Feeds

FIVE DAY tech job interviews on trial at Oz telco Telstra

What are your weaknesses? Think hard: you've got all day to reply

High performance access to file storage

Australia's dominant telco, Telstra, has revealed that it's trying out job interviews that run for five days.

At the Agile Australia conference in Sydney yesterday, Telstra CIO Patrick Eltridge told his interlocutor in a Q&A session attended by IT News that the company has conducted six such interviews so far, resulting in three hires.

We've since asked Telstra just what went on and they've told us candidates - be they from outside or within the company - first went through the usual screening process. Those who made a shortlist then spent time "in an assessment centre where candidates were observed undertaking a number of tasks, and provided feedback on particular areas."

Telstra's spokesfolk also told us "This was not five days of working for Telstra" and that some of the interviewees "were internal Telstra candidates." We asked if external candidates were paid for their time, but haven't had an answer.

Eltridge said the long-form interview method was devised because Telstra needs to assess candidates in more detail than is possible during a conventional interview. Telstra is trying to transform itself from a sluggish and arrogant near-monopoly with a stranglehold on key parts of Australia's communications market into a nimbler and cuter creature capable of doing clever cloudy tricks. That apparently means the company's employees need to be creative, rather than just being technically competent.

The interviews have gone well enough that Telstra is now considering a similar format for roles beyond technology, although Eltridge said senior executive types are less likely to put up with five-day trials and may be offered three-day tests instead.

Nor will this style of interview be universal. Telstra told us that "While IT intends to use this assessment method again it is only for a small number of very senior roles, which require a specific skill set, such as ‘learning on the fly’. It is not intended to deploy this assessment method widely across Telstra." ®

High performance access to file storage

More from The Register

next story
From corporate bod to startup star: The 10-month gig that changed everything
What I learned as a techie in my time away from globo firms
Facebook snubbed Google's Silicon Valley wage-strangle pact, Sheryl Sandberg claims
Report details letter COO wrote to court addressing 'no-compete deal' lawsuit
Another day, another nasty Android vuln
Memory corruption mess can brick your mobe
Barclays warns freelance techies of DOUBLE DIGIT rate cut
'IT was a car crash before, so this isn't going to get any better' - sources
VMware announces compulsory bi-ennial VCP recertification
Downside: more time and money; Upside: VMware hints at two-yearly release cycle
Sysadmins and devs: Do these job descriptions make any sense?
Industry lobby group defines skills used in 25 common IT jobs
Who earns '$7k a month' but can't even legally drink? A tech intern!
Glassdoor reveals astonishing salaries of Silicon Valley undergrads
Your CIO is now a venture capitalist and you work at their startup
This just happened without you changing job, by the way
Turnover at the top in Oz telco-land as AAPT, Huawei, Optus, lose top brass
Move along, nothing to see here but orderly transitions
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.