Lead enterprise crisis response, serving as incident commander or senior advisor during critical events that impact Mastercard’s global operations, technology, reputation, or personnel.
Coordinate across regional teams to align situational awareness and response actions across global operations.
Oversee strategic preparedness and governance to maintain enterprise crisis management frameworks, playbooks, and regulatory compliance.
Provide timely and accurate briefings to senior executives, translating complex information into clear, actionable insights that drive enterprise decisions.
Design and lead crisis simulations and tabletop exercises with Mastercard leadership, regulators, and external partners to strengthen organizational resilience.
Capture and implement lessons learned from real incidents and exercises to enhance readiness and response maturity.
Build and sustain strong partnerships with law enforcement, government agencies, and industry partners to ensure unified crisis coordination and shared situational awareness.
Develop and report key performance metrics that measure enterprise readiness and demonstrate continuous improvement in resilience capabilities.
Mentor and guide regional crisis managers and analysts, promoting collaboration, accountability, and a culture of excellence across the global crisis management community.
Requirements
Extensive experience in crisis management, intelligence, emergency management, or related operational leadership within a global or highly regulated organization.
Proven success leading enterprise or multi-region incident response and business continuity programs.
Deep understanding of global regulatory and operational resilience frameworks within financial services.
Exceptional written and verbal communication skills with the ability to brief and influence executive leadership under pressure.
Demonstrated ability to foster cross-functional collaboration and decision-making across diverse teams, time zones, and cultures.
Experience engaging with public-private partnerships, intelligence networks, or law enforcement agencies is strongly preferred.
Advanced degree or professional certifications (such as CBCP, CEM, PMP, or equivalent) are desirable.
Benefits
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate must:
Abide by Mastercard’s security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines.
IT - Security & Resilience Chief Engineer focusing on Security Monitoring for LBBW. Leading IT - Security projects and ensuring compliance and operational security within IT.
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.