Senior Analyst, Cybersecurity Operations (Detection & Response)

McDonald's
London
2 weeks ago
Applications closed

Related Jobs

View all jobs

Security Operations Associate - Senior Incident Response Analyst

OT Cyber Security Analyst

OT Cyber Security Analyst

OT Cyber Security Analyst

Cyber Security Analyst

Senior Information Security Analyst

As a Senior Analyst, you will oversee day-to-day operations within the Security Operations program and report to the Senior Manager of Security Operations. You will manage security operations personnel, policy enforcement, security awareness, and aid your team in achieving operational goals. You will lead initiatives focusing on Global Cyber Security (GCS) defensive measures and incident response. You and your team will support the daily security operations and Incident Response processes by aiding and responding in the event of a crisis or urgent situation to mitigate immediate and potential cyber threats. As needed, you and your team will use mitigation, preparedness, response, and recovery approaches to maximize the organization’s security.

Working within the Incident Response team and coordinating with other Cyber Operations teams to identify and report on security incidents as they occur and overseeing end-to-end remediation. Activities will include triaging security events, network and endpoint analysis, malware reverse engineering, threat hunting, vulnerability escalation, and resolving security incidents from detection to remediation. As part of the Security Operations team, you will create and implement standard operating procedures, playbooks, and processes to help streamline daily monitoring, investigations, and analysis research. The role works directly within GCS, the organization responsible for our Cybersecurity Operations & Incident Response program and critical services, ensuring our leadership makes informed risk-based decisions.

The ideal candidatefor this managerial role should have the ability to lead and supervise a small team with limited oversight, displaying expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling procedures (containment, eradication, recovery, and lessons learned). They should excel in adhering to and enforcing the use of established incident response playbooks and practices, possess an acute attention to detail, and collaborate effectively across global cross-functional teams. The candidate must have:

Experience working in a security operations or incident response role A strong background in defensive measures and utilizing information from various sources to identify, analyse, and report network events. Expertise in leading resolution for security crises and urgent situations in security operations or incident response. Proficiency in computer networking concepts, protocols, and network security methodologies. A deep understanding of system and application security threats and vulnerabilities. Advanced knowledge of network attacks and their relationship to threats and vulnerabilities. Demonstrated skill in utilizing intrusion detection methodologies and techniques. Considerable experience providing oversight on common security operations principles and methods. Proven ability to lead and supervise a small team of analysts, providing guidance, support, and mentorship to enhance their skills and performance.

Responsibilities:

Provide leadership, professional development, and guidance to SOC staff and security operations team members. Align security operations day-to-day priorities with operational strategies. Enforce policy standards and strategies to ensure compliance with organizational policies. Manage multiple projects to create new services, improve procedures, or implement solutions to enhance SOC efficiency. Advise senior management on risk levels and security posture, providing cybersecurity recommendations based on significant threats and vulnerabilities. Gather, maintain, and analyse data to identify potential threats, vulnerabilities, and performance metrics related to SOC operations. Monitor and analyse system activity using security operations tools and analyse network alerts to determine possible root causes. Provide timely detection, identification, and alerting of attacks, intrusions, and misuse activities. Coordinate with stakeholders to validate network alerts and security events. Deliver technical documents, incident reports, findings from computer examinations, and situational awareness information to leadership. Review event escalations for accuracy and completeness and follow the organization's cyber incident response plan. Perform security operations and incident response trend analysis and reporting. Develop signatures for defense network tools in response to new or observed threats within the network environment.

Desired Skills:

Professional certification such as GIAC, GCIH, GCIA, ITIL. Familiarity with NIST Risk Management Framework and NIST Cybersecurity Framework, Cyber Kill Chain. Experience working with case management tools, SOAR, email security solutions, SIEM, and EDR technologies. Experience working with complex multinational companies and distributed business models. Experience developing automation through scripting languages such as Python.

Qualifications:Bachelor’s degree or equivalent experience in Computer Science, Cybersecurity, Information Technology, Software Engineering, Information Systems, or Computer EngineeringAdditional Information:

At McDonald’s we are People from all Walks of Life... 

People are at the heart of everything we do, and they make the McDonald’s experience. We embrace diversity and are committed to creating an inclusive culture that means people can be their best authentic self in our restaurants and offices, which helps us to better serve our customers. We have a strong heritage of diversity and representation within our communities, which we are proud of. The diversity of our people, customers, Franchisees and suppliers gives us strength.

We do not tolerate inequality, injustice or discrimination of any kind. These are hugely important issues and a brand with our reach and relevance means we have a very meaningful role to play.

We also recognise our responsibility as a large employer to continue being active in our communities, helping to develop skills and drive aspirations that will help people to be more aware of the world of work and more successful within it, whether with McDonald’s or elsewhere."

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.