InterimContractor.com
InterimContractor.com is a platform that provides free and direct access to the details of experts who offer independent consultancy services across a range of areas (IT and non IT). The fee-based service allows users to advertise their contract requirements directly to both registered and unregistered users.
Features
- Contact independent consultants directly online
- Advertise requirements directly to independent consultants online
- Free public access to view independent consultant profiles
- Free public access to view advertised requirements
- Remote account access from any device
- Remote access to view requirements from any device
- Free access for independent consultants to create profiles
- Secure login and account management
Benefits
- Instant access to view, contact and select specialist resource
- Advertise requirements online in just a few minutes
- Utilise the bespoke skills menu to pinpoint best fit consultants
- The platform sends your requirements to targeted consultants via email
Pricing
£0 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 4 9 7 6 9 7 8 7 0 4 0 6 7 4
Contact
SOLSUS Ltd
James Gooding
Telephone: 0845 5085215
Email: jwg@solsus.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- There are no service constraints connected with this service.
- System requirements
- Computer with internet browser capability (no specific requirement)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The only support service required and available is personal training in the use of the platform. This can be provided at a cost of £800 per day and delivered as group training if required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The website is simple in nature and extremely intuitive. If required, onsite training can be provided at a rate of £800 per session to groups of trainees.
- Service documentation
- No
- End-of-contract data extraction
- If required, users can submit an email request to have their account and all associated data extracted and/or deleted.
- End-of-contract process
- There are no additional costs or services at contract end. The charged service relates to role advertising and ads can be purchased as required either individually or in bulk. If a client wishes to terminate their account, the cost of any unused ads will not not be refunded.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile service only allows browsing to the second skill based menu level when searching profiles. The desktop version allows browsing to all three skill based menu levels. All other functionality is the same on both platforms.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Users navigate to an online interface to browse for service support and are required to create accounts to advertise opportunities.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- We have carried out in-house testing to test for general accessibility and the various accessibility adjustments available on the platform to modify user experience for various needs.
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The website has the capacity to support a high number of users due to the low impact of individual user activity on servers. The hosting arrangements for the website servers allow for rapid up-scaling of capacity if required.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users submit an email request to extract data or request upload of data relating to their account.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We guarantee 97% service availability. If users are using paid services, the service that have suffered from an availability issue will be extended by one day for each full day of downtime experienced.
- Approach to resilience
- We use third party data centre providers that guarantee 99.9% availability based on their extensive resilience provisions.
- Outage reporting
- Our third party provider provides us with a public dashboard that is available to customer, however we will notify customers immediately via email if we become aware of an outage issue.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The service is a web portal so user privileges are very low, with access only to basic user information and functionality within their own account. Nevertheless, access to user accounts is through a secure web page.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We are Cyber Essentials Basic certified.
Security governance within our small company is the responsibility of a single board Director who has final responsibility for oversight, authorising decision rights, enacting policy, accountability, strategic planning and resource allocation. Considerations in the development of these area are as follows;
It is an company-wide issue,
Directors are accountable,
It is viewed as a cost of doing business,
It is risk-based,
Roles, responsibilities and segregation of duties are defined,
Staff are aware and trained,
It is planned and measured,
It is reviewed and audited. - Information security policies and processes
-
We are Cyber Essential Basic certified.
Our company is small and so responsibility for security sits with a board director under the advice of an experienced technical developer. The Director sets policy under advice and instructs the team directly on direction. Feedback is directly to the Director. Security is a top priority for the service and is integral to all all design and development processes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration Management - a plan is developed to define, document, control, implement, account for, and audit changes to the various components of configuration project. The CM project plan is approved prior to commencement of any activity. This allows careful planning of any releases and changes to configuration items.
Change Management - change management system ensures that every change requirement is controlled, analysed and either approved or rejected based on platform benefit and impact. If it is approved, all other project constraints are also analysed for any possible impact.
For all processes there is a gateway approval requirement at Director level. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The development team includes a developer who has significant experience of scanning for vulnerabilities and designing vulnerability management processes. Scanning processes include ethical hacking tests that contribute to the refinement of 'designed in' vulnerability mitigation. The vulnerability management process itself consists of the following steps;
1 - Ongoing enhancement of the vulnerability management policy.
2 - Testing and discovery of existing vulnerabilities.
3 - Ranking of vulnerabilities by threat level/remediation actions required.
4 - Mitigation of the causes of vulnerabilities where authorised.
5 - Maintenance of security through ongoing testing and discovery. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We are Cyber Essential Basic certified..
We have a web application firewall in place. The database is encrypted and scanned regularly. We are also investigating options for continuous scanning. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have pre-defined processes for events that impact service availability or data corruption. In all cases Directors are informed immediately of any issues and registered users are informed of status and resolution time within 1 hour of any identified issue.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our head office location has installed a solar PV installation that significantly reduces grid sourced energy usage during working hours. In 2021 22% of our energy consumption was self generated green energy. - Covid-19 recovery
-
Covid-19 recovery
During the COVID period, we have allowed and enabled workers to work 100% from their home location, where that is their decision. Where on-site support is an option with clients (e.g. training), we have worked closely with clients to create as much flexibility to delivery services remotely. - Tackling economic inequality
-
Tackling economic inequality
Our salary structure ensures 100% equality of pay scales for equivalent positions. Where roles are the same, pay structure is identical. - Equal opportunity
-
Equal opportunity
Solsus is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees.
In order to support equality (particularly between male and female workers, workers with and without children and workers with and without care dependencies), we have implemented a fully flexible work arrangement with regard to days and hours. As long as commitments are covered with regard to fixed client interactions, our workers have full independence to choose the days and times within which they carry out their work. We believe this supports wellbeing as well as equality. It also supports those workers who's religious commitments influence their working hours preferences. - Wellbeing
-
Wellbeing
In order to support wellbeing, we have implemented a fully flexible work arrangement with regard to days and hours. As long as commitments are covered with regard to fixed client interactions, our workers have full independence to choose the days and times within which they carry out their work. We believe this supports wellbeing as well as equality.
Pricing
- Price
- £0 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free role ad placement on the website for new users until October 2020.
- Link to free trial
- https://web88.secure-secure.co.uk/interimcontractor.com/recruit/rec_hiw7.php