×
Register Here to Apply for Jobs or Post Jobs. X

Sr Manager - Vulnerability Management

Job in Chicago, Cook County, Illinois, 60290, USA
Listing for: McDonald's
Full Time position
Listed on 2026-01-04
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below

Job Description

McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3

Ds (Delivery, Digital and Drive Thru). McDonald’s will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive thurs, through McDelivery, dine‑in or takeaway.

McDonald’s Global Technology is here to power tomorrow’s feel‑good moments. That’s why you’ll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae‑dipped fry at a time. Using AI, robotics and emerging tech, we’re digitizing the Golden Arches. Combine that with our unparalleled global scale, and we’re reshaping all areas of the business, industry and every community that is home to a McDonald’s restaurant.

We face complex tech challenges every day, but that’s where our diverse and talented teams come in. They’re made up of the best and brightest from all over the globe, and they thrive in the space where feel‑good meets fast‑paced.

Check out the McDonald’s Global Technology Technical Blog () to learn how technology and our global team are directly enabling the Accelerating the Arches strategy.

Department Overview

McDonald’s Global Cyber Security is looking for a highly motivated, diligent, and skilled candidate to join the Vulnerability Management team. The Lead Analyst - Vulnerability Management is a key member of the team and works with internal and external groups globally to identify and drive remediation of security risks. Develop new Cybersecurity services and improve existing ones to meet growing demand for user, device, network, application, and data protection.

Accountability

& Responsibilities
  • Establish strategic relationships with key McDonald’s stakeholders ensuring vulnerability and threat management principles are incorporated into their processes, applications, and products across the enterprise to develop a culture of security.
  • Support the rapid response of high‑profile vulnerabilities and exposure across the system. Lead the publication advisories providing targeted technical guidance, prioritizing asset lists, and deadlines that are commensurate with the level of risk to the business. Identify mitigating controls where full remediation is not feasible.
  • Oversee vulnerabilities and threats, determine their impact on McDonald’s, collaborate with Threat Intelligence, and coordinate responses based on risk levels.
  • Apply vulnerability assessment tools and process outputs to develop and implement methods for detecting and assessing security weaknesses. Incorporate the use of industry standards and frameworks such as CVSS, EPSS, KEV, CPE & CWE to prioritize remediation activities.
  • Elevate the understanding of key vulnerabilities and their prominent presence throughout the company to effectively convey and encourage the vital steps to address or minimize risk.
  • Develop strategies and tools for producing reports and metrics to automate demonstrating the efficiency and strength of the vulnerability management initiative. This includes using a variety of tools such as Python, Power Shell, Power Automate, SQL, different database technologies, Power BI, Tableau, as well as Service Now or O365 tools.
  • Develop standards, and procedures that support the global vulnerability management program. Lead vulnerability and risk assessments to evaluate severity, exploitability and potential business impact. Collaborate with technical and business stakeholders to validate assessment results, recommend mitigation strategies, and communicate actionable insights.
Qualifications
  • 5+ years of experience in information security technologies and processes, vulnerability management, security operations, security engineering, program development or similar experience. Experience with vulnerability detection and prioritization tools, such…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary