Key Takeaways

  • 75% of U.S. employers use automated applicant tracking systems to screen resumes before a human reviews them (Harvard Business School & Accenture, 2021)
  • The most common ATS failures are missing keywords, incompatible formatting, and incorrect file types
  • ResumeGeni scores your resume across 8 parsing layers — modeled on the same steps enterprise ATS platforms like Workday, Greenhouse, and Taleo use to evaluate candidates

How ATS Resume Scoring Works

Applicant tracking systems parse your resume into structured data — extracting your name, contact info, work history, skills, and education — then score how well that data matches the job requirements. Many ATS rejections happen because the parser couldn't extract critical fields, not because the candidate wasn't qualified.

LayerWhat It ChecksWhy It Matters
Document extractionFile format, encoding, readabilityCorrupted or image-only PDFs fail immediately
Layout analysisTables, columns, headers, footersMulti-column layouts break field extraction
Section detectionExperience, education, skills headingsNon-standard headings cause sections to be missed
Field mappingName, email, phone, dates, titlesMissing contact info is a common cause of immediate rejection
Keyword matchingJob-specific terms, skills, certificationsKeyword overlap affects recruiter search visibility and ATS scoring
Chronology checkDate ordering, gap detectionReverse-chronological order is expected by most ATS
QuantificationMetrics, numbers, measurable outcomesQuantified achievements help human reviewers and some scoring models
Confidence scoringOverall parse quality and completenessLow-confidence parses get deprioritized in results

Frequently Asked Questions

Is ResumeGeni free?
Yes. ResumeGeni is currently in beta — ATS analysis, scoring, and initial improvement suggestions are free with no signup required. Full guidance and saved reports may require a free account.
What file formats are supported?
PDF, DOCX, DOC, TXT, RTF, ODT, and Apple Pages. PDF and DOCX are recommended for best ATS compatibility.
How is the ATS score calculated?
Your resume is processed through an 8-layer parsing pipeline that extracts structured data the same way enterprise ATS platforms do. The score reflects how completely and accurately your resume can be parsed, plus how well your content matches common ATS ranking criteria.
Can ATS read PDF resumes?
Yes, but not all PDFs are equal. Text-based PDFs parse well. Image-only PDFs (scanned documents) and PDFs with complex tables or multi-column layouts often fail ATS parsing. Our analyzer will flag these issues.
How do I improve my ATS score?
Focus on three areas: use a clean single-column format, include keywords from the job description naturally in your experience bullets, and ensure all sections (contact, experience, education, skills) use standard headings.

ATS Guides & Resources

Built by engineers with 12 years of experience building enterprise hiring technology at ZipRecruiter. Last updated .

Detection & Response Manager

Nebius · Tel Aviv, Israel

Why work at Nebius
Nebius is leading a new era in cloud computing to serve the global AI economy. We create the tools and resources our customers need to solve real-world challenges and transform industries, without massive infrastructure costs or the need to build large in-house AI/ML teams. Our employees work at the cutting edge of AI cloud infrastructure alongside some of the most experienced and innovative leaders and engineers in the field.

Where we work
Headquartered in Amsterdam and listed on Nasdaq, Nebius has a global footprint with R&D hubs across Europe, North America, and Israel. The team of over 800 employees includes more than 400 highly skilled engineers with deep expertise across hardware and software engineering, as well as an in-house AI R&D team.

Role Overview

Nebius is seeking a Detection & Response Manager to lead and mature our security operations and adversary defense capabilities.

This role owns SOC operations, incident response, red teaming, and security automation (SIEM & SOAR) across cloud, data center, and enterprise environments.

The ideal candidate combines operational excellence, threat-adversary thinking, and automation-first execution.

Key Responsibilities

Security Operations Center (SOC) Leadership

  • Own day-to-day SOC operations across cloud, data center, and corporate environments

  • Define detection strategy aligned to Nebius threat models and crown jewels

  • Ensure high-quality alerting, triage, escalation, and reporting

  • Continuously reduce false positives and alert fatigue


Incident Response & Crisis Management

  • Lead end-to-end incident response for high-severity security incidents

  • Own incident command during crises (technical, executive, and regulatory coordination)

  • Ensure post-incident reviews lead to real control improvements

  • Maintain and regularly test incident response playbooks


Red Team & Adversarial Testing

  • Manage red team and purple team activities (internal and external)

  • Translate real-world adversary TTPs into detection and response improvements

  • Ensure findings from red team exercises are remediated and verified

  • Partner with product, cloud, and physical security teams on attack simulations


SOC Automation (SIEM & SOAR)

  • Own SIEM and SOAR strategy, architecture, and roadmap

  • Drive automation of detection, enrichment, response, and reporting

  • Integrate identity, cloud, CI/CD, and physical security telemetry

  • Measure SOC effectiveness using MTTD, MTTR, and coverage metrics


Threat Intelligence & Continuous Improvement

  • Operationalize threat intelligence into detections and playbooks

  • Track emerging threats relevant to cloud, AI, and infrastructure providers

  • Continuously improve detection coverage against prioritized attack paths


What Success Looks Like (12 Months)

  • Measurable reduction in MTTD and MTTR for high-severity incidents

  • Majority of high-risk incidents detected internally, not externally

  • Red team findings consistently detected and contained

  • SOC automation meaningfully reduces manual effort

  • Clear, trusted security reporting to CISO and leadership


Required Qualifications

  • 7+ years in security operations, incident response, or threat detection

  • Proven experience leading a SOC or incident response function

  • Strong experience with SIEM and SOAR platforms

  • Deep understanding of:

    • Cloud security 

    • Identity-based attacks and detection

    • Endpoint, network, and application telemetry

  • Experience running or managing red team / purple team activities

  • Calm, decisive leadership under pressure


Preferred Qualifications

  • Experience in cloud service providers, hyperscale, or infrastructure companies

  • Familiarity with GPU / HPC environments or large-scale data centers

  • Experience with DORA, SOC 2, ISO 27001 incident requirements

  • Background in threat hunting or offensive security


Key Skills & Attributes

  • Adversary-minded: thinks like an attacker, not a tool operator

  • Automation-first mindset

  • Strong communicator during crises

  • Data-driven decision making

  • High ownership, low ego


Why Nebius

  • Defend one of the most advanced AI and GPU cloud platforms

  • Influence security architecture at scale

  • Operate at the intersection of cloud, physical infrastructure, and regulation

  • Build a modern, high-impact detection & response function

 

What we offer 

  • Competitive salary and comprehensive benefits package.
  • Opportunities for professional growth within Nebius.
  • Flexible working arrangements.
  • A dynamic and collaborative work environment that values initiative and innovation.

We’re growing and expanding our products every day. If you’re up to the challenge and are excited about AI and ML as much as we are, join us!