Search

Advanced Search

Shri Anoop Dhanak, Honourable Minister of State, Labour and Employment, Government of Haryana, launched Haryana Employment Exchange Web Portal on 07/01/2020

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Jan 31, 2020
Haryana Labour and  Employment Minister, Mr. Anoop Dhanak launching the web-portal of Employment Department
Haryana Labour and Employment Minister, Mr. Anoop Dhanak launching the web-portal of Employment Department

Snapshot of Employment Web Portal
Snapshot of Employment Web Portal

Haryana Labour and  Employment Minister, Mr. Anoop Dhanak launched the web-portal of Employment Department i.e 'https://hrex.gov.in' on 07/01/2020 under the Government to Citizen (G2C) campaign to facilitate the easy online registration of job aspirants. This portal is developed by NIC Haryana team.

 The software solution developed by NIC Haryana which enables:

1. Jobseekers to get registered with the employment exchange of his area of residence and having facilities to job seeker to file online request for renewal, transfer, qualification addition, experience addition, updation of correspondence address, participation in job fairs etc. This portal also enables job seekers to get short listed against the vacancies posted by the employers with the district exchanges according to their seniority.

2. Employers to get registered with district exchange for submission of current job openings & submission of ER-I form and participation in job fairs etc.

3. Employment exchanges verify and approve job seekers, employers, get job vacancies from employers, select job seekers against these vacancies, conduct pre-submission interview of short listed candidates and submit list of willing candidates to the employers. Employment exchange also organizes job fairs and helps in finalizing the selection of candidates at job fairs instantaneously.

4. Directorate to maintain masters, create and maintain users, maintain news, update job fair details, view state wide reports of job seekers, employers etc. It also keeps record of the employers who fail to submit mandatory ER-I forms at state level.

5. Reports of all kinds and nature are available at the portal for all roles and level. Advanced search facilities are available at Director and Exchange level.

The application is a Maven based SPA (Single Page Application) and is developed in Open Source using NPM (Node Package Manager), Gulp, Bower, HTML5 Boilerplate, Angular, i18n Support(bi-lingual support), Spring Boot, Spring Security, Spring Data JPA with Hibernate, Hikari CP for Connection Pooling, Liquibase for Database updates and PostgreSQL as Database with Oauth2 based authentication and authorization.

The Application is developed by the team of Sh. Bidyut Ranjan Gohain, Senior Technical Director, Sh. Prakash Kala, Scientist-B and Sh. Kuldeep, STA-B under the guidance of Sh. Deepak Bansal, State Informatics Officer, Haryana.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...