Cybersecurity & Vulnerability Operations Analyst

McDonald's CorporationChicago, IL
2d

About The Position

McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3Ds (Delivery, Digital and Drive Thru). McDonald’s will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive thrus, through McDelivery, dine-in or takeaway.  McDonald’s Global Technology is here to power tomorrow’s feel-good moments.   That’s why you’ll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae-dipped fry at a time. Using AI, robotics and emerging tech, we’re digitizing the Golden Arches. Combine that with our unparalleled global scale, and we’re reshaping all areas of the business, industry and every community that is home to a McDonald’s restaurant. We face complex tech challenges every day. But that’s where our diverse and talented teams come in. They’re made up of the best and brightest from all over the globe, and they thrive in the space where feel-good meets fast-paced.   Check out the McDonald’s Global Technology Technical Blog to learn how technology and our global team are directly enabling the Accelerating the Arches strategy.  Department OverviewMcDonald’s Global Cyber Security is looking for a highly motivated, diligent, and skilled Cybsecurity Analyst to join the Vulnerability Threat Management team. This team protects McD’s customers, data, and brand by identifying vulnerabilities and threats to our organization and working to drive remediation of identified security risks. Vulnerability Management is a capability of Global Security Services within the larger Global Cyber Security Operations (GCS) function. Join us to support and improve our efforts to identify and reduce McDonald’s attack surface and help our business continue to have remarkable impacts on our customers’ lives. This role is a key member of the team and works with internal and external groups to identify and drive remediation of information security risks. In this role, you will develop new Cybersecurity services and improve existing services to meet the growing needs for protecting our users, devices, networks, applications, and data through vulnerability management. The ideal candidate will have experience working in vulnerability management, monitoring and assessing vulnerabilities to evaluate applicability and impact, and driving enterprise‑level prioritization strategies to reduce overall risk posture. The role includes reporting vulnerability and risk information to senior leadership and supporting remediation efforts across the enterprise.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Security, or related field.
  • 2+ years of experience in information security, security operations, incident response, vulnerability management, security engineering or similar experience. (Required)
  • Demonstrates an understanding of vulnerability management technologies, principles, processes along with hands-on experience using tools such as Tenable/Nessus, Tanium, Wiz, EASMs, ServiceNow, for the purpose of prioritizing remediation efforts. (Required)
  • Possesses hands‑on experience with Power BI reporting, metrics development, and trend analysis
  • Experience with PowerShell, Python scripting and automation for data analysis and reporting
  • Possesses strong analytical and communication skills with a curious mindset, and the ability to translate technical risk into actionable insights
  • Ability to support 24 x 7 x 365 stakeholders
  • Demonstrates leadership, interpersonal, verbal and written communication skills.
  • Knowledge of networking and protocols, various OS’, applications, and databases, and vulnerability management techniques as applied to cloud, on-prem, data, applications, platforms, operating systems and networks.
  • A strong working understanding of cybersecurity architectural principles
  • Ability to understand technically challenging Common Vulnerability and Exposure (CVE) information and use it to drive remediation
  • Ability to work independently and as part of a team within tight timeframes and a fast-paced environment with changing priorities, balancing multiple tasks simultaneously.
  • Hands‑on experience with Power BI metrics and report development and Intermediate scripting

Nice To Haves

  • Familiarity with security standards and frameworks such as: NIST, PCI DSS, ISO, etc. (Preferred)
  • Information security certifications, such as Security+, Network+, CCNA Security, GSEC, GCIA, GCFA, GPEN, CEH. (Preferred)

Responsibilities

  • Maintain awareness of emerging threats and vulnerabilities in the industry.
  • Act as a Vulnerability Management expert by assisting teams in understanding the detected vulnerabilities and provide risk‑based assessments using components such as Common Vulnerability Score System (CVSS), CISA KEV, EPSS, proprietary algorithms, internal and external risk factors.
  • Leverage and enhance the vulnerability management tooling and infrastructure including scanners, sensors, agents, aggregation platforms and scripting to research and identify exposure to vulnerabilities and present information to stakeholders for remediation as part of an enterprise level vulnerability management program.
  • Develop and maintain scripting and AI‑assisted automation to support data ingestion, enrichment, correlation, and reporting.
  • Build, maintain, and mature vulnerability threat reporting, metrics, advisories and trend analysis using Power BI.
  • Monitor ticketing queues for vulnerabilities and threat‑related incidents or requests; triage and coordinate with technology teams to ensure timely investigation and ticket resolution.
  • Develop insights that lead to short- term and long-term improvements in the enterprise vulnerability threat management program.
  • Produce and maintain clear, audit ready process documentation, runbooks, metrics definitions, and remediation guidance.

Benefits

  • health and welfare benefits
  • a 401(k) plan
  • adoption assistance program
  • educational assistance program
  • flexible ways of working
  • time off policies (including sick leave, parental leave, and vacation/PTO)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service