Principal in Security Monitoring Response at Mastercard managing global crises and resilience operations. Leading incident response efforts and ensuring the safety of people and assets.
Responsibilities
Serve as incident commander or senior advisor during enterprise-level crises affecting Mastercard's global operations, technology, reputation, or workforce.
Your judgment in these moments shapes outcomes for the organization and the people within it.
Coordinate situational awareness and response actions across regional teams, ensuring that the right information reaches the right people at the right time, with clarity and without noise.
Translate complex, fast-moving operational data into concise, accurate briefings for senior executives and board-level audiences.
Own the design and maintenance of enterprise crisis management frameworks, playbooks, and governance structures that keep the organization prepared and compliant across evolving regulatory environments.
Lead crisis simulations and tabletop exercises with Mastercard leadership, regulators, and external partners.
Cultivate and sustain partnerships with law enforcement agencies, government bodies, and industry organizations including FS-ISAC, INTERPOL, and Europol.
Requirements
Extensive experience leading crisis response, intelligence operations, emergency management, or related functions within a global or highly regulated environment.
A track record of leading enterprise or multi-region incident response and business continuity programs at scale, with demonstrable outcomes.
Deep familiarity with operational resilience and regulatory frameworks within financial services or similarly complex industries.
Executive-level communication skills, both written and verbal.
A collaborative leadership style that brings people together across functions, time zones, and organizational structures, without sacrificing decisiveness when speed is required.
Experience engaging with public-private partnerships, intelligence networks, or law enforcement agencies, domestically and internationally, is strongly preferred.
An advanced degree or professional certifications such as CBCP, CEM, or PMP are a valued complement to operational experience.
Benefits
insurance (including medical, prescription drug, dental, vision, disability, life insurance)
flexible spending account and health savings account
paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave)
80 hours of Paid Sick and Safe Time
25 days of vacation time and 5 personal days, pro-rated based on date of hire
10 annual paid U.S. observed holidays
401k with a best-in-class company match
deferred compensation for eligible roles
fitness reimbursement or on-site fitness facilities
Manager overseeing technical security operations for the Protection Services department. Responsible for managing security systems, staff training, and interdepartmental collaboration.
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.