u/digy76rd3

▲ 2 r/BusinessDevelopment+1 crossposts

How Recruiting's KPIs Are Making Your Job Harder - Explanation And Solution Inside

do you ever notice many of the "HR screened candidates" turn out to be absolute garbage and the candidates don't remember applying, don't understand the basic architecture of the frameworks on their resume, or seem to be using chatgpt in realtime on the call?

The reason this happens is due to Recruiting's KPIs.

Let's walk through a common scenario.

The talent acquisition team has been told their KPIs are:

number of applicants sourced

time-to-interview

low cost-per-hire

These KPIs are impossible to achieve organically. Real, senior engineering talent is expensive, passive, and hard to find. So what can they do?

They choose to use cheap sourcing agencies, offshore resume farms, and mass "easy apply" job board blasts. A great side effect of this cheap sourcing is it fills the ATS with loads of candidates.

Sounds great right? They're getting lots of applicants, the pipeline looks full, and the cost-per-hire metrics are low. The KPIs are being smashed.

But there's a problem. The pipeline is fake. It's keyword-stuffed auto-apply spam and proxy candidates. The scam works like this:

  • Sourcing agencies and "bootcamp mills" earn money or reputation when they get candidates into your interview pipeline.
  • So they use automated scripts to spam your ATS. As long as these resumes are keyword-stuffed properly (listing the exact stack you asked for: Next.js, React, Tailwind, Python, etc.), the ATS algorithms will consider the applicant valid.
  • To ensure the candidate looks even more real, they use proxy interviewers or real-time LLM whisperers during the initial non-technical HR screen. These fake candidates trick the recruiters into thinking they are high-quality technical talent.

The above is a massive problem, and it steals thousands of engineering hours from product teams every year.

So, recruiters are using these crappy sourcing methods, getting lots of cheap applicants, and pushing loads of fake candidates onto your calendar. The end result? You waste your time doing technical screens for people who can't write a basic script or explain a simple API integration. Recruiting then blames you for being "too picky" or having "unrealistic technical standards."

As you've probably guessed, the problem is Recruiting's KPIs. They're going to do what they have to do to hit those numbers. I've spoken to dozens of hiring managers, and almost all of them see the same thing instead of finding real talent, recruiters are focused on their vanity metrics. And can you blame them? That's what their bosses told them to do.

Option 1

Have a meeting with your CTO and the Head of HR (it needs to come from the top) to change Recruiting's KPIs to be Offer Acceptance Rate, 90-Day Retention, and Candidate Quality (measured by how many pass the technical screen). No more vanity metrics that can be easily faked using auto-apply bots. That will force them to do things properly and stop relying on resume farms.

Option 2

Recruiting will resist Option 1. The Head of TA will threaten that this will grind hiring to a halt. In this case, you force the recruiting team to implement a strict, async, proctored coding assessment or a standardized GitHub pull-request review before the candidate ever hits an engineer's calendar. That will stop the proxy candidates and re-train the recruiters to find real, high-quality developers. They'll resist this too, of course, but they'll take it instead of Option 1.

Good luck!

reddit.com
u/digy76rd3 — 5 days ago

How I stopped burning LinkedIn accounts running cold outreach

spent two years running b2b outreach on linkedin for my agency. lost count of how many profiles got restricted or banned. every time i tried scaling up with dripify or aimfox the warnings started within a week.

the pattern never changed. these tools send connection requests way faster than a human clicks. linkedin spots the mechanical behavior and hits you with a soft ban. then you lose a network you spent months building.

i tried slowing things down with random delays and smaller daily limits. it helped a bit but the core issue stayed. software leaves footprints that platforms easily detect.

a few months ago i switched to briskreach.com . they handle the process differently. instead of running automated software through your personal profile they assign you a dedicated account managed by their team.

you write the messaging campaign and they execute it from accounts that already have established activity. the actions look normal because actual people are doing them on the other side.

the setup sounded like a gimmick at first but the strategy works. my primary profile stays safe. the managed account handles all the cold outreach. if that account faces an issue my actual business pipeline stays independent of my personal profile. they also enforce a warmup period on new profiles before sending any cold messages which builds up credibility.

my reply rates are roughly identical to what i saw with traditional automation but i no longer receive account restriction warnings every morning. that change alone made the switch worthwhile.

not affiliated with them. just sharing what worked after years of dealing with bans.

u/digy76rd3 — 7 days ago

week a customer sent us a screenshot of a google search for "[our brand name] pricing" where the #2 result was a page on our own domain that we never created.

the url was something like ourdomain.com/pricing-enterprise-2026-updated. we do not have that page. we have never had that page. there is no redirect, no 404, nothing. if you click it, you get a blank white screen.

but google has it indexed. it has a meta title and description in the serp that we did not write. the cached version shows a full pricing page with numbers that are close to our real pricing but slightly wrong. our enterprise tier is $299/seat. this ghost page says $249/seat.

i checked search console. google says it crawled the page successfully. status 200. i checked our server logs. no request for that url ever hit our server.

my best theory is that someone injected the page through a cdn cache poisoning attack. we use cloudflare. the attacker figured out how to serve a spoofed response for that specific url path at the cdn edge layer so googlebot sees a real page, but our origin server never knows it exists.

the fake page has been live for at least two weeks. during that time, prospects have been seeing incorrect pricing in google results for our own brand name. our sales team has had three calls where the prospect said "but your website says $249."

i have submitted a removal request but google takes its time when the url technically returns a 200 status. we cannot remove a page we did not create from a cdn cache we supposedly control.

whoever did this understood that you do not need to build a competing page on a competing domain anymore. you just need to inject one page into your target's own infrastructure and let google do the rest.

reddit.com
u/digy76rd3 — 2 months ago

I was doing a competitor analysis for a client in the personal finance space. We are trying to rank for a highly lucrative keyword (clicks literally cost $50+ on Google Ads).

the #1 organic result is a completely garbage wordpress site. It looks like it was designed in 2012. Barely any content, no social presence, and the backlink profile on ahrefs looked entirely mediocre.

i couldn't figure out why Google loved this site. The engagement metrics must have been off the charts, but how?

I started digging into their source code and network requests. I noticed a weird script executing that called out to a repository for a popular, free Chrome extension used for converting PDFs (one with over 200,000 active users).

Here’s what the developer did: they bought the free PDF Chrome extension a few months ago. Then, they pushed a silent update to the users. Whenever a user with that extension installed Googles any search term remotely related to personal finance, the extension invisibly opens a background tab, navigates to this garbage affiliate site, scrolls halfway down, and stays there for 3 minutes before closing.

they are using 200,000 real human Chrome browsers, logged into real Google accounts, to generate completely authentic-looking dwell time and behavioral signals. To Google's algorithm, this site looks like the most helpful, engaging page on the entire internet.

I reported it to the Chrome Web Store, but it’s still live. The lengths people will go to manipulate user metrics right now are absolutely insane.

reddit.com
u/digy76rd3 — 2 months ago