Adhunter Limited

Adzuna Talent and Hiring Software Solution

The online provision of recruitment support solutions along with associated labour market data or analysis which may be customised for buyers needs. Innovative technology to reduce recruitment admin and help fill open job roles and vacancies quicker.

Features

  • Website and Mobile Job Application process
  • Online Recruitment Selection process (Bespoke and anonymised)
  • Automatic Job Posting to websites/intranet/job boards
  • Candidate Database, Talent Pool and job alerts
  • Vacancy and Offer authorisation process (customisable)
  • Automated delivery of Shortlists of top candidates for job roles
  • Flexibility to customise offering, consulting from leading job search engine

Benefits

  • Access market-leading cloud and AI technology to fill jobs
  • Reduce the cost of recruitment though more effective advertising
  • Improve the time to hire and simplify hiring processes
  • Implement the latest recruitment tech like PPC, parsing, social media

Pricing

£500 to £10000 per unit

Service documents

Framework

G-Cloud 11

Service ID

4 4 1 8 4 6 1 3 8 6 3 1 5 3 7

Contact

Adhunter Limited

Doug Monro

0207 3867355

gcloud@adzuna.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
None
System requirements
Basic internet connectivity

User support

Email or online ticketing support
Email or online ticketing
Support response times
Default response times would be within one working day based on working hours of 9-6pm Mon-Fri. Extended support hours and quicker response times can be provided subject to contract.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We provide 2 core support levels at no additional cost. First level support is by a technical account manager. Second level is by a cloud support engineer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide user documentation for the API online here: https://developer.adzuna.com/overview. We do not normally provide training for our existing website because it has specfically been designed to be used without any training. However, if we created a custom tool we would be able to provide online or onsite training for this - including site management and administration tools.
Service documentation
No
End-of-contract data extraction
At the end of the contract we are able to provide copies of any desired user data. This may include for example details of job adverts added or removed, or user activity logs.
End-of-contract process
Any end-of contract data extraction and provision is included within the cost of the contract

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile version enables all of the same core functionality, but with a reduced set of features to keep the user interface manageable on a mobile device. We incorporate responsive web design into the service as standard. As well as mobile versions of the website we also have dedicated iOS and Android apps.
Service interface
No
API
Yes
What users can and can't do using the API
Users can register online for the API service. Through the API they can implement a range of queries to return specific job adverts, vacancies or salary statistics. Not all website functionality is available through the API - for example it is not possible to modify email alerts through this method. Details are here: https://developer.adzuna.com/overview
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Subject to requirements and commercial arrangements, we would be able to incorporate any level of required customisation.

Scaling

Independence of resources
We have dedicated DevOps resource who monitor the demand and load on our cloud software. Load balancing across multiple sites is used for primary demand-management, and as needed additional cloud servers can be activated to manage demand increases.

Analytics

Service usage metrics
Yes
Metrics types
Users of the API are able to visualise query frequency at the account level through an online interactive real-time dashboard, incorporating Google Analytics into reporting.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
In our service users do not typically have user-level data to export. At a super-user or administration level, data exports can be requested through the standard email support channels.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our historic site availability has been >99.9% over the last year. We would be able to agree an SLA levels for any new contract.
Approach to resilience
Available on request.
Outage reporting
Currently we use internal email alerts and a dashboard to monitor any outages. A bespoke reporting method could be incorporated as required.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Management interface platform requires username and password set up by administrators (not shared between users)
Access restriction testing frequency
Less than once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
07/12/2018
What the ISO/IEC 27001 doesn’t cover
The certification covers the provision, operation and administration of the Job Search Engine, Website Management, Short Listing and Data File product services provided to users and clients by Adzuna. The scope also includes all internal corporate services at the head office location.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Certification

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We are currently working towards ISO 27001 certification and hope to be accredited in 2018. However, as a small enterprise we have an approach with the following goals: - Security activities are prioritised according to business criticality - Only a small number of specific individuals are responsible for making and acting on security decisions and each person is accountable for their actions - Our goal is to review completed security incidents as soon as possible in order to learn lessons and feedback into future decisions.
Information security policies and processes
We follow standardised internal security processes which are in line with best industry practice. Further details are available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to service components are tracked using dedicated issue-tracking software (JIRA). This enables scheduling of forthcoming work as well as a permanent historical record of past changes. Information security threats are assessed on a case-by-case basis through review by our senior developers.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Patches for continuous vulnerability management are deployed at the operating system level within 30 days of release and at the application level within 60 days of release.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Potential compromises are identified by monitoring server load through a permanent live dashboard and by analysing web logs through tools such as AWS Cloudtrail, Cloudwatch & Syslog. Our response approach and speed is decided on a case-by-case basis according to the severity of the compromise. An audit log of business events and activities of all user categories is retained for the system for a period of 12 months. An audit log of technical events (e.g. syslog events, CloudWatch & CloudTrail) is also retained for the system.
Incident management type
Supplier-defined controls
Incident management approach
All security incidents are addressed on a case-by-case basis as they are low frequency and without commonality.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£500 to £10000 per unit
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑