Process
How we recruit
1. Discover our current openings.
Review the job you are interested in.


2. Interested ?
Complete the 3 quick screening steps (~2 min): Personal information, CV, and Self-assessment.
3. Review your AI Matching analysis.
And send all required information.


We offer articles on "best practices" to help you maximize your chances of being hired.
Ensure your application stays top of mind.

Compliance
Protecting your data, our priority.
Data classification
Categorising data by sensitivity to apply appropriate protection levels.
Encryption & secure storage
Your data is protected on an ISO 27001-certified infrastructure, encrypted with AES-256 at rest and TLS 1.2 in transit.
Access control & authorization
Restricting access to personal data to authorized personnel only.
Data integrity & availability
Ensuring data remains accurate, unaltered and accessible, even after incidents.
Breach detection & incident response
Monitoring, detecting and responding promptly to any security incidents.
Data retention & deletion
Retaining data only as long as needed and securely deleting it when no longer required.
Recommandations






































