Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we’re helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title And Summary
Information Security Operations Analyst II
Overview
Responsible for delivering and improving Identity & Access Management (IAM) access services through operational optimization, standardization, and automation support.
Executes continuous improvement initiatives that reduce cycle time, rework, and escalations while improving user experience and control adherence.
Partners with application teams, engineering, governance, and service management to ensure access services are reliable, scalable, and auditable.
Support end-to-end access request fulfillment optimization while ensuring consistent execution against SOPs and controls.
Identify service friction points using ticket trends and stakeholder feedback; deliver incremental improvements.
Execute process enhancements such as SOP updates, workflow adjustments, and knowledge article maintenance.
Perform structured triage and contribute to root cause analysis (RCA) with guidance for complex cases.
Maintain operational quality controls to ensure accuracy, compliance, and audit readiness.
Develop and deliver regular service reporting and escalate risks early.
Execute UAT and validation activities for changes impacting access workflows.
Collaborate with Resolution teams and Engineering to document and track defects.
Serve as an SME for day-to-day access operations and tooling features.
Provide informal guidance to new team members as needed.
Deliverables / Outcomes
Measurable reduction in rework, escalations, or repeat access issues.
Accurate and current SOPs, runbooks, and knowledge articles.
Consistent, reliable reporting with actionable insights.
Demonstrated adherence to controls and audit requirements.
Effective contribution to RCAs and corrective actions.
Successful execution of UAT and validation activities.
Scope & Autonomy
Independently executes defined tasks and improvement items.
Escalates ambiguous or high-risk issues appropriately.
Leads small, well-scoped improvements end-to-end.
Experience
Experience in IAM operations, access provisioning, or service management.
Exposure to ITSM practices and queue-based operations.
Working knowledge of IAM lifecycle concepts.
Core Skills
Strong process discipline and attention to detail.
Analytical and data-driven mindset.
Clear written and verbal communication skills.
Structured problem-solving approach.
Effective collaboration across teams.
Corporate Security Responsibility
All Activities Involving Access To Mastercard Assets, Information, And Networks Comes With An Inherent Risk To The Organization And, Therefore, It Is Expected That Every Person Working For, Or On Behalf Of, Mastercard Is Responsible For Information Security And Must:
Abide by Mastercard’s security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines.
Financial Services IT Services and IT Consulting and Technology Information and Internet
What We Offer
About the Company
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Information Security Operations Analyst II
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!