McDonald's-posted about 1 year ago
$98,140 - $125,130/Yr
Full-time • Entry Level
Chicago, IL
Food Services and Drinking Places

The Cyber Defense Analyst role within McDonald's Security Operations Center (SOC) focuses on identifying, analyzing, and reporting cybersecurity events to protect the company's information assets. This position supports incident response processes and collaborates with various teams to enhance security measures, ensuring informed risk-based decisions are made by leadership. The role is integral to safeguarding McDonald's cybersecurity and involves continuous monitoring, threat analysis, and collaboration with stakeholders.

  • Continuously monitor and analyze system activity using security operations tools to identify malicious activity.
  • Characterize and analyze network traffic and logs to identify potential threats to McDonald's assets.
  • Analyze network alerts from various sources within the enterprise to determine their root cause.
  • Provide timely detection, identification, and analysis of possible attacks and intrusions, differentiating them from benign activities.
  • Collaborate with the Incident Response (L3) team, market stakeholders, and SOC to validate security events and provide tuning input.
  • Perform event correlation to gain situational awareness and assess the effectiveness of observed attacks.
  • Monitor external data sources to stay informed about cyber defense threat conditions.
  • Offer cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
  • Collaborate with stakeholders to resolve computer security incidents and ensure vulnerability compliance.
  • Formal education or certifications in Cyber Security, Security Event/Incident Response.
  • 1 - 3 years of experience working in a security operations or incident response role.
  • Basic knowledge of computer networking concepts, protocols, and network security methodologies.
  • Entry-level ability to analyze cyber threats and vulnerabilities.
  • Awareness of authentication, authorization, and access control methods.
  • Basic skills in utilizing intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Recognition of common system and application security threats and vulnerabilities.
  • Understanding of network attacks and their relationship to threats and vulnerabilities.
  • Familiarity with common adversarial tactics, techniques, and procedures.
  • Basic knowledge of Windows, MacOS, and/or Linux operating systems.
  • Professional certification such as GSEC, SSCP, Security+, CEH.
  • Experience working from Incident Response Playbooks.
  • Experience working with case management tools, SOAR, email security solutions, SIEM, and EDR technologies.
  • Experience developing automation through scripting languages such as Python.
  • Health and welfare benefits
  • 401(k) plan
  • Adoption assistance program
  • Educational assistance program
  • Flexible ways of working
  • Time off policies (including sick leave, parental leave, and vacation/PTO)
  • Bonus eligibility based on individual and company performance
  • Long term incentive eligibility for stock or other equity grants
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service