Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Recipient Details: Full name, title, and address of the hiring manager or relevant decision-maker
2. Reference Line: Clear reference to the previous job application and rejection notice
3. Opening Paragraph: Professional greeting and acknowledgment of the rejection while expressing continued interest
4. Value Proposition: Restatement of key qualifications and unique value you would bring to the role
5. Addressing Concerns: Professional response to any specific concerns or reasons given for the initial rejection
6. Call to Action: Request for reconsideration and suggestion for next steps or further discussion
7. Closing: Professional sign-off with contact information
1. New Information: Include when there are new qualifications, certifications, or achievements since the initial application
2. Market Insights: Include when you have new relevant information about industry trends or company challenges you could help address
3. Flexibility Statement: Include when you're willing to discuss alternative positions or modified terms
4. References: Include when you have new, highly relevant references who can speak to your capabilities
5. Project Examples: Include when you have specific examples of relevant work completed since the initial application
1. Updated Resume: Attach if there have been any updates or changes to your qualifications or experience
2. New Certificates: Copies of any new relevant certifications or qualifications obtained
3. Reference Letters: Any new letters of recommendation that strengthen your application
Find the document you need
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
