By Shawna Armstrong

What’s the difference?  Not much if you’re a great Sourcer, on the constant hunt for the best ways to get the most information.  Think of a Sourcer as a “good” hacker.  While hackers follow clues to breach privacy and steal data, Sourcers follow clues to build a set of profile and contact information for target talent (without crossing legal/ethical boundaries of course). 

What do the best Sourcers and most diabolical hackers use?  Pretty much the same tools – open source intelligence (OSINT), networks, social media, organizational tools, email enrichment tools, usernames, domains, and filetypes – in combination and by connecting the dots.  Learn more here, but please use your powers responsibly.

Subscribe to Recruiting Headlines

* indicates required


»Need an ATS? Try JazzHR

»Free Rejection Email Templates

»Text Recruiting Software

»Interview Scheduling Tool: Cronofy

»HR Podcast Directory

»Recruiting Newsletters

»HR Tech News

»Freelance HR Jobs

»Recruiting & HR Jobs

»Recruiter Ebooks