National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Analyst, Cybersecurity Operations (Detection & Response)

McDonald's Corporation
London
2 days ago
Applications closed

Related Jobs

View all jobs

Senior Threat Intelligence Analyst - Outside IR35

Senior Threat Intelligence Analyst - Outside IR35

Cyber Security Analyst

Cyber Security Analyst

Cyber Security Analyst

Reporting and Analytics Analyst

Company Description:
McDonald’s growth strategy, Accelerating the Arches , encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts, we are leveraging our competitive advantages to strengthen our brand. A key growth strategy is to Double Down on the 3Ds (Delivery, Digital, and Drive Thru). McDonald’s will accelerate technology innovation so that over 65 million customers daily experience a fast, easy service at our 25,000+ Drive Thrus, through McDelivery, dine-in, or takeaway.
McDonald’s Global Technology is committed to powering tomorrow’s feel-good moments. We are at the forefront of transformative technology, exploring new ways to serve our customers and spread happiness through AI, robotics, and emerging tech, digitizing the Golden Arches. Our global scale allows us to reshape all areas of our business, industry, and communities. We face complex tech challenges daily, supported by diverse, talented teams from around the world, thriving where feel-good meets fast-paced innovation.
Learn more via the McDonald’s Global Technology Technical Blog .
Job Description:
We are seeking a Senior Analyst to oversee daily operations within the Security Operations program, reporting to the Senior Manager of Security Operations. Responsibilities include managing security personnel, enforcing policies, promoting security awareness, and leading initiatives on Global Cyber Security (GCS) defensive measures and incident response. You will support daily security operations and incident response processes, responding to crises to mitigate cyber threats, employing mitigation, preparedness, response, and recovery strategies.
You will work within the Incident Response team, coordinating with other Cyber Operations teams to identify, report, and remediate security incidents, including triaging events, analyzing networks and endpoints, reverse engineering malware, threat hunting, and vulnerability management. You will develop and implement SOPs, playbooks, and processes to streamline monitoring and investigations, supporting GCS’s cybersecurity operations and incident response programs.
The ideal candidate should demonstrate leadership in supervising small teams, with expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling (containment, eradication, recovery, lessons learned). They should adhere to established incident response procedures, possess strong attention to detail, and collaborate effectively across global teams. Requirements include:
Experience in security operations or incident response
Solid background in defensive measures and analyzing network events
Proven ability to lead resolution during security crises
Proficiency in networking concepts, protocols, and security methodologies
Deep understanding of system and application security threats
Knowledge of network attacks, intrusion detection, and security principles
Leadership skills in supervising analysts and guiding team performance
Responsibilities:
Lead and develop SOC staff and security teams
Align security priorities with organizational strategies
Enforce policies to ensure compliance
Manage projects to improve SOC services
Advise leadership on cybersecurity risks and strategies
Analyze data to identify threats and vulnerabilities
Monitor system activities and analyze alerts
Detect and report attacks and intrusions
Coordinate with stakeholders on security events
Prepare incident reports and situational awareness updates
Review escalations and follow incident response plans
Conduct trend analysis and develop defense signatures
Desired Skills:
Certifications such as GIAC, GCIH, GCIA, ITIL
Familiarity with NIST frameworks, Cyber Kill Chain
Experience with case management, SOAR, SIEM, EDR tools
Experience with multinational organizations and automation scripting (Python)
Qualifications:
Bachelor’s degree or equivalent in Computer Science, Cybersecurity, or related fields
Additional Information:
At McDonald’s, we embrace diversity and are committed to creating an inclusive culture where everyone can be their authentic self. We do not tolerate inequality, injustice, or discrimination. We actively contribute to our communities by developing skills and supporting aspirations, helping people succeed both within and outside of McDonald’s.

#J-18808-Ljbffr

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.