Key Takeaways

  • 75% of U.S. employers use automated applicant tracking systems to screen resumes before a human reviews them (Harvard Business School & Accenture, 2021)
  • The most common ATS failures are missing keywords, incompatible formatting, and incorrect file types
  • ResumeGeni scores your resume across 8 parsing layers — modeled on the same steps enterprise ATS platforms like Workday, Greenhouse, and Taleo use to evaluate candidates

How ATS Resume Scoring Works

Applicant tracking systems parse your resume into structured data — extracting your name, contact info, work history, skills, and education — then score how well that data matches the job requirements. Many ATS rejections happen because the parser couldn't extract critical fields, not because the candidate wasn't qualified.

LayerWhat It ChecksWhy It Matters
Document extractionFile format, encoding, readabilityCorrupted or image-only PDFs fail immediately
Layout analysisTables, columns, headers, footersMulti-column layouts break field extraction
Section detectionExperience, education, skills headingsNon-standard headings cause sections to be missed
Field mappingName, email, phone, dates, titlesMissing contact info is a common cause of immediate rejection
Keyword matchingJob-specific terms, skills, certificationsKeyword overlap affects recruiter search visibility and ATS scoring
Chronology checkDate ordering, gap detectionReverse-chronological order is expected by most ATS
QuantificationMetrics, numbers, measurable outcomesQuantified achievements help human reviewers and some scoring models
Confidence scoringOverall parse quality and completenessLow-confidence parses get deprioritized in results

Frequently Asked Questions

Is ResumeGeni free?
Yes. ResumeGeni is currently in beta — ATS analysis, scoring, and initial improvement suggestions are free with no signup required. Full guidance and saved reports may require a free account.
What file formats are supported?
PDF, DOCX, DOC, TXT, RTF, ODT, and Apple Pages. PDF and DOCX are recommended for best ATS compatibility.
How is the ATS score calculated?
Your resume is processed through an 8-layer parsing pipeline that extracts structured data the same way enterprise ATS platforms do. The score reflects how completely and accurately your resume can be parsed, plus how well your content matches common ATS ranking criteria.
Can ATS read PDF resumes?
Yes, but not all PDFs are equal. Text-based PDFs parse well. Image-only PDFs (scanned documents) and PDFs with complex tables or multi-column layouts often fail ATS parsing. Our analyzer will flag these issues.
How do I improve my ATS score?
Focus on three areas: use a clean single-column format, include keywords from the job description naturally in your experience bullets, and ensure all sections (contact, experience, education, skills) use standard headings.

ATS Guides & Resources

Built by engineers with 12 years of experience building enterprise hiring technology at ZipRecruiter. Last updated .

Staff TLM, Security Engineering

Diligentrobotics · Austin, Texas, United States

What we’re doing isn’t easy, but nothing worth doing ever is. 

Diligent builds helpful robots that operate safely in the real world. We move fast, ship often, and rely on pragmatic engineering to make high-risk systems trustworthy. 

We’re hiring a Staff TLM, Security Engineering — a hands-on leader who both manages a small team and executes high-impact technical work in a Tech-Lead-Manager (TLM) style. You’ll own the Security Engineering roadmap, ship secure features and controls, mentor junior engineers, and raise the bar for product and operational security across embedded systems, cloud services, and the supply chain.

Key Responsibilities

  • Lead & execute: Act as a TLM — set technical direction, own deliverables, and regularly contribute as an IC (design, architecture, code, reviews, and hands-on proof-of-concepts).
  • Build the security program: Define and deliver the long-term Security Engineering roadmap for device, firmware, cloud, and service security. Prioritize work to address the highest business risk.
  • Secure product lifecycle: Embed security into product development: threat modeling, secure design reviews, architecture reviews, secure coding practices, and verification/testing (including fuzzing, static/dynamic analysis).
  • Device & firmware security: Drive secure boot, hardware root of trust, cryptographic design/PKI, OTA update security, device identity, and secrets management for embedded platforms and sensor subsystems.
  • Cloud & infrastructure security: Own security of backend services, CI/CD pipelines, IaC, identity and access management, secrets engines, logging/monitoring, and incident detection/response.
  • Vulnerability management: Lead vulnerability discovery, triage, SLAs and remediation, coordinating across firmware, hardware, cloud, and third-party vendors.
  • Incident response & forensics: Lead or support security incidents; develop runbooks, playbooks, and blameless postmortems.
  • Mentor & grow the team: Hire, coach, and mentor security engineers. Run 1:1s, career development plans, and technical training; create a culture of ownership and continuous improvement.
  • Cross-functional partnership: Partner with product, firmware, SRE/Ops, QA, and supply-chain teams to implement pragmatic controls and measure security outcomes.

 

What Success Looks Like

  • Production systems with measurable reductions in exploitable vulnerabilities and shortened remediation times.
  • Secure provisioning and lifecycle for devices and firmware with robust telemetry and verification.
  • A high-performing security engineering team that consistently delivers technical outcomes and has visible growth.
  • Repeatable security design and validation patterns integrated into product development.
  • Clear, data-driven visibility into security posture for leadership and engineering teams.

 

Basic Qualifications

    • 8+ years experience in security engineering, with demonstrated impacts across product and infrastructure security.

    • 3+ years leading teams or operating in a TLM/tech-lead + manager capacity (hands-on plus people leadership).

    • Strong hands-on technical skills: design and implementation experience in secure firmware, embedded platforms, or device security and cloud/backend security. Comfortable writing and reviewing code (C/C++, Python, Go, or similar).

    • Deep knowledge of cryptography concepts, PKI, secure boot, secure OTA, device identity, and secrets management.

    • Proven experience in vulnerability management, threat modeling, and incident response for distributed systems.

    • Experience securing CI/CD pipelines, IaC (Terraform/CloudFormation), and cloud platforms (AWS/GCP/Azure).

    • Excellent technical communication skills: able to explain tradeoffs and design security controls to engineers and leadership alike.

    Strong mentoring skills and demonstrated success developing junior engineers into independent contributors.
  • Experience: 3–5+ years of proven success managing complex Enterprise Network Environments.
  • Firewall Expertise: In-depth experience with Palo Alto firewalls (configuration, management, and security policy).
  • Wireless Mastery: Strong background in wireless network design, maintenance, and complex troubleshooting.
  • Leadership: Demonstrated ability to lead projects and mentor team members.

Preferred Qualifications

  • Hardware/Platform Experience: Ubiquiti/UniFi Systems, Routers (e.g. Cradlepoint), and NetCloud Manager.
  • Network Tools: Experience with WiFi Survey tools (e.g., Ekahau), RADIUS, DNS, and MDM solutions.
  • Cellular Connectivity: Knowledge of LTE/5G RF technologies and LTE failover configurations.
  • Systems: Proficiency in Linux environments.
  • Certifications: PCNSA/PCNSE, CCNA/CCNP, or equivalent.
  • Agility: Previous experience thriving in a high-growth startup environment.