HamburgerMenu
hirist

Job Description

Company Description :

HackElite is a leading provider of comprehensive cybersecurity solutions. Known for our advanced threat intelligence, vulnerability management, and dark web monitoring, we help businesses stay ahead of cyber threats. With a team of seasoned experts and innovative tools, we are committed to building resilient digital ecosystems. Our services include OSINT, risk assessment, AI/ML automation, fake app analysis, online reputation management, and more.

Role Description :

This is a full-time on-site role for a Senior OSINT Analyst based in Kerala, India. The Senior OSINT Analyst will be responsible for :

- Conduct open-source intelligence (OSINT) investigations across surface, deep, and dark web environments.

- Identify and assess cyber threats, vulnerabilities, and adversary activities using OSINT tools and methodologies.

- Perform multi-source intelligence analysis, including SOCMINT, GEOINT, IMINT, and HUMINT.

- Monitor threat actors, campaigns, and underground forums for indicators of compromise (IOCs) or potential attacks.

- Produce strategic and tactical intelligence reports, risk assessments, and threat summaries for stakeholders.

- Conduct sentiment analysis and brand/reputation monitoring to detect and mitigate online risks.

- Utilize frameworks such as MITRE ATT&CK, STIX/TAXII, and Kill Chain Analysis for structured threat reporting.

- Collaborate closely with CTI, SOC, and Incident Response teams to support proactive defense and response initiatives.

- Contribute to AI/ML-driven intelligence automation projects to enhance efficiency and coverage.

- Present findings through dashboards, briefings, and intelligence bulletins to internal and external audiences.

Required Skills & Experience :

- 3+ years of experience in OSINT, Cyber Threat Intelligence (CTI), or Digital Intelligence roles.

- Proficiency in multi-source intelligence collection (GEOINT, IMINT, SOCMINT, HUMINT).

- Hands-on experience with OSINT tools such as Maltego, Shodan, SpiderFoot, Social Links, Recon-NG, or similar.

- Strong understanding of global cyber threat landscapes, adversary TTPs, and threat actor profiling.

- Familiarity with MITRE ATT&CK, STIX/TAXII, IOC analysis, and link/graph analysis tools (e.g., Analyst's Notebook, MISP, ThreatConnect).

- Experience preparing clear, concise intelligence reports and presentations for technical and non-technical stakeholders.

- Strong analytical, critical thinking, and data interpretation skills.

- Excellent written and verbal communication abilities in English.

- Certifications such as GOSI, GIAC Open Source Intelligence (GOSI), CEH, CREST CTI, or GCIA are preferred.

info-icon

Did you find something suspicious?