Key Takeaways

  • 75% of U.S. employers use automated applicant tracking systems to screen resumes before a human reviews them (Harvard Business School & Accenture, 2021)
  • The most common ATS failures are missing keywords, incompatible formatting, and incorrect file types
  • ResumeGeni scores your resume across 8 parsing layers — modeled on the same steps enterprise ATS platforms like Workday, Greenhouse, and Taleo use to evaluate candidates

How ATS Resume Scoring Works

Applicant tracking systems parse your resume into structured data — extracting your name, contact info, work history, skills, and education — then score how well that data matches the job requirements. Many ATS rejections happen because the parser couldn't extract critical fields, not because the candidate wasn't qualified.

LayerWhat It ChecksWhy It Matters
Document extractionFile format, encoding, readabilityCorrupted or image-only PDFs fail immediately
Layout analysisTables, columns, headers, footersMulti-column layouts break field extraction
Section detectionExperience, education, skills headingsNon-standard headings cause sections to be missed
Field mappingName, email, phone, dates, titlesMissing contact info is a common cause of immediate rejection
Keyword matchingJob-specific terms, skills, certificationsKeyword overlap affects recruiter search visibility and ATS scoring
Chronology checkDate ordering, gap detectionReverse-chronological order is expected by most ATS
QuantificationMetrics, numbers, measurable outcomesQuantified achievements help human reviewers and some scoring models
Confidence scoringOverall parse quality and completenessLow-confidence parses get deprioritized in results

Frequently Asked Questions

Is ResumeGeni free?
Yes. ResumeGeni is currently in beta — ATS analysis, scoring, and initial improvement suggestions are free with no signup required. Full guidance and saved reports may require a free account.
What file formats are supported?
PDF, DOCX, DOC, TXT, RTF, ODT, and Apple Pages. PDF and DOCX are recommended for best ATS compatibility.
How is the ATS score calculated?
Your resume is processed through an 8-layer parsing pipeline that extracts structured data the same way enterprise ATS platforms do. The score reflects how completely and accurately your resume can be parsed, plus how well your content matches common ATS ranking criteria.
Can ATS read PDF resumes?
Yes, but not all PDFs are equal. Text-based PDFs parse well. Image-only PDFs (scanned documents) and PDFs with complex tables or multi-column layouts often fail ATS parsing. Our analyzer will flag these issues.
How do I improve my ATS score?
Focus on three areas: use a clean single-column format, include keywords from the job description naturally in your experience bullets, and ensure all sections (contact, experience, education, skills) use standard headings.

ATS Guides & Resources

Built by engineers with 12 years of experience building enterprise hiring technology at ZipRecruiter. Last updated .

Senior Software Reverse Engineer

Twosixtechnologies · Arlington, Virginia

At Two Six Technologies, we build, deploy, and implement innovative products that solve the world’s most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what’s possible to empower our team and support our customers in building a safer global future.

Overview of Opportunity 

Join the Trusted Electronics & Effects business unit  of Two Six Technologies, where we push the boundaries of software and firmware reverse engineering to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you’ll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability research on complex, real-world targets.

Our government customers rely on us to deliver mission-critical security solutions, and we’re seeking a Senior Software Reverse Engineer who excels in reverse engineering embedded systems, identifying security vulnerabilities, and developing innovative proof-of-concept exploits. If you’re passionate about wireless security, embedded firmware analysis, and making an impact on national security, we want you on our team.

What You’ll Do:

  • Reverse engineer wireless and embedded systems, identifying vulnerabilities and assessing their security impact.
  • Develop proof-of-concept exploits for discovered vulnerabilities following DevOps best practices for keeping code bases organized and maintainable.
  • Analyze firmware, software protections, and wireless protocols to uncover security flaws.
  • Utilize and develop custom tools to analyze and manipulate software/firmware binaries.
  • Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment.
  • Solve complex technical challenges with no predefined solutions.

What You’ll Need (Basic Qualifications):

  • Bachelor’s (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience).
  • Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research.
  • Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra.
  • Expertise in one or more of the following:
    • Firmware analysis (ARM, MIPS, PowerPC, RTOS).
    • Firmware rehosting using emulation tools such as QEMU
    • Fuzzing and exploit development.
    • Binary obfuscation and anti-analysis techniques.
    • Wireless protocols and radio signal analysis.
    • File system forensics and fault injection frameworks.

Nice to Have (Preferred):

  • Experience scripting with Binary Ninja API or Ghidra.
  • Experience in embedded software development using C/C++ for RTOS or Linux environments.
  • Knowledge of cryptographic security and secure boot mechanisms.
  • Hands-on experience working with hardware debugging tools, JTAG/SWD, or software-defined radio (SDR) frameworks.
  • Familiarity with digital signal processing, wireless security protocols, RF signal processing, and side-channel analysis.
  • Client-facing experience in technical roles.
  • Active TS/SCI with Polygraph preferred.

Security Clearance:

  • Active Top Secret clearance required with eligibility/willingness to obtain a TS/SCI.

#LI-ZS1

#LI-ONSITE

Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development.

The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements.

Salary Range
$137,333$205,999 USD