TheJobPost Limited

Recruitment Agency Management

Onboard and manage your recruitment agency suppliers compliantly through one contract and one single payment solution. Report on agency performance based on recruitment data and ongoing agency ratings. Improve fill rates and time-to-hire from your agency supply chain and streamline the recruitment process.


  • Agree terms and engage with recruitment suppliers
  • Real-time agency performance management & reporting
  • Agency communication management & tracking
  • Recruitment agency spend management
  • Distribute roles to the best recruitment agencies
  • Process agency invoices, queries and rebates via one platform
  • Benchmark fee and salary information from suppliers
  • Preferred supplier list management
  • Redirect recruitment agency queries and unsolicited calls


  • Easily setup and manage your preferred agencies and one-off agencies
  • Access real-time agency performance to improve time-to-hire and delivery
  • Gain insight into your agency spend and reduce costs
  • Generate market intelligence to benchmark the salary and recruitment fees
  • Build on-demand, agile supplier communities for skills, sectors and countries
  • Manage agency invoices, queries and rebates through one platform
  • Reduce unsolicited calls using your careers page or website
  • Reduce agency administration whilst remaining compliant
  • Increase fill rates and time-to-hire using our agency management platform


£1000 to £3000 per licence per month

  • Free trial available

Service documents


G-Cloud 11

Service ID

7 3 5 0 2 1 5 2 7 8 0 5 7 2 8


TheJobPost Limited

John Paul Caffery


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
We can integrate with applicant tracking systems to support the flow of candidates coming from agency recruiters
Cloud deployment model
Private cloud
Service constraints
No service constraints
System requirements
A modern standards compliant web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response within 1 business day.
Monday to Friday, 0900-1700hrs.
Bank holidays/public holidays excluded.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
All customers have access to our customer success team via email or phone and a dedicated account manager.
Support available to third parties

Onboarding and offboarding

Getting started
We have an onboarding and success team that will build a customised plan that works with your timeline. They will follow an established process to ensure you get the best success out of our platform.
Service documentation
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
On the basis that the contract has ended and you will no longer like to extend your contract, we will provide you with all information pertaining to your use of the platform and our services during the contract period.
End-of-contract process
We review the contract with an option to renew. In the case that the contract is not renewed, no cancellation fees apply.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
No difference
Service interface
What users can and can't do using the API
Our API can be used to connect with any applicant tracking system (ATS) the user currently uses to manage their candidates.

Once connected it can be used for the following:

Release a job vacancy to our recruitment agency management platform (RAMP)
Receive candidates submitted by recruitment agencies into your ATS
API documentation
API sandbox or test environment
Customisation available


Independence of resources
There are two ways in which we ensure all customer demands are met.

- Branches and staging sites for product updates. New product features and updates are created in an environment that is separate from the customer version of the product.

- Dedicated account and customer success teams


Service usage metrics
Metrics types
Analytics and reporting of recruitment supply chain performance.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
You may delete or request in writing the deletion or return of all personal data on termination of our Services or at any time following termination of our Services. Where you have not deleted the personal data prior to the termination of our Services, We automatically delete all personal data after six months following the date of termination of the our Services unless otherwise required by applicable law.
Data export formats
  • CSV
  • ODF
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We provide a minimum 99% availability 24 hours a day 7 days a week (measured over a calendar quarter), excluding scheduled maintenance (which occurs after 8pm and before 5am whenever possible).
Approach to resilience
Available on request
Outage reporting
Outages are reported to all users by email.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Our platform has role-based multi-level access with profiles that restrict access for unauthorised users.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PCI DSS accreditation date
Available upon request
What the PCI DSS doesn’t cover
Available upon request
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We have a documented framework for security governance with policies governing key aspects of security that are relevant to the service.

Reports to the board for any security and information risk and is a compulsory agenda during all board meetings.

Appropriate processes to comply with applicable legal and regulatory requirements are in place and documented
Information security policies and processes
We have robust information security policies and procedures in place to protect information from unauthorised access, alteration, disclosure or destruction and have several layers of security measures, including: password policy, access controls and encryption.

Employees are provided with details on information security during their induction and through ongoing training. They are made aware of potential threats and the importance of using appropriate tools to keep company and personal information safe.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes are set and monitored through our change management process documentation.
Vulnerability management type
Vulnerability management approach
Protective monitoring type
Protective monitoring approach
Incident management type
Supplier-defined controls
Incident management approach
We work according to our incident management policy whereby in the case of a security breach, we ensure we stick to a systematic process to collate, report, investigate and respond accordingly.

Users are able to report any incidents through our customer success team or their account manager who will then record the incident through our incident reporting templates.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£1000 to £3000 per licence per month
Discount for educational organisations
Free trial available
Description of free trial
We offer a trial version which is based on you opening up a transactional account. With this, you receive the full service offering equivalent to subscription account customer for an arranged period (typically 3 months).

Service documents

Return to top ↑