Manager, Cybersecurity Operations
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, IT Project Manager, Cloud Computing, IT Support
Job Description:
McDonald’s growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni-channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3
Ds (Delivery, Digital and Drive Thru). McDonald’s will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive thrus, through McDelivery, dine‑in or takeaway.
McDonald’s Global Technology is here to power tomorrow’s feel‑good moments.
That’s why you’ll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae‑dipped fry at a time. Using AI, robotics and emerging tech, we’re digitizing the Golden Arches. Combine that with our unparalleled global scale, and we’re reshaping all areas of the business, industry and every community that is home to a McDonald’s restaurant.
We face complex tech challenges every day. But that’s where our diverse and talented teams come in. They’re made up of the best and brightest from all over the globe, and they thrive in the space where feel‑good meets fast‑paced.
Check out the McDonald’s Global Technology Technical Blog () to learn how technology and our global team are directly enabling the Accelerating the Arches strategy.
Department OverviewAs a Manager for our Privileged Access Engineering team, you will lead enterprise PAM initiatives with a focus on Beyond Trust while managing a small team of engineers. This role combines hands‑on technical leadership (80%) with managerial responsibilities (20%), partnering with product, operations, and vendors to deliver secure privileged access solutions across on‑prem and cloud environments.
ResponsibilitiesServe as the principal engineer for deployments of Beyond Trust (e.g., Password Safe, Privilege Management for Global rollout). Integrate PAM with AD/Entra , AWS/Azure/GCP IAM, ticketing/ITSM, SIEM/SOAR, and Dev Ops tool chains (CI/CD).
Harden configurations, build policies, onboard applications and service accounts, and enable session proxying/recording and alerting. Automate onboarding, rotation, and access workflows using Power Shell/Python, REST APIs, and infrastructure-as-code (e.g., Terraform/Ansible).
Build pipelines for configuration promotion, testing, and drift management; contribute to reusable modules and runbooks.
Provide engineering support for PAM platforms; lead root cause analysis, tuning, and resilience improvements. Create operational artifacts (KBs, runbooks, SOPs) and ensure successful handoff to operations teams and technical SMEs.
Drive reduction of technical debt and legacy artifacts; maintain platform health and governance dashboards. Lead technical efforts to enhance privileged access experiences, reduce friction for developers/administrators, and improve coverage/gaps (e.g., endpoints, cloud workloads, containers/Kubernetes).
Measure and improve delivery speed, quality, value, and innovation through data‑driven KPIs.
Work within Agile frameworks (Scrum/Kanban) to deliver PAM features and enhancements in sprints.
Collaborate with product owners and stakeholders to refine user stories and acceptance criteria for PAM initiatives.
Lead and develop engineering team; conduct performance reviews and career planning.
Oversee vendor‑led implementations, including SOWs, acceptance criteria, UAT, and cutovers.
Align PAM roadmap with business objectives; manage budget and compliance requirements.
Drive change management, training, and adoption across the organization.
10–15 years total IT/security experience, including 6‑8 years focused on enterprise PAM/EPM engineering.
Hands‑on implementation experience with PAM tools like Beyond Trust, Cyber Ark etc.
Strong knowledge of PAM concepts and protocols: least privilege, session management, credential vaulting/rotation, service account governance ETC.
Technical depth across Windows/Linux/Unix, Active Directory/Entra , networking, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).