63,"end":74,"id":8},{"text":".","start":74,"end":75,"id":9}]} +{"text":"Expert in DORA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":472818243,"_task_hash":-2136596353,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"DORA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Senior Crisis Manager position: 10 years minimum, expert in Contract Negotiation, Vishing, and Container Registry Security.","spans":[{"start":7,"end":21,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":60,"end":80,"label":"TECHNICAL_SKILL","answer":"accept","token_start":11,"token_end":12},{"start":82,"end":89,"label":"TECHNICAL_SKILL","answer":"accept","token_start":14,"token_end":14},{"start":95,"end":122,"label":"SECURITY_DOMAIN","answer":"accept","token_start":17,"token_end":19}],"answer":"accept","meta":{"source":"job_template","template":"Senior {role} position: {years} years minimum, expert in {skill1}, {skill2}, and {domain}."},"_input_hash":2015157675,"_task_hash":341438624,"tokens":[{"text":"Senior","start":0,"end":6,"id":0},{"text":"Crisis","start":7,"end":13,"id":1},{"text":"Manager","start":14,"end":21,"id":2},{"text":"position","start":22,"end":30,"id":3},{"text":":","start":30,"end":31,"id":4},{"text":"10","start":32,"end":34,"id":5},{"text":"years","start":35,"end":40,"id":6},{"text":"minimum","start":41,"end":48,"id":7},{"text":",","start":48,"end":49,"id":8},{"text":"expert","start":50,"end":56,"id":9},{"text":"in","start":57,"end":59,"id":10},{"text":"Contract","start":60,"end":68,"id":11},{"text":"Negotiation","start":69,"end":80,"id":12},{"text":",","start":80,"end":81,"id":13},{"text":"Vishing","start":82,"end":89,"id":14},{"text":",","start":89,"end":90,"id":15},{"text":"and","start":91,"end":94,"id":16},{"text":"Container","start":95,"end":104,"id":17},{"text":"Registry","start":105,"end":113,"id":18},{"text":"Security","start":114,"end":122,"id":19},{"text":".","start":122,"end":123,"id":20}]} +{"text":"Lead Insider Risk Specialist managing Adult Learning Principles and Phishing Detection initiatives.","spans":[{"start":5,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":38,"end":63,"label":"TECHNICAL_SKILL","answer":"accept","token_start":5,"token_end":7},{"start":68,"end":86,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":-1930717197,"_task_hash":-143553317,"tokens":[{"text":"Lead","start":0,"end":4,"id":0},{"text":"Insider","start":5,"end":12,"id":1},{"text":"Risk","start":13,"end":17,"id":2},{"text":"Specialist","start":18,"end":28,"id":3},{"text":"managing","start":29,"end":37,"id":4},{"text":"Adult","start":38,"end":43,"id":5},{"text":"Learning","start":44,"end":52,"id":6},{"text":"Principles","start":53,"end":63,"id":7},{"text":"and","start":64,"end":67,"id":8},{"text":"Phishing","start":68,"end":76,"id":9},{"text":"Detection","start":77,"end":86,"id":10},{"text":"initiatives","start":87,"end":98,"id":11},{"text":".","start":98,"end":99,"id":12}]} +{"text":"Expert in CCPA compliance.","spans":[{"start":10,"end":14,"label":"REGULATION","answer":"accept","token_start":2,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Lead {role} managing {skill1} and {skill2} initiatives. Expert in {regulation} compliance."},"_input_hash":1445325232,"_task_hash":1005408673,"tokens":[{"text":"Expert","start":0,"end":6,"id":0},{"text":"in","start":7,"end":9,"id":1},{"text":"CCPA","start":10,"end":14,"id":2},{"text":"compliance","start":15,"end":25,"id":3},{"text":".","start":25,"end":26,"id":4}]} +{"text":"Accomplished Business Continuity Manager specializing in C# and Security Scanning Tools.","spans":[{"start":13,"end":40,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":3},{"start":57,"end":59,"label":"TECHNICAL_SKILL","answer":"accept","token_start":6,"token_end":7},{"start":64,"end":87,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":1882260531,"_task_hash":804421001,"tokens":[{"text":"Accomplished","start":0,"end":12,"id":0},{"text":"Business","start":13,"end":21,"id":1},{"text":"Continuity","start":22,"end":32,"id":2},{"text":"Manager","start":33,"end":40,"id":3},{"text":"specializing","start":41,"end":53,"id":4},{"text":"in","start":54,"end":56,"id":5},{"text":"C","start":57,"end":58,"id":6},{"text":"#","start":58,"end":59,"id":7},{"text":"and","start":60,"end":63,"id":8},{"text":"Security","start":64,"end":72,"id":9},{"text":"Scanning","start":73,"end":81,"id":10},{"text":"Tools","start":82,"end":87,"id":11},{"text":".","start":87,"end":88,"id":12}]} +{"text":"Implemented NIST Framework controls.","spans":[{"start":12,"end":26,"label":"FRAMEWORK","answer":"accept","token_start":1,"token_end":2}],"answer":"accept","meta":{"source":"cv_template","template":"Accomplished {role} specializing in {skill} and {domain}. Implemented {framework} controls."},"_input_hash":-308437107,"_task_hash":1042392107,"tokens":[{"text":"Implemented","start":0,"end":11,"id":0},{"text":"NIST","start":12,"end":16,"id":1},{"text":"Framework","start":17,"end":26,"id":2},{"text":"controls","start":27,"end":35,"id":3},{"text":".","start":35,"end":36,"id":4}]} +{"text":"IT GRC Specialist with expertise in NIST Framework compliance and Solution Modeling operations.","spans":[{"start":0,"end":17,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":2},{"start":36,"end":50,"label":"FRAMEWORK","answer":"accept","token_start":6,"token_end":7},{"start":66,"end":83,"label":"TECHNICAL_SKILL","answer":"accept","token_start":10,"token_end":11}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":438739304,"_task_hash":599239579,"tokens":[{"text":"IT","start":0,"end":2,"id":0},{"text":"GRC","start":3,"end":6,"id":1},{"text":"Specialist","start":7,"end":17,"id":2},{"text":"with","start":18,"end":22,"id":3},{"text":"expertise","start":23,"end":32,"id":4},{"text":"in","start":33,"end":35,"id":5},{"text":"NIST","start":36,"end":40,"id":6},{"text":"Framework","start":41,"end":50,"id":7},{"text":"compliance","start":51,"end":61,"id":8},{"text":"and","start":62,"end":65,"id":9},{"text":"Solution","start":66,"end":74,"id":10},{"text":"Modeling","start":75,"end":83,"id":11},{"text":"operations","start":84,"end":94,"id":12},{"text":".","start":94,"end":95,"id":13}]} +{"text":"Looking for GRC Specialist to lead Cloud Security Testing initiatives.","spans":[{"start":12,"end":26,"label":"SECURITY_ROLE","answer":"accept","token_start":2,"token_end":3},{"start":35,"end":57,"label":"SECURITY_DOMAIN","answer":"accept","token_start":6,"token_end":8}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":732397461,"_task_hash":-611234639,"tokens":[{"text":"Looking","start":0,"end":7,"id":0},{"text":"for","start":8,"end":11,"id":1},{"text":"GRC","start":12,"end":15,"id":2},{"text":"Specialist","start":16,"end":26,"id":3},{"text":"to","start":27,"end":29,"id":4},{"text":"lead","start":30,"end":34,"id":5},{"text":"Cloud","start":35,"end":40,"id":6},{"text":"Security","start":41,"end":49,"id":7},{"text":"Testing","start":50,"end":57,"id":8},{"text":"initiatives","start":58,"end":69,"id":9},{"text":".","start":69,"end":70,"id":10}]} +{"text":"Must have Nessus experience and OWASP Top 10 knowledge.","spans":[{"start":10,"end":16,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":32,"end":44,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":7}],"answer":"accept","meta":{"source":"job_template","template":"Looking for {role} to lead {domain} initiatives. Must have {tool} experience and {framework} knowledge."},"_input_hash":-889543638,"_task_hash":-1537583104,"tokens":[{"text":"Must","start":0,"end":4,"id":0},{"text":"have","start":5,"end":9,"id":1},{"text":"Nessus","start":10,"end":16,"id":2},{"text":"experience","start":17,"end":27,"id":3},{"text":"and","start":28,"end":31,"id":4},{"text":"OWASP","start":32,"end":37,"id":5},{"text":"Top","start":38,"end":41,"id":6},{"text":"10","start":42,"end":44,"id":7},{"text":"knowledge","start":45,"end":54,"id":8},{"text":".","start":54,"end":55,"id":9}]} +{"text":"Threat Hunter with expertise in NIST Framework compliance and Privacy Engineering operations.","spans":[{"start":0,"end":13,"label":"SECURITY_ROLE","answer":"accept","token_start":0,"token_end":1},{"start":32,"end":46,"label":"FRAMEWORK","answer":"accept","token_start":5,"token_end":6},{"start":62,"end":81,"label":"TECHNICAL_SKILL","answer":"accept","token_start":9,"token_end":10}],"answer":"accept","meta":{"source":"cv_template","template":"{role} with expertise in {framework} compliance and {skill} operations."},"_input_hash":-104127338,"_task_hash":-960350748,"tokens":[{"text":"Threat","start":0,"end":6,"id":0},{"text":"Hunter","start":7,"end":13,"id":1},{"text":"with","start":14,"end":18,"id":2},{"text":"expertise","start":19,"end":28,"id":3},{"text":"in","start":29,"end":31,"id":4},{"text":"NIST","start":32,"end":36,"id":5},{"text":"Framework","start":37,"end":46,"id":6},{"text":"compliance","start":47,"end":57,"id":7},{"text":"and","start":58,"end":61,"id":8},{"text":"Privacy","start":62,"end":69,"id":9},{"text":"Engineering","start":70,"end":81,"id":10},{"text":"operations","start":82,"end":92,"id":11},{"text":".","start":92,"end":93,"id":12}]} +{"text":"Certified TOGAF working as Unity Developer, focused on Security Culture and CSRF prevention.","spans":[{"start":10,"end":15,"label":"CERTIFICATION","answer":"accept","token_start":1,"token_end":1},{"start":27,"end":42,"label":"SECURITY_ROLE","answer":"accept","token_start":4,"token_end":5},{"start":55,"end":71,"label":"SECURITY_DOMAIN","answer":"accept","token_start":9,"token_end":10},{"start":76,"end":80,"label":"ATTACK_TECHNIQUE","answer":"accept","token_start":12,"token_end":12}],"answer":"accept","meta":{"source":"cv_template","template":"Certified {cert} working as {role}, focused on {domain} and {attack_technique} prevention."},"_input_hash":642980448,"_task_hash":-226098929,"tokens":[{"text":"Certified","start":0,"end":9,"id":0},{"text":"TOGAF","start":10,"end":15,"id":1},{"text":"working","start":16,"end":23,"id":2},{"text":"as","start":24,"end":26,"id":3},{"text":"Unity","start":27,"end":32,"id":4},{"text":"Developer","start":33,"end":42,"id":5},{"text":",","start":42,"end":43,"id":6},{"text":"focused","start":44,"end":51,"id":7},{"text":"on","start":52,"end":54,"id":8},{"text":"Security","start":55,"end":63,"id":9},{"text":"Culture","start":64,"end":71,"id":10},{"text":"and","start":72,"end":75,"id":11},{"text":"CSRF","start":76,"end":80,"id":12},{"text":"prevention","start":81,"end":91,"id":13},{"text":".","start":91,"end":92,"id":14}]} +{"text":"Experienced Network Engineer specializing in Security Hardening.","spans":[{"start":12,"end":28,"label":"SECURITY_ROLE","answer":"accept","token_start":1,"token_end":2},{"start":45,"end":63,"label":"SECURITY_DOMAIN","answer":"accept","token_start":5,"token_end":6}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-655368386,"_task_hash":-806281702,"tokens":[{"text":"Experienced","start":0,"end":11,"id":0},{"text":"Network","start":12,"end":19,"id":1},{"text":"Engineer","start":20,"end":28,"id":2},{"text":"specializing","start":29,"end":41,"id":3},{"text":"in","start":42,"end":44,"id":4},{"text":"Security","start":45,"end":53,"id":5},{"text":"Hardening","start":54,"end":63,"id":6},{"text":".","start":63,"end":64,"id":7}]} +{"text":"Proficient in Metasploit and Splunk.","spans":[{"start":14,"end":24,"label":"SECURITY_TOOL","answer":"accept","token_start":2,"token_end":2},{"start":29,"end":35,"label":"SECURITY_TOOL","answer":"accept","token_start":4,"token_end":4}],"answer":"accept","meta":{"source":"cv_template","template":"Experienced {role} specializing in {domain}. Proficient in {tool1} and {tool2}."},"_input_hash":-1442921620,"_task_hash":860521687,"tokens":[{"text":"Proficient","start":0,"end":10,"id":0},{"text":"in","start":11,"end":13,"id":1},{"text":"Metasploit","start":14,"end":24,"id":2},{"text":"and","start":25,"end":28,"id":3},{"text":"Splunk","start":29,"end":35,"id":4},{"text":".","start":35,"end":36,"id":5}]}