3+ OSINT Jobs in India
Apply to 3+ OSINT Jobs on CutShort.io. Find your next job, effortlessly. Browse OSINT Jobs and apply today!

Location: Gurugram, India
Duration: 3 Months
Job Summary:
We are seeking a highly motivated OSINT Analyst Intern with a potential Pre-Placement Offer (based on performance) to join our Cyber Intelligence Team. The role focuses on gathering, analyzing, and reporting on publicly available data to support cyber investigations, threat intelligence, and profiling tasks. Ideal for individuals passionate about intelligence gathering, social media analysis, and digital profiling.
Responsibilities:
- Perform open-source intelligence (OSINT) investigations using usernames, emails, phone numbers, and social media footprints.
- Conduct deep-dive investigations using breach data and leaked credential sets.
- Utilize Google Dorking techniques to extract sensitive or hidden data from public sources.
- Perform social media intelligence (SOCMINT) to analyze behavioral patterns, networks, and digital presence.
- Investigate mobile numbers using OSINT tools to identify user identities and digital trails.
- Assist in email-based investigations, including tracing sources, compromise checks, and breach analysis.
- Maintain strict operational security (OPSEC) during intelligence collection and investigations.
- Support the generation of intelligence reports, profiling documents, and threat landscape summaries.
- Stay updated on geopolitical issues, regional conflicts, and their cybersecurity implications (preferred).
Required Skills:
- Strong understanding of OSINT techniques and investigation workflows
- Google Dorking and advanced search operators
- Email investigation tools and methodologies
- Mobile number tracing and identification using OSINT platforms
- Social Media Intelligence (SOCMINT) across platforms like Facebook, Twitter, LinkedIn, Telegram, and others
- Experience in breach data investigation (HaveIBeenPwned, dehashed, breach compilation analysis)
- Knowledge of Operational Security (OPSEC) for safe investigation practices
- Ability to create detailed and structured intelligence reports
- Bonus: Geopolitical awareness and understanding of how global events impact cyber threats.
Key Responsibilities:
1. Threat Research: Work on researching emerging cyber threats specifically. You will monitor threat actor activities, study their tactics, techniques, and procedures (TTPs), and help identify potential risks.
2. Alert Triage and Incident Analysis: Support the analysis of security alerts generated by our in-house platform. You will work alongside the team to identify critical issues and provide timely
intelligence to help mitigate threats.
3. Data Collection and OSINT: Assist in gathering and analyzing data using Open Source Intelligence (OSINT) methodologies. You will help collect relevant information to support ongoing threat investigations.
4. Report Preparation: Contribute to the preparation of threat intelligence reports for internal and external stakeholders. You will learn how to convey complex technical information in a clear and
actionable manner.
5. SOP Development: Collaborate with the team to develop and refine Standard Operating Procedures (SOPs) for systematic threat analysis. Your input will help ensure that our procedures are efficient and scalable.
6. Cross-functional Collaboration: Work closely with various teams, including product development and data acquisition, to support the integration of new intelligence sources and improve the effectiveness of our threat intelligence platform.
Key Qualifications:
Educational Background: Completed a degree in Cybersecurity, Computer Science, Information Technology, or a related field.
Basic Knowledge of Cybersecurity: A foundational understanding of cybersecurity concepts, including web application security, threat analysis, and vulnerability assessment.
Familiarity with OSINT: Basic knowledge of Open Source Intelligence (OSINT) tools and methodologies for data collection.
Technical Skills: Familiarity with scripting languages such as Python, Ruby, or GO is a plus.
Experience with automation and data analysis tools will be advantageous.
Communication Skills: Strong written and verbal communication skills, with the ability to learn how to convey technical findings effectively.
Problem-Solving and Adaptability: A proactive attitude with strong problem-solving skills. You should be comfortable learning in a fast-paced and dynamic environment.
Additional Skills:
Interest in Cybersecurity Challenges: Participation in bug bounty programs, Capture The Flag (CTF) challenges, or cybersecurity competitions is a plus.
Willingness to Learn: A keen interest in developing skills in threat intelligence, threat actor profiling, and behavioral analysis.