RoleMapper Job Description and Job Architecture Management Platform
AI powered, job architecture and job description management platform, enabling organisations to easily standardise, create, view, store, manage and connect job data. Using AI/machine learning to streamline and automate workflow, RoleMapper reduces time to create, review, approve and evaluate jobs, supporting process efficiencies, transparency and pay equity.
Features
- AI powered data processing, rapidly digitise, standardise, cleanse job descriptions
- Built in customisable templates to ensure best practice and standardisation
- Centralised intelligent database, efficiently manage, standardise, and govern job descriptions
- Automated workflows streamlining review, approval and job evaluation processes
- Review group, collaboration and comprehensive audit trail functionality
- User friendly, side by side, job comparison functionality
- Access to curated, AI generated and crowd sourced job content
- Dashboards and governance features supporting visibility and dynamic job management
- Recruitment module enabling one-click connected, inclusive job advert creation
- Job architecture module automating, fast tracking transition to job families
Benefits
- Standardised job documents that are easy to create, compare, evaluate
- Process efficiencies around creation review, approval and evaluation of jobs
- Approved JD catalogue for hiring, performance management, workforce planning
- Easily create quality, inclusive job descriptions and connected job adverts
- Quickly access relevant, quality job content from multiple sources
- Users can collaborate on centralised documents, tracking all changes
- Fast track collection and sharing of essential job evaluation information
- Easily share jobs with stakeholders, fast tracking review and approval
- Side by side comparison to easily assess equal work/pay
- Improved transparency, reducing the risk of pay equity claims
Pricing
£5,000 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 4 2 9 1 7 3 5 0 7 3 4 3 1
Contact
ROLE MAPPER TECHNOLOGIES LTD
Ruth Evans
Telephone: 07904 984304
Email: ruth.evans@rolemapper.tech
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Delivered through a browser so requires public internet connection
- System requirements
- Current versions of Safari, Chrome or Edge
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday to Friday the response times vary depending on the severity of the issue required.
Level 1 within 2 hours
Level 2 within 4 hours
Level 3 next working day - User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- We have been tested by the BBC as part of customer onboarding
- Onsite support
- No
- Support levels
- Technical support is available during UK office hours via webchat or ticketing system. Each customer will be assigned an Account Manager within the customer team who will act as the first point of contact for users requests and issues and they will act as the facilitator for resolution. Standard support is provided at no additional cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Data loading
Configuration & Set up
Online Training - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All customer data can be exported and provided in CSV format
- End-of-contract process
-
Customer job data can be exported from the platform (via CSV file)
Any bespoke reports or data exports will be an additional cost
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Users can customise:
- templates
- workflows
- approval processes
Scaling
- Independence of resources
- We use auto scaling to ensure a level of performance is maintained across all customers
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Dashboard: Usage
Dashboard: Adoption (requires RoleRecruit)
Dashboard: Impact (requires RoleRecruit)
Dashboard: Document Inclusivity
Dashboard: Progress Reporting (requires RoleCreate) - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The user interface allows users to export into multiple formats
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Microsoft Word
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Microsoft Word
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- All our services are hosted on AWS infrastructure with an SLA of 99.9% uptime (excluding scheduled downtime). We have no regular maintenance on the system that requires downtime as all maintenance has been designed to run without interrupting operational users. Our maximum scheduled downtime is 15 minutes for releases that require major database schema changes. These releases are scheduled in the early hours (midnight to 1am GMT) or during the weekend.
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- SSO using SAML 2.0
- Access restrictions in management interfaces and support channels
- Management interfaces are only accessible to authenticated users who have been granted permission via the Role Based Access Control configuration of the platform. Support channels for online chat are only available to authenticated users.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow AWS guidance on security policy/access. The system is designed to hold minimum personal data/personally identifiable information beyond username/email address. Platform includes governance function which allows admin to ensure no data is held that breaches client data rules, the data rules applied can be customised by clients/geography. We run automated, weekly data-cleansing routines to anonymise any data that is no longer relevant. All databases and servers are encrypted, use SSL for all communication internal/external and are access-controlled via a private VPN network. Backups are encrypted and held within geographically distributed AWS VPN. Infrastructure administrative interfaces protected behind multi-factor authentication.
- Information security policies and processes
-
IT security is owned by the CTO who is responsible for annual review of policy and procedure documents. Policies include:
Information Security Policy
HR and Personnel Security Policy
Access Control Policy
Physical and Environmental Security Policy
ISMS Manual
Operational Security Policy
Encryption Policy
System Acquisition and Development Policy
Any breach of policy and procedure must be immediately reported to the CTO
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All configuration is managed as code in a secure version control repository.
Changes to configuration are submitted for electronic review and Impact analysis by a peer prior to them being deployed via CI/CD to the Dev, Test, then Production Environment - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
All RoleMapper physical assets are managed by 3rd party IT solution provider. This provider is responsible for the application of patches to our Laptop devices OS and applications.
RoleMapper platform code utilises a 3rd party vulnerability scanner Snyk.io to perform constant review of source code for the platform. Issues are immediately reported and prioritised for resolution.
Annual penetration tests are performed on the platform. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Cloudflare and Guard Duty plus AWS logs. We use AWS CloudWatch monitoring to provide a unified view of operational health, with alarms set to inform us real-time of performance issues and anomalous behaviour within our service both at the server and network level across the full stack. We augment this with a third-party application NewRelic, which adds a more comprehensive view of performance within the application as well as a more detailed trace for any errors logged.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
RoleMapper incident management process defines the actions to be taken in the event of an incident being reported. Users have several channels to report incidents, Online Chat from within the platform, Online service desk from within the platform and regular account meetings.
The RoleMapper account teams will provide incident reports and updates to affected customers.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
RoleMapper's inclusive job design foundation ensures that jobs are designed with inclusion in mind. It addresses biased language, inclusive readability, inclusive requirements and talent excluders that can deter diverse talent. It also provides clear visibility of work and skills which supports equal pay for equal work.
Pricing
- Price
- £5,000 a licence
- Discount for educational organisations
- No
- Free trial available
- No