
Open-source intelligence (OSINT) investigations frequently require identifying employees within an organisation—whether for due diligence, threat assessment, competitive intelligence, or legitimate security research. Although this information is often publicly available, it is dispersed across websites, documents, and social platforms. Effective discovery, therefore, depends on the ability to craft precise search operators and recognise the digital breadcrumbs organisations leave online.
This guide outlines practical methods for uncovering staff names, job titles, and contact information using only open sources. All techniques reference publicly indexable data and rely on advanced Google/Bing search operators to accelerate discovery.
Why OSINT Investigators Search for Employee Information
Organisations routinely publish staff details for transparency, communication, or academic visibility. Security teams and analysts collect this information for reasons such as:
Mapping organisational structure
Identifying publicly exposed email patterns that may be exploited in phishing attacks
Assessing the digital footprint of critical personnel
Supporting due diligence investigations
Understanding external-facing roles and responsibilities
The objective is not exploitation but situational awareness—recognising what an organisation makes publicly accessible, knowingly or not.
Core Search String for Finding Employee Information
A highly effective baseline query targets the organisation’s own domain while searching for common contact-related keywords:
By replacing example.com with the target domain, investigators can rapidly locate team pages, staff directories, faculty lists, and department-specific contact pages. This search string is broad enough to capture diverse formats while refined enough to avoid noise.
Applied Examples
1. NHS Staff or Team Directories
Because the NHS comprises hundreds of trusts and clinics with different subdomains, this query often reveals decentralised staff lists that are difficult to navigate manually.
Employee Search OSINT Guide
2. University Contact Pages
Academic institutions frequently publish downloadable organisational charts, programme handbooks, or faculty listings as PDFs—many of which include emails and phone extensions.
Searching Hidden or Overlooked Document Types
Many organisations unknowingly expose employee data inside downloadable files rather than webpage content. Targeting document formats such as PDF, XLS, and CSV can reveal far more granular information:
Legacy intranet exports, HR circulars, old directories, and policy documents are familiar sources. These files often bypass regular navigation menus, but remain indexed by search engines.
Identifying Email Naming Conventions
Understanding an organisation’s email pattern enables analysts to infer addresses for employees not listed publicly accurately. This search pattern is designed to surface those conventions:
This frequently reveals patterns such as:
Once the pattern is known, address enumeration becomes dramatically easier.
Leveraging LinkedIn via Google
LinkedIn profiles often contain job titles, departments, and public email addresses. Google can be used to filter LinkedIn results for a specific organisation:
Adding job titles (e.g., “direct”, “marketing manager”, “HR officer”) further refines the dataset. This approach is beneficial when the organisation lacks a public staff directory.
Additional Keywords to Improve Discovery
When standard queries produce limited results, incorporating alternative organisational terms can broaden visibility”
“staff directo”y”
“team conta”t”
“organogr”m”
“faculty li”t”
“extension number”
“email address”s”
These reflect terminological variations across sectors such as education, healthcare, NGOs, and government bodies.
Ethical and Responsible Use
While OSINT relies on publicly accessible information, analysts must respect privacy, legality, and organisational boundaries. Any data collection should support legitimate research, defensive security analysis, or authorised investigations. The objective is awareness, not exploitation.
Employee discovery through OSINT is a valuable capability for security teams, investigators, and researchers. By combining targeted search operators, document analysis, and external-profile querying, practitioners can rapidly assemble accurate organisational intelligence from open sources.



