Career Hackers Talent Solution - Security Portal
Welcome to Career Hackers's Security Portal. Our commitment to data privacy and security is embedded in every part of our business. Use this portal to learn about our security measures. For any security related questions that haven't been addressed on this page, please email us at info@careerhackers.io.
Infrastructure Security
| Control | Status |
|---|---|
| Robust Identity and Access Management Framework To protect sensitive applicant information and employer assessment data, we implement a robust Identity and Access Management (IAM) framework. This includes strong authentication for all production systems, role-based access controls, and regular audits of permissions, preventing unauthorized data access for all parties. | ![]() |
| Encryption Key Management and Access Restriction Access to encryption keys, which protect applicant and employer data, is strictly managed and limited to a minimum number of authorized personnel with a legitimate business need, ensuring data confidentiality and integrity for all parties. | ![]() |
| Unique Account Authentication and Lifecycle Management We enforce unique account authentication, using methods like unique usernames/passwords and cryptographic keys, for all systems and applications, coupled with secure account lifecycle management. This safeguards both applicant assessment data and employer accounts from unauthorized access throughout their usage. | ![]() |
| Production Application Access Restricted by Role Access to our live assessment platform is strictly limited to authorized personnel based on their defined roles, ensuring the integrity of the assessment environment for applicants and protecting employer data. | ![]() |
| Production Database Access Minimized and Monitored Privileged access to databases containing applicant results and employer information is minimized based on the principle of least privilege and restricted to authorized users with a specific, audited business need, further securing this critical data. | ![]() |
| Layered Network Traffic Control (Firewalls & ACLs) We deploy and configure multi-layered network firewalls and access control lists (ACLs) at instance and subnet levels to control inbound and outbound traffic, restricting access to necessary ports and protocols, forming a critical defense layer for applicant and employer data. | ![]() |
| Network Segmentation and Isolation Our network is segmented to isolate critical systems and data, such as applicant assessment data and employer accounts, thereby limiting the potential impact of any security incidents and protecting sensitive information flows. | ![]() |
| Distributed Denial-of-Service (DDoS) Mitigation We employ robust Distributed Denial-of-Service (DDoS) protection services and web application firewalls to safeguard our platform against various types of DDoS attacks and malicious traffic, ensuring high availability for applicants and employers. | ![]() |
| Firewall Access and Rule Management To protect our network perimeter and the data of both applicants and employers, privileged access to firewall configurations is limited to authorized security personnel. Firewall rulesets are reviewed regularly to ensure they effectively protect our network, with required changes tracked to completion. | ![]() |
| Hardened Production Operating System Access Access to the operating systems of our production servers is highly restricted and hardened according to industry best practices, ensuring the stability and security of the platform relied upon by applicants and employers. | ![]() |
| Secure Production Network Access Control We limit privileged access to our production network and enforce strong authentication for network components, protecting internal communications and the flow of applicant and employer data from unauthorized interception or interference. | ![]() |
| Remote Access Security (MFA & Encryption) To prevent unauthorized remote access to systems processing applicant and employer data, multi-factor authentication (MFA) is mandatory for all authorized employees, and all access is enforced over approved, encrypted connections. | ![]() |
| Intrusion Detection and Prevention Systems We utilize advanced intrusion detection and prevention systems for continuous network monitoring, enabling early detection and blocking of potential security breaches to protect the platform and the data of both applicants and employers. | ![]() |
| Centralized Log Management and Security Monitoring A centralized log management and security information and event management (SIEM) system is used to identify, analyze, and alert on security events. This supports audits, incident response, and proactive threat hunting to maintain a secure environment for applicant assessments and employer data. | ![]() |
| System Hardening and Secure Configuration Standards We maintain and annually review comprehensive system hardening and secure configuration standards based on industry best practices. Our infrastructure undergoes regular patching and maintenance to address vulnerabilities, ensuring servers supporting applicant assessments and employer portals are resilient against security threats. | ![]() |
| Infrastructure performance monitored We continuously monitor our infrastructure performance to ensure high availability and reliability of our assessment platform for applicants and employers, generating alerts for proactive issue resolution. | ![]() |
| Network segmentation implemented Our network is segmented to isolate critical systems and data, such as applicant assessment data and employer accounts, thereby limiting the potential impact of any security incidents. | ![]() |
| Network firewalls reviewed Firewall rulesets are reviewed at least annually to ensure they effectively protect our network and the applicant and employer data it carries, with required changes tracked to completion. | ![]() |
| Network firewalls utilized We deploy and configure network firewalls to prevent unauthorized access to our systems, forming a critical defense layer for applicant and employer data. | ![]() |
| Network and system hardening standards maintained We maintain and annually review network and system hardening standards based on industry best practices, reducing vulnerabilities and enhancing the security of applicant data and employer services. | ![]() |
| Service infrastructure maintained Our service infrastructure undergoes regular patching and maintenance to address vulnerabilities, ensuring servers supporting applicant assessments and employer portals are hardened against security threats. | ![]() |
