Adhunter Limited

Adzuna Talent and Hiring Software Solution

The online provision of recruitment support solutions along with associated labour market data or analysis which may be customised for buyers needs. Innovative technology to reduce recruitment admin and help fill open job roles and vacancies quicker.

Features

  • Website and Mobile Job Application process
  • Online Recruitment Selection process (Bespoke and anonymised)
  • Automatic Job Posting to websites/intranet/job boards
  • Candidate Database, Talent Pool and job alerts
  • Vacancy and Offer authorisation process (customisable)
  • Automated delivery of Shortlists of top candidates for job roles
  • Flexibility to customise offering, consulting from leading job search engine

Benefits

  • Access market-leading cloud and AI technology to fill jobs
  • Reduce the cost of recruitment though more effective advertising
  • Improve the time to hire and simplify hiring processes
  • Implement the latest recruitment tech like PPC, parsing, social media

Pricing

£500 to £10000 per unit

Service documents

G-Cloud 11

441846138631537

Adhunter Limited

Doug Monro

0207 3867355

gcloud@adzuna.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements Basic internet connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Default response times would be within one working day based on working hours of 9-6pm Mon-Fri. Extended support hours and quicker response times can be provided subject to contract.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide 2 core support levels at no additional cost. First level support is by a technical account manager. Second level is by a cloud support engineer.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide user documentation for the API online here: https://developer.adzuna.com/overview. We do not normally provide training for our existing website because it has specfically been designed to be used without any training. However, if we created a custom tool we would be able to provide online or onsite training for this - including site management and administration tools.
Service documentation No
End-of-contract data extraction At the end of the contract we are able to provide copies of any desired user data. This may include for example details of job adverts added or removed, or user activity logs.
End-of-contract process Any end-of contract data extraction and provision is included within the cost of the contract

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile version enables all of the same core functionality, but with a reduced set of features to keep the user interface manageable on a mobile device. We incorporate responsive web design into the service as standard. As well as mobile versions of the website we also have dedicated iOS and Android apps.
Service interface No
API Yes
What users can and can't do using the API Users can register online for the API service. Through the API they can implement a range of queries to return specific job adverts, vacancies or salary statistics. Not all website functionality is available through the API - for example it is not possible to modify email alerts through this method. Details are here: https://developer.adzuna.com/overview
API documentation Yes
API documentation formats HTML
API sandbox or test environment No
Customisation available Yes
Description of customisation Subject to requirements and commercial arrangements, we would be able to incorporate any level of required customisation.

Scaling

Scaling
Independence of resources We have dedicated DevOps resource who monitor the demand and load on our cloud software. Load balancing across multiple sites is used for primary demand-management, and as needed additional cloud servers can be activated to manage demand increases.

Analytics

Analytics
Service usage metrics Yes
Metrics types Users of the API are able to visualise query frequency at the account level through an online interactive real-time dashboard, incorporating Google Analytics into reporting.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach In our service users do not typically have user-level data to export. At a super-user or administration level, data exports can be requested through the standard email support channels.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Our historic site availability has been >99.9% over the last year. We would be able to agree an SLA levels for any new contract.
Approach to resilience Available on request.
Outage reporting Currently we use internal email alerts and a dashboard to monitor any outages. A bespoke reporting method could be incorporated as required.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Management interface platform requires username and password set up by administrators (not shared between users)
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 British Assessment Bureau
ISO/IEC 27001 accreditation date 07/12/2018
What the ISO/IEC 27001 doesn’t cover The certification covers the provision, operation and administration of the Job Search Engine, Website Management, Short Listing and Data File product services provided to users and clients by Adzuna. The scope also includes all internal corporate services at the head office location.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Certification

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We are currently working towards ISO 27001 certification and hope to be accredited in 2018. However, as a small enterprise we have an approach with the following goals: - Security activities are prioritised according to business criticality - Only a small number of specific individuals are responsible for making and acting on security decisions and each person is accountable for their actions - Our goal is to review completed security incidents as soon as possible in order to learn lessons and feedback into future decisions.
Information security policies and processes We follow standardised internal security processes which are in line with best industry practice. Further details are available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes to service components are tracked using dedicated issue-tracking software (JIRA). This enables scheduling of forthcoming work as well as a permanent historical record of past changes. Information security threats are assessed on a case-by-case basis through review by our senior developers.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Patches for continuous vulnerability management are deployed at the operating system level within 30 days of release and at the application level within 60 days of release.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Potential compromises are identified by monitoring server load through a permanent live dashboard and by analysing web logs through tools such as AWS Cloudtrail, Cloudwatch & Syslog. Our response approach and speed is decided on a case-by-case basis according to the severity of the compromise. An audit log of business events and activities of all user categories is retained for the system for a period of 12 months. An audit log of technical events (e.g. syslog events, CloudWatch & CloudTrail) is also retained for the system.
Incident management type Supplier-defined controls
Incident management approach All security incidents are addressed on a case-by-case basis as they are low frequency and without commonality.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £500 to £10000 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑