E-3 Visa Information Security Analyst Jobs
Information Security Analyst roles qualify as E-3 specialty occupations, making U.S. employer sponsorship straightforward for Australian nationals. The E-3 visa has no lottery, renews in two-year increments indefinitely, and your degree in cybersecurity, computer science, or information systems directly supports the petition.
See All Information Security Analyst JobsOverview
Showing 5 of 13+ Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 13+ Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Analyst roles.
Get Access To All Jobs
Company Description
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Job Description
Position Details:
Job Title – Information Security Analyst
Duration – 3 Months (with a possibility of an extension)
Location – Eagan, MN - 55123
Qualifications
Primary Objective
Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise.
Knowledge, Skills & Behaviors
- 2+ years related information security risk management experience
- 3+ years related information technology experience
- Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL
- Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC
- Demonstrate results in planning and delivering complex projects on time
- Maintain focus and manage multiple efforts concurrently
- Perform independently to expectations while being collaborative and maintaining alignment with the team
- Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership
- Strong written and verbal communication skills to include executive audiences
- Apply tactical and strategic methods appropriately
- Effective negotiation and influence
- Focused on supporting the customer, the team, and the business
- Strong collaboration and problem-solving skills
Major Areas of Accountability
- Operate as a key contributor to the Vendor Risk Management processes.
- Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise.
- Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations.
- Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress.
- Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned.
- Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership.
- Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices.
- Participate as a member of a team for Vendor Risk Management
- Contribute to and achieve business and departmental goals and objectives
- Deliver processes and services consistently and accurately
- Accept feedback and flex to address tactical needs
- Report on status of initiatives to all levels in the organization
- Work across the organization to contribute to departmental initiatives and programs
Education
Prefer 4 year (Bachelor’s) Degree in a technology related field
If you are interested please contact NEHA KALIA (Technical Recruiter) at 973-929-6883 and email an updated copy of your resume (preferably WORD format) to neha.kalia[at]collabera.com
Additional Information
If you are interested please contact NEHA KALIA (Technical Recruiter) at 973-929-6883 and email an updated copy of your resume (preferably WORD format) to neha.kalia[at]collabera.com

Company Description
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Job Description
Position Details:
Job Title – Information Security Analyst
Duration – 3 Months (with a possibility of an extension)
Location – Eagan, MN - 55123
Qualifications
Primary Objective
Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise.
Knowledge, Skills & Behaviors
- 2+ years related information security risk management experience
- 3+ years related information technology experience
- Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL
- Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC
- Demonstrate results in planning and delivering complex projects on time
- Maintain focus and manage multiple efforts concurrently
- Perform independently to expectations while being collaborative and maintaining alignment with the team
- Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership
- Strong written and verbal communication skills to include executive audiences
- Apply tactical and strategic methods appropriately
- Effective negotiation and influence
- Focused on supporting the customer, the team, and the business
- Strong collaboration and problem-solving skills
Major Areas of Accountability
- Operate as a key contributor to the Vendor Risk Management processes.
- Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise.
- Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations.
- Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress.
- Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned.
- Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership.
- Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices.
- Participate as a member of a team for Vendor Risk Management
- Contribute to and achieve business and departmental goals and objectives
- Deliver processes and services consistently and accurately
- Accept feedback and flex to address tactical needs
- Report on status of initiatives to all levels in the organization
- Work across the organization to contribute to departmental initiatives and programs
Education
Prefer 4 year (Bachelor’s) Degree in a technology related field
If you are interested please contact NEHA KALIA (Technical Recruiter) at 973-929-6883 and email an updated copy of your resume (preferably WORD format) to neha.kalia[at]collabera.com
Additional Information
If you are interested please contact NEHA KALIA (Technical Recruiter) at 973-929-6883 and email an updated copy of your resume (preferably WORD format) to neha.kalia[at]collabera.com
See all 13+ Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Analyst roles.
Get Access To All JobsTips for Finding E-3 Visa Sponsorship as an Information Security Analyst
Align your credentials to U.S. specialty occupation standards
Your Australian degree in cybersecurity, IT, or computer science must map directly to the analyst role. If your title is broad, gather documentation showing the technical depth of your work to support the specialty occupation requirement.
Target employers with active federal contractor requirements
U.S. federal contractors and financial institutions are legally required to maintain security functions, which makes them recurring sponsors. These organizations file LCAs regularly and are familiar with E-3 paperwork, reducing internal friction during your offer stage.
Get your CISA or CISSP credential before applying
Australian applicants without a four-year degree can offset the gap using U.S.-recognized certifications. A current CISA or CISSP strengthens the specialty occupation argument with DOL and the consular officer reviewing your application.
Clarify E-3 timing requirements when negotiating your offer
Unlike H-1B, the E-3 requires consular processing in Australia before your start date. Build at least six to eight weeks into your start date negotiation so your employer files the LCA and you attend your consulate appointment without pressure.
Use Migrate Mate's E-3 filing service to streamline your LCA
The Labor Condition Application is filed by your employer before you can apply at the consulate. Use Migrate Mate's E-3 filing service to handle your LCA and visa paperwork so your employer doesn't stall at the step most unfamiliar to U.S. HR teams.
Verify your employer's E-Verify enrollment before accepting
E-3 employers are not legally required to use E-Verify unless they are federal contractors, but enrollment signals familiarity with employment authorization processes. Confirm your hiring manager has completed I-9 verification for international hires before you resign your current role.
Information Security Analyst jobs are hiring across the US. Find yours.
Find Information Security Analyst JobsInformation Security Analyst E-3 Visa: Frequently Asked Questions
How do I find Information Security Analyst jobs that offer E-3 visa sponsorship?
Search Migrate Mate to filter Information Security Analyst roles by employers who have sponsored E-3 or work visa petitions. Most general job boards don't filter by sponsorship history, so you waste time applying to roles where the hiring team will decline at the offer stage once visa requirements come up.
How much does it cost to get an E-3 visa?
Migrate Mate's E-3 filing service covers the entire process for $499, including the Labor Condition Application, visa document preparation, and consulate appointment guidance. Traditional immigration lawyers charge $2,000–$5,000+ for the same work. The E-3 has less paperwork than most work visas, so paying thousands for legal help is usually unnecessary.
Does an Information Security Analyst role qualify as a specialty occupation for the E-3?
Yes. Information Security Analyst is classified under SOC code 15-1212, and DOL recognizes it as a specialty occupation requiring at least a bachelor's degree in cybersecurity, computer science, information systems, or a related technical field. Your degree field must align with the duties in the job description, not just the title.
How does the E-3 compare to the H-1B for Information Security Analyst roles?
The E-3 is available only to Australian citizens, but it has significant structural advantages over the H-1B. There's no annual lottery, no cap that runs out mid-year, and no waiting period to reapply. You can start a new E-3 petition with a new employer without being locked into a cap year, which matters if you change roles after your first year.
Can I switch Information Security Analyst employers while on an E-3?
Yes, but your new employer must file a fresh LCA with DOL and you'll need to attend a new consulate appointment to get a new E-3 visa stamp before re-entering the U.S. There's no portability rule like H-1B. Plan for a trip to Australia between roles if your current visa stamp has expired or is tied to your previous employer.
See which Information Security Analyst employers are hiring and sponsoring visas right now.
Search Information Security Analyst Jobs