Data Security

RangeForce Talent Assesses Cybersecurity Candidates' Capabilities Accurately

RangeForce
RangeForce, a cybersecurity hiring solution that uses real-world hands-on exercises to help security leaders validate and assess candidates' actual abilities, announced RangeForce Talent. This cybersecurity hiring solution uses real-world, hands-on activities to help security leaders validate and evaluate candidates' actual skills.

A recent survey says security leaders are still having trouble finding experienced personnel, with 73 percent seeing it as a source of concern. Time-to-hire is another critical consideration. After 12 weeks, 35% of respondents said positions were still empty.
Meanwhile, cybersecurity recruiting managers must make educated estimates about whether individuals will be a good fit for their team based on resumes and credentials, making it impossible to confirm their true abilities. RangeForce Talent enables security leaders and HR professionals to adopt hiring techniques that can cut through preconceptions and biases and find neglected individuals for sourcing top cyber talent.

“RangeForce Talent empowers security leaders to demystify the talent search and evaluation so they can hire with increased speed, precision, and confidence, With hands-on assessments and interactive environments that reflect the real world, RangeForce Talent equips hiring managers with rich, skill-based insights. It also enables organizations to identify promising internal prospects for cybersecurity positions.”

Jeff Orloff, Vice President of Product at RangeForce


RangeForce Talent allows organizations to assess job applicants' skills against critical frameworks such as NIST/NICE and MITRE ATT&CK with realistic challenges that cover a variety of threats using leading security tools in emulated environments that mirror existing IT infrastructure using an extensive library of content.

How does it work?
RangeForce Talent gives the data-driven insights needed to expedite hiring decisions while avoiding time-consuming and ineffective second-stage interviews. Hiring managers can use automated tests to evaluate candidates at scale and find qualified prospects before scheduling interviews. In addition, hiring managers can utilize the platform to construct evaluations tailored to each position and provide reports that summarise vital performance data as attempts, suggestions or solutions used, and time to finish.

Spotlight

Spotlight

Related News

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More