OSINT (Open Source Intelligence) is a research method used in cybersecurity where professionals gather and analyze publicly available information from the internet and other public sources. Think of it as being a digital detective who uses legal, public resources like social media, websites, and public databases to find security risks or gather information. This is different from hacking because it only uses information that anyone can legally access. Companies use OSINT to understand their security vulnerabilities, check their online presence, and protect against potential threats.
Conducted OSINT investigations to identify potential security vulnerabilities for clients
Led Open Source Intelligence gathering operations to assess company's digital footprint
Used OSINT techniques to support incident response and threat intelligence activities
Typical job title: "OSINT Analysts"
Also try searching for:
Q: How would you set up an OSINT program for a large organization?
Expected Answer: A strong answer should cover creating systematic processes for information gathering, setting up tools and workflows, training team members, ensuring legal compliance, and establishing reporting procedures. They should emphasize the importance of documenting methodologies and maintaining ethical boundaries.
Q: How do you validate OSINT findings and ensure accuracy of intelligence?
Expected Answer: The candidate should discuss cross-referencing multiple sources, verifying information authenticity, using trusted sources, and implementing a verification framework. They should also mention documentation of sources and maintaining chain of custody for findings.
Q: What tools do you use for OSINT investigations and why?
Expected Answer: Should be able to name several common OSINT tools and explain their specific uses, such as social media monitoring tools, public records databases, and search engine techniques. Should explain when and why they choose specific tools.
Q: How do you ensure privacy and legal compliance during OSINT investigations?
Expected Answer: Should discuss understanding of privacy laws, data protection regulations, and ethical guidelines. Should mention only using public information and avoiding any illegal access methods.
Q: What is OSINT and why is it important for cybersecurity?
Expected Answer: Should explain that OSINT involves collecting information from public sources and how it helps identify security risks. Should mention basic sources like social media, websites, and public databases.
Q: What's the difference between passive and active OSINT?
Expected Answer: Should explain that passive OSINT involves observing without interaction (like viewing public websites), while active OSINT involves some form of interaction (like sending emails or making phone calls).