Skip to main content

猎头的分类


大家找工作的时候经常会和猎头打交道,知道猎头的分类或许会有些好处。

美国的猎头大体分为这么几类:

PEO (professional employer outsourcing)。 公司B把自己的人事部outsourcing给猎头
公司A。公司A出面招人,被录用的员工隶属于A公司,由A公司支付薪水和福利。然后A再
把员工”租借“给B公司,所以员工事实上是在给B公司干活。

contract staffing/personnel supply。和PEO类似。不同的是员工一般打短期工。可能
今天给B公司工作,明天给C公司工作。这行业比较有名的公司有kelly service, adecco,
manpower等。Monster里常有这些公司的名字。

Retained Search。公司B想招聘一个员工(一般是高层管理),他们把这项任务全权委托给
猎头A,并事先支付一笔费用,A无论找到员工与否,这笔报酬是先拿了得。

Contingency。公司B想招聘一个员工,猎头A得知这一消息主动上门说,我可以帮你找人
。我找的人如果你不满意的话,我不收你一分钱;如果你满意并想录用的话,那么你将支
付我一笔报酬。这种方式比较流行,因为对各方来说都是win win situation。有时B公司
会把自己的一个opening同时交给若干个contingency recruiters去做,希望尽快找到合
适人选。同样,contingency recruiter一般也会同时面试很多candidate。

猎头还有别的一些划分,不过换汤不换药,大体就这么几种了。所以以后有猎头打电话,
可以先问问他给哪家公司工作。再上网查查他属於哪种猎头(一般会是contingency
recruiter),这样以后打交道也比较有底。


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...