水平: Entry level

工作类型: Full-time

Loading ...

工作内容

Our Purpose

We work to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. We cultivate a culture of inclusion for all employees that respects their individual strengths, views, and experiences. We believe that our differences enable us to be a better team – one that makes better decisions, drives innovation and delivers better business results.

Job Title

Senior Security Operations Center Incident Response (SOCIR) Analyst

Overview

The Security Operations Center (SOC) is a high-performance team responsible for security monitoring and response using advanced toolsets. The team is available 24/7 though a globally distributed operational team. The Security Monitoring and Response Senior Analyst is an integral member of the SOC’s Incident Response team, providing direct support for security incidents and general security operations.
  • Do you want to be part of the team handling complex technical monitoring and response functions during a security incident?
  • Have you provided technical leadership or oversight to junior analysts?
  • Do you want to improve security operations through technical projects and data analysis?

Role
  • Takes ownership of Incidents reported to the Incident Response Team end to end.
  • Regularly reviews team performance and participates in metrics and quality assurance activities.
  • Performs technical analysis for security Incidents, including for cases of malware, web attacks, lateral movement, and other ad hoc issues as they arise.
  • Represent the SOC in the Region.
  • Identify and lead projects with the focus of making technological improvements to SOC operations.
  • Maintain on-call hours to handle escalated events after hours and maintain the ability to provide rare emergency coverage in the SOC if needed.
  • Mentor and coach SOC Tier 1 staff members to assist with improving operations and increasing their capabilities.

All About You
  • Hold or able to gain one or more recognized security industry certifications like Security+, CEH, CISSP, CISM, SANS GSEC/GCIA/GCIH etc.
  • Experience in technical security, with exposure to Digital Forensics/Incident Response (DFIR) functions.
  • Experience with a SIEM tool and/or security orchestration applications
  • Strong understanding of ATT&CK Framework, Common Web Attacks, NIST or ISO Incident Handling Procedures, Knowledge of Windows and Unix Based Operating Systems, and Networking Principles.
  • Experience with PowerShell, bash, python, or other scripting languages desired.
  • Demonstrated ability to work effectively in ambiguous and/or high-pressure situations.
  • Demonstrated ability to work as part of a high-performance team.
  • Availability for on-call rotations for escalations during off-hours.

Corporate Security Responsibility

All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must
  • Abide by Mastercard’s security policies and practices;
  • Ensure the confidentiality and integrity of the information being accessed;
  • Report any suspected information security violation or breach, and
  • Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines.
Loading ...
Loading ...

最后期限: 10-01-2026

点击免费申请候选人

申请

Loading ...

相同的工作

Loading ...
Loading ...