FAQ - Frequently Ask Questions
Here you can find answers to the most frequently asked questions.
Simply click on the "Sign Up" button in the top right corner of the page and follow the instructions.
We value privacy and simplicity. We use a simple subscription model of paying up front to access the platform which helps differentiate those who are serious about their next opportunity from those that are not. It also prevents bots and other unwanted mass automation systems from flooding the platform and diluting results of real life cyber talent.
Additionally, this helps to maintain the platform without having to revert to selling your information or selling space for ads that track you.
That's Great! You don't have to use the platform. If you are on LinkedIn or job boards and getting great results then congratulations! However, if you still aren't getting the results you want, then we are here to help!
We are a platform that is focused on matching cyber talent with the next great role. We are not a social media platform.
Our goal is to advance your career in cyber security by making the process as painless and straightforward as possible for talent, recruiters and companies. We were founded by cyber professionals that got tired of how the legacy hiring and recruiting system operated as it wasted too much time with everyone involved. Additonally, we wanted an ability to help easily distinguish between different talent and help those that are serious about hiring to be able to easily find the right talent without having to be cyber/recruiting/HR experts. This results in a faster, more efficient hiring with better matches for everyone. - Stop Searching & Be Found!®Recruiters and companies use CyberTalent.ai to search for talent from practioner to leadership & oversight roles such as C-suite / board-level.
If it's at all related to cyber, we handle it here.
Great Question! Back in the day, cyber used to be more isolated. However with the growing interconnectivity of businesses and the technology they rely on, a lot more roles are related to cyber than first meets the eye. Here are some examples:
- Security Engineer - Mid level role that is responsible for designing and implementing security controls.
- Security Manager - Mid level role that is responsible for managing a team of security professionals.
- Forensic Analyst - Investigates security incidents and ensures that they are properly handled.
- Security Operations Center (SOC) Analyst - Monitors and responds to security alerts.
- Security Director - Senior level role that is responsible for managing a team of security managers.
- Data Scientist - Focuses on extracting insights from data using statistical analysis and machine learning.
- AI Research Scientist - Conducts advanced research to push the boundaries of AI technology.
- Security Architect - Senior level role that is responsible for designing and implementing security programs.
- Machine Learning Engineer - Responsible for building and maintaining machine learning models.
- Compliance Officer - Ensures that the organization is compliant with all relevant laws and regulations.
- Network Engineer/Architect - Develops/designs networks that are secure and follows best practices.
- Security Sales Engineer - Helps sell security products and services to customers.
- AI Consultant - Provides expert advice on implementing AI solutions in various industries.
- Incident Responder - Responds to security incidents and ensures that they are properly handled.
- Chief Information Security Officer (CISO / Chief Information Officer (CIO) / Chief Risk Office (CRO) - Executive level role that is responsible for the overall security program / technology / risk.
- AI Technical Lead - Leads technical teams in developing AI systems and applications.
- AI Solutions Architect - Designs and implements AI-driven solutions to meet business objectives.
- Natural Language Processing Engineer - Works on understanding and processing human languages using AI techniques.
- IT Operations Engineer/Manager/Director - Ensures that the IT infrastructure is operational, resilient and supported.
- Product Security Engineer/Manager/Director - Ensures that the products are secure and follows best practices.
- AI Project Manager - Manages AI-focused projects from conception to completion.
- AI Product Manager - Manages the development and deployment of AI products.
- Security Analyst - Entry level role that is responsible for monitoring and responding to security alerts.
- DevOps Engineer - Develops/deploys software & technologies for automation & environments.
- AI Data Engineer - Specializes in preparing and managing data pipelines for AI applications.
- Software Developer/Architect - Develops/designs software that is secure and follows best practices.
- AI Business Development Manager - Focuses on business growth by leveraging AI technologies.
- AI Prompt Engineer - Develops and optimizes prompts to feed into AI systems.
- AI Operations Engineer - Focuses on deploying and maintaining AI systems in production environments.
- AI Security & Compliance Lead - Ensures AI systems and interfacing is compliant and secure.
- Security Auditor - Ensures that the organization is following best practices and is secure.
- And many more! - If it touches technology, it's likely related to cyber.
As talent, you have three options to choose from. 1) Free (unverified) or 2) Paid (Verified). The Paid (Verified) fee is even reimbursed to you once you are hired on the platform.
Yes contact us after your first placement. We offer placement fee discounts depending on your purchase history and volume.
Talent that are serious about changing or upgrading their roles will join the site. They want the jobs to come to them instead of having to spend countless hours applying and networking to find opportunities.
As a recruiter you will have access to perform free searches. Based upon your criteria, our AI will generate the top 3 matches from those in the platform. You will get to see quantitative data and visualizations that show how well the best talent matches. If you are interested in getting more details, you purchase the search with a shortlist fee and then have access to details about the search results.
You may optionally send the top 3 talents either your own or our AI assisted questions based upon your criteria. They answer back and are scored by our AI. You can choose to manually adjust the scores if necessary.
Once you decide who you wish to pursue, you use the talk token credit included with the purchased search to message them to discuss more. This is the only time that any personal information about your organization is shared with the talent. A temporary invoice is generated once you start messaging and you have 60 days to decide if you will hire them or not. If not, then we cancel the invoice otherwise if you hire them and the payment is due.
As cyber security professionals that created this platform, we truly believe in security from the start. Our design and platform is built around security. While we make every effort to make the best decisions for security, we all know that it's not if but when an incident happens. That's why we planned around it from the start. Such as:
- We DO NOT pay ransomware - Why? Because it promotes an industry that encourages bad actors to continue to operate. If they didn't get paid, we wouldn't have a ransomware industry.
- We limit the Personal Identifiable Information (PII) We Collect - Our system is designed in such a way that in the event our data is compromised and decrypted, it would be pretty meaningless and inconsequential. Still worried? Simply use a non-identifiable email address for your site login.
- Encrypted Data - Our data is encrypted both in transit and at rest with industry standard process and techniques.
- What about your AI? - Our AI is a privately hosted model instance tuned for cyber talent acquistion and recruiting. It's not a public model that can be accessed by anyone. We limit the type of data that is processed through the model and what can be done. Based upon ratings/feedback of searches it automatically tunes itself to provide better results. We monitor the system for data poisioning.
Integration allows for several ways to automate your cyber recruitment searches. We do have a full API for integration at an additional cost. Please contact us for more information.
Simply click on "Contact Support" or the link in the site menu.