Jobs
Interviews

6 Diamond Model Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

0 Lacs

mumbai, maharashtra, india

On-site

Our client is a globally recognized financial services firm operating across more than 30 countries, with strong divisions in Retail, Asset Management, and Wholesale Banking. The firm combines disciplined strategy with innovative solutions to connect Eastern and Western markets. Its Global Cyber Threat Intelligence (CTI) team plays a central role in shaping and executing the organization's security vision. The CTI team drives vulnerability analysis, threat monitoring, and cross-functional coordination, ensuring timely intelligence and robust security coverage across the enterprise. Please contact Varsha KV or email your cv directly in word format with job reference number 15163 to Please note that due to the high number of applications only shortlisted candidates will be contacted. If you do not hear from us in the next 5 business days, we regret to inform you that your application for this position was unsuccessful. [HIDDEN TEXT] Key responsibilities The candidate will need to have a solid grounding within both Cyber Threat Intelligence and understanding of wider cyber security practices. Led CTI operations to monitor emerging vulnerabilities, manage CVE enrichment, and analyze exploitation trends for informed mitigation. Designed and maintained processes to ingest and prioritize threat data from diverse sources including open-source, commercial, and government feeds. Delivered actionable threat intelligence products, supported executive communication, and collaborated across internal security functions during incident response and strategy briefings. Role requirements Minimum of 8 years in Information Security, including at least 3 years specializing in Cyber Threat Intelligence. Strong expertise in OSINT techniques, dark web monitoring, and application of CTI models such as MITRE ATT & CK, Kill Chain, and Diamond Model. Proven experience in identifying, classifying, and analysing diverse threat landscapes including nation-state actors, cybercrime, and social engineering.

Posted 4 days ago

Apply

5.0 - 10.0 years

0 - 1 Lacs

Bengaluru, Karnataka, India

On-site

RESPONSIBILITIES: Review and build host-based detection content in EDR solutions such as Sentinel One, Microsoft Defender and other leading vendors. Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output and mentor cyber analysts. Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and evolve custom detections that mitigate highly dynamic threats to the enterprise. Proactively research advanced and emerging cyber threats, and apply analytical understanding of attacker methodologies, system vulnerabilities, and key indicators of attacks and exploits in threat hunting efforts Execute as needed in each of the six phases of incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned Collaborate using information and knowledge sharing networks and professional relationships. Education and Experience: Bachelors degree and 5+ years of threat analysis and/or incident response experience - additional years of relevant experience may be considered in lieu of Bachelors degree Relevant certifications (CISSP, SANS GIAC, CEH, etc.) REQUIREMENTS: Threat analysis and/or incident response experience Understanding of cyber threat models, including ATT&CK, Cyber Kill Chain, Racetrack, Diamond Model, etc. Experience working with EDR tools Experience with a SIEM-type platform Experience performing analysis and correlation of log data and forensic artifacts from multiple sources. Must be proficient, verbally and in writing with the English language.

Posted 1 month ago

Apply

5.0 - 10.0 years

0 - 1 Lacs

Hyderabad, Telangana, India

On-site

RESPONSIBILITIES: Review and build host-based detection content in EDR solutions such as Sentinel One, Microsoft Defender and other leading vendors. Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output and mentor cyber analysts. Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and evolve custom detections that mitigate highly dynamic threats to the enterprise. Proactively research advanced and emerging cyber threats, and apply analytical understanding of attacker methodologies, system vulnerabilities, and key indicators of attacks and exploits in threat hunting efforts Execute as needed in each of the six phases of incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned Collaborate using information and knowledge sharing networks and professional relationships. Education and Experience: Bachelors degree and 5+ years of threat analysis and/or incident response experience - additional years of relevant experience may be considered in lieu of Bachelors degree Relevant certifications (CISSP, SANS GIAC, CEH, etc.) REQUIREMENTS: Threat analysis and/or incident response experience Understanding of cyber threat models, including ATT&CK, Cyber Kill Chain, Racetrack, Diamond Model, etc. Experience working with EDR tools Experience with a SIEM-type platform Experience performing analysis and correlation of log data and forensic artifacts from multiple sources. Must be proficient, verbally and in writing with the English language.

Posted 1 month ago

Apply

5.0 - 10.0 years

0 - 1 Lacs

Delhi, India

On-site

RESPONSIBILITIES: Review and build host-based detection content in EDR solutions such as Sentinel One, Microsoft Defender and other leading vendors. Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output and mentor cyber analysts. Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and evolve custom detections that mitigate highly dynamic threats to the enterprise. Proactively research advanced and emerging cyber threats, and apply analytical understanding of attacker methodologies, system vulnerabilities, and key indicators of attacks and exploits in threat hunting efforts Execute as needed in each of the six phases of incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned Collaborate using information and knowledge sharing networks and professional relationships. Education and Experience: Bachelors degree and 5+ years of threat analysis and/or incident response experience - additional years of relevant experience may be considered in lieu of Bachelors degree Relevant certifications (CISSP, SANS GIAC, CEH, etc.) REQUIREMENTS: Threat analysis and/or incident response experience Understanding of cyber threat models, including ATT&CK, Cyber Kill Chain, Racetrack, Diamond Model, etc. Experience working with EDR tools Experience with a SIEM-type platform Experience performing analysis and correlation of log data and forensic artifacts from multiple sources. Must be proficient, verbally and in writing with the English language.

Posted 1 month ago

Apply

6.0 - 10.0 years

15 - 20 Lacs

Pune

Work from Office

Incident Response - security incidents detection platforms SIEM, IDS/IPS, endpoint tools Threat intelligence - Collect, analyze, and process from internal and external sources to identify and track emerging threats Monitor cyber threat trends Required Candidate profile 6+ years exp Cybersecurity, incident response threat intelligence. Attack frameworks MITRE ATTACK, Diamond Model, Unified Kill Chain APT actors and their TTPs Threat intelligence platforms

Posted 1 month ago

Apply

10.0 - 15.0 years

16 - 31 Lacs

Mumbai, Navi Mumbai, Mumbai (All Areas)

Work from Office

Threat hunting experience is must. Familiarity with threat intelligence sources and frameworks (MITRE ATT&CK, Diamond Model, Cyber Kill Chain). Ability to proactively find cybersecurity threats and mitigate them. Knowledge about Advanced persistent threats and treat actors, their TTPs. Ability to recognize attack patterns and corelate them with specific threat actors. Ability to obtain as much information on threat behaviour, goals and methods as possible. Knowledge of Analytics platforms for carrying out detailed analytics of obtained telemetry.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies