More and more employers refuse to read job seekers’ resumes without a cover letter. The fact is that HR managers want to deal with motivated candidates. The presence of a cover letter is a kind of confirmation that the applicant for the vacancy is serious about his employment, and it is really important for him to impress and to stand out from other competitors.
As you know, a cover letter should contain:
- the main part,
But how to apply in an email to a recruiter or someone else whose name you do not know? We will talk about this in our article, but first, let’s figure out the advantages of a cover letter and how to write it correctly.
How to Write a Perfect Cover Letter?
So, let’s decide what exactly should be there.
- The first is the self-presentation of the candidate, his story about himself and his experience.
- The second – the reasons why the company should pay attention to it. How can it be useful to the company? This must be written in the cover letter, otherwise, it will be just an autobiography of personal achievements, multiplied by two.
- Third, why a candidate should work for a particular company. This is an important point since such information facilitates the recruitment process and gives the applicant an understanding of how it can be implemented within the company.
Usually, the cover letter has a strict structure and contains:
- Greetings (“Dear [title]”, “[Name], good afternoon,” “Dear [name]”).
The greeting should be either personalized or addressed to the specialists of a particular department if the name of the recipient is not known.
- The main part.
2.1. Tell what position you are applying for if you send your resume to your employer by email.
2.2. Explain what attracted you: an interesting product, new features or complex tasks.
2.3. Smoothly move from motivation to experience and a list of projects that are not described in the resume, but are useful for this vacancy.
- Farewell (“Best regards”, “Regards”) and duplicate contact details.
It is important to remember that all points, except 2.3, are accumulated cliches created by successful candidates for many years of practice. The cover letters of this format are half the success. Forbes gives a lot of brilliant professional tips on writing a cover letter.
5 Reasons Why a Cover Letter Is Very Important
- It serves as additional information.
Often there are so many candidates that the information from the resume is forgotten within a minute after reading it. A cover letter is the very piece of information that can, like a bright marker, highlight a candidate among the rest.
- It helps to screen out those who are not suitable.
Sometimes selected candidates correspond to skills positions, but do not fit soft skills at all. This, may be noticeable at the first interview/internship, but why do we waste valuable time? A cover letter is a litmus test of unsuitable EQ candidates.
- It helps to hire those who are not suitable at first glance.
It happens the other way around – the candidate does not quite match the skills in CV, but according to the emotional motivation letter, it becomes immediately clear that he is exactly who the company needs.
- It shows creativity.
It is interesting and concise to write about yourself – it is more difficult than it seems. The candidate who spent his time and tried to do it creatively deserves the attention of an HR manager.
- It proves that the candidate really wants to work in the company.
Job seekers often send a standard resume to many companies and wait for a response. This is often noticeable because they do not always indicate the correct position declared in the vacancy. A cover letter is a clear sign that the candidate has consciously chosen the company.
Hello HR Manager: Useful Phrases to Address the Recruiter in Email
Of course, an ideal appeal to the addressee is an appeal by name. You will probably have information about the name of the recruiter or manager who posted this vacancy by sending him a resume. Therefore, the beginning should look like this: “Good afternoon, James!” Or “Hello, Mr. Brooks!”
- Mr. LastName – appeal to a man;
- Mrs. LastName – appeal to a married woman;
- Ms. LastName – appeal to a woman regardless of her marital status.
But if you don’t know the manager’s name, it is quite normal to contact him for his position; for example: “Dear hr-manager/recruiter of the company “… .” Also, emails that start with the simple “Hello!” are read easily and without resentment, with no specific calls to anyone at all. Dear Mr. / Mrs. / Ms. LastName – if you know the person you are writing to;
- Dear Sir or Madam – if you don’t know at all who will read your email;
- Dear Sir / Madam – if you do not know the name of the person you are writing to.
But if you use your search skills and spend a little time most probably you can find out the name of the person to whom you will contact. Here is a short helpful guide:
- Visit the company website. Very often, in the section about employees, you can find the recruiter you are looking for and contact him by name in your email.
- In the “Contact Us” section, the contact of the HR manager is often indicated, and it is quite possible that it looks like [email protected]
- You can also find the company on social networks, for example, on Linkedin it is easy to find company employees with all their names and contacts.
- Or you can trite call the company and find out the name of the HR manager by phone.
You can find many more interesting tips in this article.
So, it’s okay if you use just polite treatment, without a name, in the case when it is not indicated in the vacancy. It is recommended to avoid verbal constructions of an informal style. Just remember your appeal to the addressee should be polite.
To get a helpful template, view website with a useful cover letter template builder. Create a great cover letter to get your dream job! Good luck!
Reason To Choose Comodo SSL Certificate To Secure Your Website
It should be clear by now that for your website to survive in this modern era, hacker ridden internet era, it is important for all the information that go on it or through it to be encrypted. To have a website without SSL protection is…
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
Why Restaurants Have To Set Up Online Ordering
Online ordering platforms have become so popular in the past couple of years. There was a time when users had to call a restaurant and wait until their delivery process was completed. But that’s just past! At this point, there are a lot of people…
Why Your Business Should Use Newsletters
Newsletters are very effective in maintaining a strong bond between a business and its clients. A closer look at big multinationals reveals that they use a lot of time and resources to make perfect newsletters for brand management. Therefore, you should also not let the…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…