Skip to main content

Help us improve the Digital Marketplace - send your feedback

ROLE MAPPER TECHNOLOGIES LTD

RoleMapper Job Description and Job Architecture Management Platform

AI powered, job architecture and job description management platform, enabling organisations to easily standardise, create, view, store, manage and connect job data. Using AI/machine learning to streamline and automate workflow, RoleMapper reduces time to create, review, approve and evaluate jobs, supporting process efficiencies, transparency and pay equity.

Features

  • AI powered data processing, rapidly digitise, standardise, cleanse job descriptions
  • Built in customisable templates to ensure best practice and standardisation
  • Centralised intelligent database, efficiently manage, standardise, and govern job descriptions
  • Automated workflows streamlining review, approval and job evaluation processes
  • Review group, collaboration and comprehensive audit trail functionality
  • User friendly, side by side, job comparison functionality
  • Access to curated, AI generated and crowd sourced job content
  • Dashboards and governance features supporting visibility and dynamic job management
  • Recruitment module enabling one-click connected, inclusive job advert creation
  • Job architecture module automating, fast tracking transition to job families

Benefits

  • Standardised job documents that are easy to create, compare, evaluate
  • Process efficiencies around creation review, approval and evaluation of jobs
  • Approved JD catalogue for hiring, performance management, workforce planning
  • Easily create quality, inclusive job descriptions and connected job adverts
  • Quickly access relevant, quality job content from multiple sources
  • Users can collaborate on centralised documents, tracking all changes
  • Fast track collection and sharing of essential job evaluation information
  • Easily share jobs with stakeholders, fast tracking review and approval
  • Side by side comparison to easily assess equal work/pay
  • Improved transparency, reducing the risk of pay equity claims

Pricing

£5,000 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ruth.evans@rolemapper.tech. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 4 2 9 1 7 3 5 0 7 3 4 3 1

Contact

ROLE MAPPER TECHNOLOGIES LTD Ruth Evans
Telephone: 07904 984304
Email: ruth.evans@rolemapper.tech

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Delivered through a browser so requires public internet connection
System requirements
Current versions of Safari, Chrome or Edge

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday the response times vary depending on the severity of the issue required.
Level 1 within 2 hours
Level 2 within 4 hours
Level 3 next working day
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
We have been tested by the BBC as part of customer onboarding
Onsite support
No
Support levels
Technical support is available during UK office hours via webchat or ticketing system. Each customer will be assigned an Account Manager within the customer team who will act as the first point of contact for users requests and issues and they will act as the facilitator for resolution. Standard support is provided at no additional cost.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Data loading
Configuration & Set up
Online Training
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All customer data can be exported and provided in CSV format
End-of-contract process
Customer job data can be exported from the platform (via CSV file)
Any bespoke reports or data exports will be an additional cost

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
Yes
Description of customisation
Users can customise:
- templates
- workflows
- approval processes

Scaling

Independence of resources
We use auto scaling to ensure a level of performance is maintained across all customers

Analytics

Service usage metrics
Yes
Metrics types
Dashboard: Usage
Dashboard: Adoption (requires RoleRecruit)
Dashboard: Impact (requires RoleRecruit)
Dashboard: Document Inclusivity
Dashboard: Progress Reporting (requires RoleCreate)
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The user interface allows users to export into multiple formats
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Microsoft Word
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF
  • Microsoft Word

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
All our services are hosted on AWS infrastructure with an SLA of 99.9% uptime (excluding scheduled downtime). We have no regular maintenance on the system that requires downtime as all maintenance has been designed to run without interrupting operational users. Our maximum scheduled downtime is 15 minutes for releases that require major database schema changes. These releases are scheduled in the early hours (midnight to 1am GMT) or during the weekend.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
SSO using SAML 2.0
Access restrictions in management interfaces and support channels
Management interfaces are only accessible to authenticated users who have been granted permission via the Role Based Access Control configuration of the platform. Support channels for online chat are only available to authenticated users.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow AWS guidance on security policy/access. The system is designed to hold minimum personal data/personally identifiable information beyond username/email address.  Platform includes governance function which allows admin to ensure no data is held that breaches client data rules, the data rules applied can be customised by clients/geography. We run automated, weekly data-cleansing routines to anonymise any data that is no longer relevant. All databases and servers are encrypted, use SSL for all  communication internal/external and are access-controlled via a private VPN network. Backups are encrypted and held within geographically distributed AWS VPN. Infrastructure administrative interfaces protected behind multi-factor authentication.
Information security policies and processes
IT security is owned by the CTO who is responsible for annual review of policy and procedure documents. Policies include:
Information Security Policy
HR and Personnel Security Policy
Access Control Policy
Physical and Environmental Security Policy
ISMS Manual
Operational Security Policy
Encryption Policy
System Acquisition and Development Policy
Any breach of policy and procedure must be immediately reported to the CTO

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All configuration is managed as code in a secure version control repository.
Changes to configuration are submitted for electronic review and Impact analysis by a peer prior to them being deployed via CI/CD to the Dev, Test, then Production Environment
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All RoleMapper physical assets are managed by 3rd party IT solution provider. This provider is responsible for the application of patches to our Laptop devices OS and applications.
RoleMapper platform code utilises a 3rd party vulnerability scanner Snyk.io to perform constant review of source code for the platform. Issues are immediately reported and prioritised for resolution.
Annual penetration tests are performed on the platform.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Cloudflare and Guard Duty plus AWS logs. We use AWS CloudWatch monitoring to provide a unified view of operational health, with alarms set to inform us real-time of performance issues and anomalous behaviour within our service both at the server and network level across the full stack. We augment this with a third-party application NewRelic, which adds a more comprehensive view of performance within the application as well as a more detailed trace for any errors logged.
Incident management type
Supplier-defined controls
Incident management approach
RoleMapper incident management process defines the actions to be taken in the event of an incident being reported. Users have several channels to report incidents, Online Chat from within the platform, Online service desk from within the platform and regular account meetings.
The RoleMapper account teams will provide incident reports and updates to affected customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

RoleMapper's inclusive job design foundation ensures that jobs are designed with inclusion in mind. It addresses biased language, inclusive readability, inclusive requirements and talent excluders that can deter diverse talent. It also provides clear visibility of work and skills which supports equal pay for equal work.

Pricing

Price
£5,000 a licence
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ruth.evans@rolemapper.tech. Tell them what format you need. It will help if you say what assistive technology you use.