By Shawna Armstrong

What’s the difference?  Not much if you’re a great Sourcer, on the constant hunt for the best ways to get the most information.  Think of a Sourcer as a “good” hacker.  While hackers follow clues to breach privacy and steal data, Sourcers follow clues to build a set of profile and contact information for target talent (without crossing legal/ethical boundaries of course). 

What do the best Sourcers and most diabolical hackers use?  Pretty much the same tools – open source intelligence (OSINT), networks, social media, organizational tools, email enrichment tools, usernames, domains, and filetypes – in combination and by connecting the dots.  Learn more here, but please use your powers responsibly.

Subscribe to Recruiting Headlines

* indicates required


»Employer Branding w/The Muse

»Diversity and Inclusion Job Board

»Free Rejection Email Templates

»RecTech PR Newswire

»HR Podcast Directory

»Recruiting Newsletters

»HR Tech News

»HR Freelancers

»Jobs with Relocation Assistance

»Diversity Hiring News

»Recruiter Ebooks