Adzuna Job Search, Job Board and Labour Market Data Solution
The online provision of job search engine / job board solutions along with associated labour market data which may be customised for buyers' needs. Features include faceted job search, employer posting, integration with ATS systems, support and fraud monitoring, statistics on local and sector trends, email alerts and an API
- Fast multi-faceted search results for jobseekers on mobile and desktop
- Jobseeker tools to login, apply, manage account, email alerts
- Employer tools to login, post/optimise jobs and manage applications
- Real-time/historic data on vacancies and salaries, locally and nationally
- Machine Learning/AI tools to predict career progression
- Advanced segmentation, matching and filtering, deduplication technology
- Service support including helpdesk and advanced fraud management tools/processes
- Flexibility to customise offering, consulting from leading job search engine
- Scalable, high-uptime, secure, cloud-based service, DPA/GDPR compliant
- Multi-language capability (including Welsh), ATS and Eures integration
- Help jobseekers quickly find highly relevant jobs
- Help employers post appropriate jobs to quickly attract relevant talent
- Specify complex search queries and access market information
- Allows client to access market-leading cloud/AI technology
- Simpler, more advanced support and fraud management
- Extensive capabilities in data cleaning, deduplication and AI/ML tools
- Proven capability managing millions of jobs and jobseekers
- Experience handling APIs, feeds, bulk uploads and CV interfaces
- Flexible, nimble, responsive and cost-effective local supplier
- Real-time insight into comprehensive data on the UK employment market
£0 per unit
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|System requirements||Basic internet connectivity|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Default response times would be within one working day based on working hours of 9-6pm Mon-Fri.
Extended support hours and quicker response times can be provided subject to contract.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
We provide 2 core support levels at no additional cost.
First level support is by a technical account manager. Second level is by a cloud support engineer.
|Support available to third parties||Yes|
Onboarding and offboarding
We provide user documentation for the public Adzuna API online here: https://developer.adzuna.com/overview
We do not normally provide training for our existing website because it has specficially been designed to be used without any training, however we are able to provide onsite or online training if required. This would include site management and administration tools.
|End-of-contract data extraction||At the end of the contract we are able to provide copies of any desired user data. This may include for example details of job adverts added or removed, or user activity logs.|
|End-of-contract process||Any end-of contract data extraction and provision is included within the cost of the contract.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The mobile version enables all of the same core search functionality across all countries, but with a reduced set of features to keep the user interface manageable on a mobile device. We incorporate responsive web design into the service as standard.
As well as mobile versions of the website we also have dedicated iOS and Android apps.
|Accessibility standards||WCAG 2.1 AA or EN 301 549|
Adzuna has worked with an Accessibility partner to achieve level AA of the Web Content Accessibility Guidelines (WCAG 2.0) and meet recognised GDS accessibility standards. This ensures products delivered are easy to use, intuitive and enjoyable for users with accessibility needs and will work on the most commonly used assistive technologies - including screen magnifiers, screen readers and speech recognition tools,
Testing focused on compliance with the Web Content Accessibility Guidelines (WCAG) 2.0 to Level AA standard.
Preparation and execution of WCAG-based test scripts.
WCAG testing checks that the product has been built inline with the recommended standards and guidelines.
Assistive technology testing focusing on key user journeys through the product - execution of user journeys on the targeted assistive tools (Jaws, NVDA, ZoomText, Dragon Naturally Speaking, VoiceOver (Mac OS), VoiceOver (iOS)).
Pass/Fail results for each test area
Final Report Compliance test Summary Report.
|What users can and can't do using the API||
Users can register online for the API service.
Through the API they can implement a range of queries to return specific job adverts, vacancies or salary statistics.
Not all website functionality is available through the API - for example it is not possible to modify email alerts through this method.
Details are here: https://developer.adzuna.com/overview
We can also offer custom APIs for specific solutions on request
|API documentation formats||HTML|
|API sandbox or test environment||No|
|Description of customisation||Subject to requirements and commercial arrangements, we would be able to incorporate any level of required customisation. For example, this could result in an entirely new job search cloud service hosted on a different domain, with a custom set of job adverts and custom functionality for tracking user behaviour or providing site statistics and business intelligence.|
|Independence of resources||Users of the API are able to visualise query frequency at the account level through an online interactive real-time dashboard, incorporating Google Analytics into reporting.|
|Service usage metrics||Yes|
|Metrics types||Users of the API are able to visualise query frequency at the account level through an online interactive real-time dashboard, incorporating Google Analytics into reporting.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
In our service users do not typically have user-level data to export.
At a super-user or administration level, data exports can be requested through the standard email support channels.
|Data export formats||
|Data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
Our historic site availability has been >99.9% over the last year.
We would be able to agree an SLA and credit or refund arrangements for any new contract.
|Approach to resilience||Available on request.|
|Outage reporting||Pingdom is used to monitor service downtime and is configured to alert specific user groups in the event of an incident via Slack, email and SMS. Prometheus is used to send alerts to the service management team when it encounters certain metrics in an unexpected or hazardous state, for example, the disk filling up on a particular EC2 instance.|
Identity and authentication
|User authentication needed||No|
|Access restrictions in management interfaces and support channels||Management interface platform requires username and password set up by administrators (not shared between users).|
|Access restriction testing frequency||Less than once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||British Assessment Bureau|
|ISO/IEC 27001 accreditation date||07/12/2018|
|What the ISO/IEC 27001 doesn’t cover||Provided on request|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||We follow standardised internal security processes which are in line with best industry practice. Further details are available on request.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Changes to service components are tracked using dedicated issue-tracking software (JIRA). This enables scheduling of forthcoming work as well as a permanent historical record of past changes.
Information security threats are assessed on a case-by-case basis through review by our senior developers.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Patches for continuous vulnerability management are deployed at the operating system level within 30 days of release and at the application level within 60 days of release.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Potential compromises are identified by monitoring server load through a permanent live dashboard and by analysing web logs through tools such as AWS Cloudtrail, Cloudwatch & Syslog. Our response approach and speed is decided on a case-by-case basis according to the severity of the compromise. An audit log of business events and activities of all user categories is retained for the system for a period of 12 months. An audit log of technical events (e.g. syslog events, CloudWatch & CloudTrail) is also retained for the system.|
|Incident management type||Supplier-defined controls|
|Incident management approach||All security incidents are addressed on a case-by-case basis as they are low frequency and without commonality.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£0 per unit|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Our existing website can be freely used for an indefinite period. It includes full functionality. Alternatively the Find a Job website which is powered by Adzuna can also be used as an example of a live service.|
|Link to free trial||Www.adzuna.co.uk or findajob.dwp.gov.uk|