Job Description

Company Description:

McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3Ds (Delivery, Digital and Drive Thru). McDonald’s will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive Thrus, through McDelivery, dine-in or takeaway. 

McDonald’s Global Technology is here to power tomorrow’s feel-good moments.  

That’s why you’ll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae-dipped fry at a time. Using AI, robotics and emerging tech, we’re digitizing the Golden Arches. Combine that with our unparalleled global scale, and we’re reshaping all areas of the business, industry and every community that is home to a McDonald’s restaurant. We face complex tech challenges every day. But that’s where our diverse and talented teams come in. They’re made up of the best and brightest from all over the globe, and they thrive in the space where feel-good meets fast-paced.  

Check out the McDonald’s Global Technology Technical Blog to learn how technology and our global team are directly enabling the Accelerating the Arches strategy. 

Job Description:

As a Security Operations Manager, you will oversee day-to-day operations within the Security Operations program and report to the Senior Manager of Security Operations. You will manage security operations personnel, policy enforcement, security awareness, and aid your team in achieving operational goals. You will lead initiatives focusing on Global Cyber Security (GCS) defensive measures and incident response. You and your team will support the daily security operations and Incident Response processes by aiding and responding in the event of a crisis or urgent situation to mitigate immediate and potential cyber threats. As needed, you and your team will use mitigation, preparedness, response, and recovery approaches to maximize the organization’s security.

Working within the Incident Response team and coordinating with other Cyber Operations teams to identify and report on security incidents as they occur and overseeing end-to-end remediation. Activities will include triaging security events, network and endpoint analysis, malware reverse engineering, threat hunting, vulnerability escalation, and resolving security incidents from detection to remediation. As part of the Security Operations team, you will create and implement standard operating procedures, playbooks, and processes to help streamline daily monitoring, investigations, and analysis research. The role works directly within GCS, the organization responsible for our Cybersecurity Operations & Incident Response program and critical services, ensuring our leadership makes informed risk-based decisions.

 

The ideal candidate for this managerial role should have the ability to lead and supervise a small team with limited oversight, displaying expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use of established incident response playbooks and practices, possess an acute attention to detail, and collaborate effectively across global cross-functional teams. The candidate must have:

  • Experience working in a security operations or incident response role
  • A strong background in defensive measures and utilizing information from various sources to identify, analyse, and report network events.
  • Expertise in leading resolution for security crises and urgent situations in security operations or incident response.
  • Proficiency in computer networking concepts, protocols, and network security methodologies.
  • A deep understanding of system and application security threats and vulnerabilities.
  • Advanced knowledge of network attacks and their relationship to threats and vulnerabilities.
  • Demonstrated skill in utilizing intrusion detection methodologies and techniques.
  • Considerable experience providing oversight on common security operations principles and methods.
  • Proven ability to lead and supervise a small team of analysts, providing guidance, support, and mentorship to enhance their skills and performance.

Responsibilities:

  • Provide leadership, professional development, and guidance to SOC staff and security operations team members.
  • Align security operations day-to-day priorities with operational strategies.
  • Enforce policy standards and strategies to ensure compliance with organizational policies.
  • Manage multiple projects to create new services, improve procedures, or implement solutions to enhance SOC efficiency.
  • Advise senior management on risk levels and security posture, providing cybersecurity recommendations based on significant threats and vulnerabilities.
  • Gather, maintain, and analyse data to identify potential threats, vulnerabilities, and performance metrics related to SOC operations.
  • Monitor and analyse system activity using security operations tools and analyse network alerts to determine possible root causes.
  • Provide timely detection, identification, and alerting of attacks, intrusions, and misuse activities.
  • Coordinate with stakeholders to validate network alerts and security events.
  • Deliver technical documents, incident reports, findings from computer examinations, and situational awareness information to leadership.
  • Review event escalations for accuracy and completeness and follow the organization's cyber incident response plan.
  • Perform security operations and incident response trend analysis and reporting.
  • Develop signatures for defense network tools in response to new or observed threats within the network environment.

Desired Skills:

  • Professional certification such as GIAC, GCIH, GCIA, ITIL.
  • Familiarity with NIST Risk Management Framework and NIST Cybersecurity Framework, Cyber Kill Chain.
  • Experience working with case management tools, SOAR, email security solutions, SIEM, and EDR technologies.
  • Experience working with complex multinational companies and distributed business models.
  • Experience developing automation through scripting languages such as Python.
Qualifications:
  • Bachelor’s degree or equivalent experience in Computer Science, Cybersecurity, Information Technology, Software Engineering, Information Systems, or Computer Engineering
Additional Information:

McDonald’s is an equal opportunity employer committed to the diversity of our workforce. We promote an inclusive work environment that creates feel-good moments for everyone. McDonald’s provides reasonable accommodations to qualified individuals with disabilities as part of the application or hiring process or to perform the essential functions of their job. If you need assistance accessing or reading this job posting or otherwise feel you need an accommodation during the application or hiring process, please contact mcdhrbenefits@us.mcd.com. Reasonable accommodations will be determined on a case-by-case basis.

McDonald’s provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to sex, sex stereotyping, pregnancy (including pregnancy, childbirth, and medical conditions related to pregnancy, childbirth, or breastfeeding), race, color, religion, ancestry or national origin, age, disability status, medical condition, marital status, sexual orientation, gender, gender identity, gender expression, transgender status, protected military or veteran status, citizenship status, genetic information, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.

Nothing in this job posting or description should be construed as an offer or guarantee of employment.

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online