wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How to write a cover letter

profile
Genius Ape
Sep 02, 2017
0 Likes
0 Discussions
978 Reads
When applying for a job, a cover letter should be sent or posted with your resume or curriculum vitae. A cover letter is a (typically) one-page document that explains to the hiring manager why you are an ideal candidate for the job. It goes beyond your resume to explain in detail how you could add value to the company. It can be helpful to look at cover letter samples when writing your own. A sample can help you decide what to include in your letter, and how to format the letter. A cover letter needs to:
  • introduce you
  • mention the job you're applying for (or looking for)
  • match your skills and experiences with the skills and experiences required by the job
  • encourage the reader to read your resume
  • finish with a call to action (for example, requesting an interview or asking to meet).
Although there are no set rules on how your cover letter should be structured, making sure it flows well is vital if you want to impress recruiters. Here’s a rough guideline of how your cover letter should look:   Opening the letter – Why are you getting in touch? The opening paragraph should be short and to the point, explaining why you’re getting in touch. It’s also useful to include where you found the ad. If someone referred you, mention their name in this section. Example: I wish to apply for the role of IT Manager, currently being advertised on example.com . Please find enclosed my CV for your consideration.   Second paragraph – Why are you suitable for the job? Briefly describe your professional and academic qualifications that are relevant to the role and ensure you refer to each of the skills listed in the job description. Example: As you can see from my attached CV, I have over three years’ experience in the IT Industry, and I believe the knowledge and skills built up during this time make me the perfect candidate for the role.   Third paragraph – What can you do for the company? Now’s your opportunity to emphasise what you can do for the company. Outline your career goals (making it relevant to the position you’re applying for) and expand on pertinent points in your CV – including examples to back up your skills. Example: In my current role as Senior Marketing Executive at Software Company X Ltd, I have been responsible for increasing incoming client enquiries for our B2B product lines by 156% in under 12 months, which helped the business increase its revenue by 55% year-on-year.   Fourth paragraph – Reiterate Here’s where you reiterate your interest in the role and why you would be the right fit for the role. It’s also a good time to indicate you’d like to meet with the employer for an interview.   Closing the letter Sign off your cover letter with ‘Yours sincerely’ (if you know the name of the hiring manager), or ‘Yours faithfully’ (if you don’t), followed by your name.

Comments ()


Sign in

Read Next

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

How Men and Women Process Pain Differently

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Compromising Mobile Platforms

Blog banner

Theads

Blog banner

IT RISK

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

What is a Malware ?

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Veg Mix Pickle

Blog banner

EID UL FITR

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Hello World

Blog banner

How to use GIT & GITHUB

Blog banner

DNS Cache

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Types of E-Commerce

Blog banner

NETSUITE

Blog banner

Reconnaissance

Blog banner

Challenges and risks in service operations

Blog banner

Tracking Emails & Email Crimes

Blog banner

Deadlock and starvation

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Uniprocessor and Types

Blog banner

Swiggi

Blog banner

Security Issues and Countermeasures

Blog banner

Memory Management

Blog banner

I/O Buffering

Blog banner

Access management

Blog banner

PPT methodology

Blog banner

What is Data, Information and Knowledge?

Blog banner

Direct memory access

Blog banner

Life of an army person

Blog banner

Security and E-mail

Blog banner

LiquidPlanner

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Security issues

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Network Footprinting in Cybersecurity

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner