Cybersecurity Engineer II

Chicago, IL, United States

McDonald's Corporation

Einfach gut: Die aktuellen Angebote und Aktionen von McDonald's findest du hier. Entdecke exklusive McDonald's Deals, Coupons und Aktionen in der McDonald's App. Jetzt sparen. Qualität und Frische. McDonald's® Snacks. Genuss zum mitnehmen....

View all jobs at McDonald's Corporation

Apply now Apply later

Company Description

McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3Ds (Delivery, Digital and Drive Thru). McDonald’s will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive thrus, through McDelivery, dine-in or takeaway. 

McDonald’s Global Technology is here to power tomorrow’s feel-good moments.That’s why you’ll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae-dipped fry at a time. Using AI, robotics and emerging tech, we’re digitizing the Golden Arches. Combine that with our unparalleled global scale, and we’re reshaping all areas of the business, industry and every community that is home to a McDonald’s restaurant. We face complex tech challenges every day. But that’s where our diverse and talented teams come in. They’re made up of the best and brightest from all over the globe, and they thrive in the space where feel-good meets fast-paced.  

Check out the McDonald’s  Global Technology Technical Blog to learn how technology and our global team are directly enabling the Accelerating the Arches strategy. 

Job Description

Join McDonald’s Cybersecurity's Vulnerability Management (VM) team as a VM Engineer II in a role that puts you at the forefront of protecting one of the world's largest restaurant ecosystems. As part of Global Cyber security (GCS), you'll be part of a team responsible for discovering, assessing, triaging, detecting, and driving the remediation efforts across McDonald's vast infrastructure.

The role combines technical expertise with strategic thinking, requiring you to discover, analyze vulnerability disclosures, assess their impact, and engineer scalable solutions. You'll work with cutting-edge security technologies and be responsible for implementing automation and tools that enhance operational capabilities of the Vulnerability Management Program.

Responsibilities

  • Build and deploy vulnerability management infrastructure to include network scanners, agent deployment and configuration,
  • Implement, operate, and manage the security platform(s) to include administration, configuration, requirements gathering and process improvements to drive program efficiency.
  • Serve as a Subject Matter Expert (SME) for security tool questions and be able to dig deep into complex problems to help find a solution.
  • Conduct regular vulnerability assessments and scans.
  • Analyze and prioritize vulnerabilities based on risk and impact.
  • Report on VM Platform health status and operational trends to management.
  • Research, validate and prioritize vulnerabilities.
  • Perform in-context vulnerability risk assessments.
  • Support the development and operation of the vulnerability life cycle processes.
  • Collaborate with threat intelligence, GSOC and remediation teams to drive improvements.
  • Maintaining awareness of critical vulnerabilities or emerging threats that may impact McDonald's.
  • Analyze public and private vulnerability disclosures.
  • Deeply understand and assess the technical details and potential impact of vulnerabilities across McDonald's infrastructure, services, and applications.
  • Analyze vulnerabilities, identifying severity and the scope of potential impact to McD.
  • Engineer high quality, scalable, and accurate vulnerability detection mechanisms
  • Design and implement automation, tools and workflows to enhance our operations capabilities.
  • Be part of a global team and participate in periodic on-call responsibilities to ensure the continuous scanning and assessment of vulnerabilities.
  • Drive solutions that enable high fidelity vulnerability contextualization, tracking, and remediation.
  • Provide rapid-response vulnerability analysis for active zero-days and participate in regular on-call vulnerability management rotation.
  • Expertise identifying, assessing, and mitigating security risks in networks, systems, and applications.
  • Ability to analyze and prioritize findings and provide recommendations for remediation.
  • Knowledge of common vulnerabilities and exploits, and how to mitigate vulnerabilities
  • Knowledge of different security domains, including cloud, network, operating system, application, and infrastructure.  
  • Applies specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data to identify, interpret, and summarize the probability and impact of threats when determining specific vulnerabilities.
  • Adds to team culture of diversity, equity, inclusion, and respect

Benefits eligible: Yes
Bonus eligible: Yes
The expected salary range for this role is $98,140 – $125,130 per year 
The above represents the expected salary range for this job requisition. Ultimately, in determining your pay, we may also consider your experience, and other job-related factors.

Qualifications

Required Skills

  • Expertise in vulnerability assessment tools and methodologies.
  • Strong analytical skills to evaluate and prioritize vulnerabilities.
  • Knowledge of threat intelligence and Risk management frameworks.
  • Familiarity with compliance requirements and security standards.
  • Effective communication skills to collaborate with various teams.

Educational Background

  • Bachelor’s degree in Cybersecurity, Information Security, or a related field.
  • Relevant certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Offensive Security Certified Professional (OSCP) (preferred)

Tools & Software Used

  • Vulnerability scanning tools (e.g., Nessus, Qualys, Wiz, Rapid7).
  • Configuration management tools (e.g., Chef, Puppet).
  • Risk assessment frameworks (e.g., CVSS, OWASP).
  • Reporting and dashboard tools for tracking vulnerabilities.

Additional Information

Benefits eligible: This position offers health and welfare benefits, a 401(k) plan, adoption assistance program, educational assistance program, flexible ways of working, and time off policies (including sick leave, parental leave, and vacation/PTO). Eligibility requirements apply to some benefits and may depend on job classification and length of employment. 

Bonus eligible: This position is eligible for a bonus, calculated based on individual and company performance.

McDonald’s is an equal opportunity employer committed to the diversity of our workforce. We promote an inclusive work environment that creates feel-good moments for everyone. McDonald’s provides reasonable accommodations to qualified individuals with disabilities as part of the application or hiring process or to perform the essential functions of their job. If you need assistance accessing or reading this job posting or otherwise feel you need an accommodation during the application or hiring process, please contact mcdhrbenefits@us.mcd.com. Reasonable accommodations will be determined on a case-by-case basis.

McDonald’s provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to sex, sex stereotyping, pregnancy (including pregnancy, childbirth, and medical conditions related to pregnancy, childbirth, or breastfeeding), race, color, religion, ancestry or national origin, age, disability status, medical condition, marital status, sexual orientation, gender, gender identity, gender expression, transgender status, protected military or veteran status, citizenship status, genetic information, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.

Nothing in this job posting or description should be construed as an offer or guarantee of employment.

Apply now Apply later
Job stats:  4  0  0

Tags: Automation CISA CISM Cloud Compliance CVSS Exploits Nessus Offensive security OSCP OWASP Puppet Qualys Risk assessment Risk management Strategy Threat intelligence Vulnerabilities Vulnerability management

Perks/benefits: Career development Competitive pay Equity / stock options Flex hours Flex vacation Health care Medical leave Parental leave Salary bonus Startup environment

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.