Qureos

FIND_THE_RIGHTJOB.

JOB_REQUIREMENTS

Hires in

Not specified

Employment Type

Not specified

Company Location

Not specified

Salary

Not specified

Job Description:

We are seeking an experienced OSINT Researcher to support cybercrime investigations through open-source intelligence techniques. The role involves assisting Law Enforcement Agencies, developing OSINT-based training content, researching emerging tools and trends, and strengthening investigative capabilities through practical exercises and inter-agency collaboration.

The Key Role Includes:

  • Assisting Law Enforcement Agencies (LEAs) in utilizing Open-Source Intelligence (OSINT) to investigate and solve cybercrime cases.
  • Researching new OSINT tools, technologies, and methodologies relevant to cybercrime investigations.
  • Providing technical training and capacity-building support to Law Enforcement Agencies, Judicial Officers, and Public Prosecutors.
  • Regularly updating training and course content to reflect the latest tools, techniques, and trends in OSINT, cybercrime data breaches, and digital forensics.
  • Developing and implementing practical exercises, case studies, and hands-on modules for OSINT investigations.
  • Creating assessment materials and collaborating with multiple agencies to enhance the effectiveness of OSINT in cyber investigations.

Skills & Requirements:

  • Minimum 5 years of professional experience as an OSINT Researcher, including hands-on use of OSINT methodologies and tools.
  • Practical knowledge of tools such as Tor, Tails, and other anonymizing software used for safe and secure Dark Web research.
  • B.E./B.Tech / M.Tech / MCA / MBA / Postgraduate degree completed from a recognized University/Institution.
  • Certification in Certified Cyber Threat Intelligence Analyst (CCTIA), GIAC Cyber Threat Intelligence (GCTI), or equivalent credentials.
  • Strong knowledge of Open-Source Intelligence (OSINT) tools and specialized tools for Dark Web research (relevant certifications preferred).
  • Understanding of the MITRE ATT&CK framework.
  • Strong analytical ability to assess infrastructure security requirements, risks, and data.
  • Understanding of malware behavior, code analysis, and propagation techniques.
  • Knowledge of ethical hacking concepts and cyber threat intelligence practices.
  • Ability to communicate technical concepts clearly to diverse stakeholders, including investigators and judicial officials.

Job Type: Full-time

Benefits:

  • Provident Fund

Work Location: In person

© 2026 Qureos. All rights reserved.