E-3 Visa Information Systems Security Officer Jobs
Information Systems Security Officer roles qualify for E-3 visa sponsorship as specialty occupations requiring a bachelor's degree in cybersecurity, information technology, or a related field. The E-3 has no lottery and no annual cap, giving Australian professionals a direct path to U.S. federal contractor and private sector security positions.
See All Information Systems Security Officer JobsOverview
Showing 5 of 6+ Information Systems Security Officer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 6+ Information Systems Security Officer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Systems Security Officer roles.
Get Access To All Jobs
Job Posting Title: Alternate Information Systems Security Manager (AISSM)/Assistant Contractor Special Security Officer (ACSSO) Special Programs
Hiring Department: Applied Research Laboratories
Position Open To: All Applicants
Weekly Scheduled Hours: 40
FLSA Status: Exempt
Earliest Start Date: Immediately
Position Duration: Expected to Continue
Location: Washington
Job Details:
General Notes
Please note: This position is located in Silverdale, Washington with travel to ARL as needed (estimated to be 10-15% of the time). An agency designated by the federal government handles the investigation as to the requirement for eligibility for access to classified information. Factors considered during this investigation include but are not limited to allegiance to the United States, foreign influence, foreign preference, criminal conduct, security violations, drug involvement, the likelihood of continuation of such conduct, etc. Please mark "yes" on the application question that asks if additional materials are required. Failure to attach all additional materials listed below may result in a delay in application processing. Employment will be contingent on selected applicant submitting application for access and receiving notification of eligibility within a time period to be specified in the job offer. If eligibility is confirmed within the specified period, employment must begin within 30 days of confirmation of eligibility. Eligibility for access to all levels of classified information authorized by the project sponsor(s) must continue without interruption during employment, including the successful completion of a security polygraph examination(s), as required by the sponsor.
Purpose:
Alternate Information Systems Security Manager (AISSM) for Special Programs information system security programs. Assists the ISSM in managing and overseeing all development, authorization and compliance measures associated with ARL classified IS. Assists the Contractor Special Security Officer (CSSO) in maintenance of security standards and compliance of requirements set forth in the National Industrial Security Program Operating Manual (NISPOM), Intelligence Community Directives and DoD security manual.
Responsibilities
- Assist the Special Programs ISSM in providing technical planning, expertise, oversight and daily administration of security actions for classified information systems ranging in a wide degree of complexity, and works directly with information system sponsors and sponsor ISSMs to meet Federal requirements under the Risk Management Framework (RMF) and to maintain system authorizations.
- Responsible for conducting self-inspections of information system Continuous Monitoring compliance along with the verification of the duties performed by Information System Security Officers (ISSOs). Review and inspect the professional auditing of Special Programs classified Information Systems at the Applied Research Laboratories: University of Texas at Austin (ARL: UT), conducted by ISSOs, in order to maintain compliance with the sponsor assessment and Joint Special Access Program (SAP) Implementation Guide (JSIG).
- Prepares documents, IS configuration validation, verification/testing hardware/software change management, media protection and file transfers. Develops, maintains, and updates Plan of Action and Milestones (POA&M) documents necessary for tracking IS security requirements to achieve and maintain system authorizations.
- Responsible for managing user IS access and use compliance in accordance with applicable directives. Ensures all training requirements are met for personnel who utilize secure information systems.
- Responsible for assisting the Special Programs ISSM in ensuring security standards, policies, and practices are being followed, and closely coordinates with and provides training and guidance to others, on ensuring and maintaining the security posture of all information systems as well as implementing security control requirements.
- Performs administrative function needed for the maintenance of the CSSO’s portfolio, including: conducting self-inspections, initiating and tracking security administrative requirements as required by government regulations, administering and tracking compliant security education and associated record keeping.
- Assists the CSSO in performing information security administrative tasks, including: document control, visitor and meeting control, security log maintenance and file retention.
- Assists the CSSO in performing personnel security administrative tasks, including: coordination and submission of program access requests, maintenance of personnel files, required reporting to the cognizant security agencies and access roster maintenance.
- Other related functions as assigned.
Required Qualifications
- HS/GED.
- Nine years providing security support in a classified Department of Defense (DOD), special access (SAP), and/or sensitive compartmented information (SCI) environment.
- Strong communication skills, critical thinking, problem solving skills; self-motivated with ability to effectively prioritize multiple projects; ability to work with people in a team environment.
Preferred Qualifications
- Bachelor's Degree: Computer Science, Information Systems Management, or related field.
- More than nine years of experience providing security support in special access and/or sensitive compartmented information environments.
- Two to four years in an assistant role to a Facility Security Officer, CPSO or CSSO.
- Eligibility for immediate access to classified information at the level appropriate to the project requirements of the position.
- Knowledge of Special Access and Sensitive Compartmented Information programs and government regulations.
Salary Range
$83,000 - $124,800+/negotiable depending on qualifications
Working Conditions
- Standard office conditions
- Repetitive use of a keyboard at a workstation
- Use of manual dexterity
- Some weekend, evening and holiday work
Required Materials
- Resume/CV
- 3 work references with their contact information; at least one reference should be from a supervisor
- Letter of interest
Important
for applicants who are NOT current university employees or contingent workers: You will be prompted to submit your resume the first time you apply, then you will be provided an option to upload a new Resume for subsequent applications. Any additional Required Materials (letter of interest, references, etc.) will be uploaded in the Application Questions section; you will be able to multi-select additional files. Before submitting your online job application, ensure that ALL Required Materials have been uploaded. Once your job application has been submitted, you cannot make changes.
Important for Current university employees and contingent workers: As a current university employee or contingent worker, you MUST apply within Workday by searching for Find UT Jobs. If you are a current University employee, log-in to Workday, navigate to your Worker Profile, click the Career link in the left hand navigation menu and then update the sections in your Professional Profile before you apply. This information will be pulled in to your application. The application is one page and you will be prompted to upload your resume. In addition, you must respond to the application questions presented to upload any additional Required Materials (letter of interest, references, etc.) that were noted above.
Employment Eligibility:
Regular staff who have been employed in their current position for the last six continuous months are eligible for openings being recruited for through University-Wide or Open Recruiting, to include both promotional opportunities and lateral transfers. Staff who are promotion/transfer eligible may apply for positions without supervisor approval.
Retirement Plan Eligibility:
The retirement plan for this position is Teacher Retirement System of Texas (TRS), subject to the position being at least 20 hours per week and at least 135 days in length.
Background Checks:
A criminal history background check will be required for finalist(s) under consideration for this position.
Equal Opportunity Employer:
The University of Texas at Austin, as an equal opportunity/affirmative action employer, complies with all applicable federal and state laws regarding nondiscrimination and affirmative action. The University is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, or veteran status in employment, educational programs and activities, and admissions.
Pay Transparency:
The University of Texas at Austin will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information.
Employment Eligibility Verification:
If hired, you will be required to complete the federal Employment Eligibility Verification I-9 form. You will be required to present acceptable and original documents to prove your identity and authorization to work in the United States. Documents need to be presented no later than the third day of employment. Failure to do so will result in loss of employment at the university.
- E-Verify: The University of Texas at Austin use E-Verify to check the work authorization of all new hires effective May 2015. The university’s company ID number for purposes of E-Verify is 854197. For more information about E-Verify, please see the following:
- E-Verify Poster (English and Spanish) [PDF]
- Right to Work Poster (English) [PDF]
-
Right to Work Poster (Spanish) [PDF]
-
Compliance: Employees may be required to report violations of law under Title IX and the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act (Clery Act). If this position is identified a Campus Security Authority (Clery Act), you will be notified and provided resources for reporting. Responsible employees under Title IX are defined and outlined in HOP-3031. The Clery Act requires all prospective employees be notified of the availability of the Annual Security and Fire Safety report. You may access the most recent report here or obtain a copy at University Compliance Services, 1616 Guadalupe Street, UTA 2.206, Austin, Texas 78701.

Job Posting Title: Alternate Information Systems Security Manager (AISSM)/Assistant Contractor Special Security Officer (ACSSO) Special Programs
Hiring Department: Applied Research Laboratories
Position Open To: All Applicants
Weekly Scheduled Hours: 40
FLSA Status: Exempt
Earliest Start Date: Immediately
Position Duration: Expected to Continue
Location: Washington
Job Details:
General Notes
Please note: This position is located in Silverdale, Washington with travel to ARL as needed (estimated to be 10-15% of the time). An agency designated by the federal government handles the investigation as to the requirement for eligibility for access to classified information. Factors considered during this investigation include but are not limited to allegiance to the United States, foreign influence, foreign preference, criminal conduct, security violations, drug involvement, the likelihood of continuation of such conduct, etc. Please mark "yes" on the application question that asks if additional materials are required. Failure to attach all additional materials listed below may result in a delay in application processing. Employment will be contingent on selected applicant submitting application for access and receiving notification of eligibility within a time period to be specified in the job offer. If eligibility is confirmed within the specified period, employment must begin within 30 days of confirmation of eligibility. Eligibility for access to all levels of classified information authorized by the project sponsor(s) must continue without interruption during employment, including the successful completion of a security polygraph examination(s), as required by the sponsor.
Purpose:
Alternate Information Systems Security Manager (AISSM) for Special Programs information system security programs. Assists the ISSM in managing and overseeing all development, authorization and compliance measures associated with ARL classified IS. Assists the Contractor Special Security Officer (CSSO) in maintenance of security standards and compliance of requirements set forth in the National Industrial Security Program Operating Manual (NISPOM), Intelligence Community Directives and DoD security manual.
Responsibilities
- Assist the Special Programs ISSM in providing technical planning, expertise, oversight and daily administration of security actions for classified information systems ranging in a wide degree of complexity, and works directly with information system sponsors and sponsor ISSMs to meet Federal requirements under the Risk Management Framework (RMF) and to maintain system authorizations.
- Responsible for conducting self-inspections of information system Continuous Monitoring compliance along with the verification of the duties performed by Information System Security Officers (ISSOs). Review and inspect the professional auditing of Special Programs classified Information Systems at the Applied Research Laboratories: University of Texas at Austin (ARL: UT), conducted by ISSOs, in order to maintain compliance with the sponsor assessment and Joint Special Access Program (SAP) Implementation Guide (JSIG).
- Prepares documents, IS configuration validation, verification/testing hardware/software change management, media protection and file transfers. Develops, maintains, and updates Plan of Action and Milestones (POA&M) documents necessary for tracking IS security requirements to achieve and maintain system authorizations.
- Responsible for managing user IS access and use compliance in accordance with applicable directives. Ensures all training requirements are met for personnel who utilize secure information systems.
- Responsible for assisting the Special Programs ISSM in ensuring security standards, policies, and practices are being followed, and closely coordinates with and provides training and guidance to others, on ensuring and maintaining the security posture of all information systems as well as implementing security control requirements.
- Performs administrative function needed for the maintenance of the CSSO’s portfolio, including: conducting self-inspections, initiating and tracking security administrative requirements as required by government regulations, administering and tracking compliant security education and associated record keeping.
- Assists the CSSO in performing information security administrative tasks, including: document control, visitor and meeting control, security log maintenance and file retention.
- Assists the CSSO in performing personnel security administrative tasks, including: coordination and submission of program access requests, maintenance of personnel files, required reporting to the cognizant security agencies and access roster maintenance.
- Other related functions as assigned.
Required Qualifications
- HS/GED.
- Nine years providing security support in a classified Department of Defense (DOD), special access (SAP), and/or sensitive compartmented information (SCI) environment.
- Strong communication skills, critical thinking, problem solving skills; self-motivated with ability to effectively prioritize multiple projects; ability to work with people in a team environment.
Preferred Qualifications
- Bachelor's Degree: Computer Science, Information Systems Management, or related field.
- More than nine years of experience providing security support in special access and/or sensitive compartmented information environments.
- Two to four years in an assistant role to a Facility Security Officer, CPSO or CSSO.
- Eligibility for immediate access to classified information at the level appropriate to the project requirements of the position.
- Knowledge of Special Access and Sensitive Compartmented Information programs and government regulations.
Salary Range
$83,000 - $124,800+/negotiable depending on qualifications
Working Conditions
- Standard office conditions
- Repetitive use of a keyboard at a workstation
- Use of manual dexterity
- Some weekend, evening and holiday work
Required Materials
- Resume/CV
- 3 work references with their contact information; at least one reference should be from a supervisor
- Letter of interest
Important
for applicants who are NOT current university employees or contingent workers: You will be prompted to submit your resume the first time you apply, then you will be provided an option to upload a new Resume for subsequent applications. Any additional Required Materials (letter of interest, references, etc.) will be uploaded in the Application Questions section; you will be able to multi-select additional files. Before submitting your online job application, ensure that ALL Required Materials have been uploaded. Once your job application has been submitted, you cannot make changes.
Important for Current university employees and contingent workers: As a current university employee or contingent worker, you MUST apply within Workday by searching for Find UT Jobs. If you are a current University employee, log-in to Workday, navigate to your Worker Profile, click the Career link in the left hand navigation menu and then update the sections in your Professional Profile before you apply. This information will be pulled in to your application. The application is one page and you will be prompted to upload your resume. In addition, you must respond to the application questions presented to upload any additional Required Materials (letter of interest, references, etc.) that were noted above.
Employment Eligibility:
Regular staff who have been employed in their current position for the last six continuous months are eligible for openings being recruited for through University-Wide or Open Recruiting, to include both promotional opportunities and lateral transfers. Staff who are promotion/transfer eligible may apply for positions without supervisor approval.
Retirement Plan Eligibility:
The retirement plan for this position is Teacher Retirement System of Texas (TRS), subject to the position being at least 20 hours per week and at least 135 days in length.
Background Checks:
A criminal history background check will be required for finalist(s) under consideration for this position.
Equal Opportunity Employer:
The University of Texas at Austin, as an equal opportunity/affirmative action employer, complies with all applicable federal and state laws regarding nondiscrimination and affirmative action. The University is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, or veteran status in employment, educational programs and activities, and admissions.
Pay Transparency:
The University of Texas at Austin will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information.
Employment Eligibility Verification:
If hired, you will be required to complete the federal Employment Eligibility Verification I-9 form. You will be required to present acceptable and original documents to prove your identity and authorization to work in the United States. Documents need to be presented no later than the third day of employment. Failure to do so will result in loss of employment at the university.
- E-Verify: The University of Texas at Austin use E-Verify to check the work authorization of all new hires effective May 2015. The university’s company ID number for purposes of E-Verify is 854197. For more information about E-Verify, please see the following:
- E-Verify Poster (English and Spanish) [PDF]
- Right to Work Poster (English) [PDF]
-
Right to Work Poster (Spanish) [PDF]
-
Compliance: Employees may be required to report violations of law under Title IX and the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act (Clery Act). If this position is identified a Campus Security Authority (Clery Act), you will be notified and provided resources for reporting. Responsible employees under Title IX are defined and outlined in HOP-3031. The Clery Act requires all prospective employees be notified of the availability of the Annual Security and Fire Safety report. You may access the most recent report here or obtain a copy at University Compliance Services, 1616 Guadalupe Street, UTA 2.206, Austin, Texas 78701.
See all 6+ Information Systems Security Officer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Systems Security Officer roles.
Get Access To All JobsTips for Finding E-3 Visa Sponsorship as an Information Systems Security Officer
Align your credentials to U.S. clearance requirements
Australian security clearances don't transfer automatically to U.S. roles. Identify which of your certifications (CISSP, CISM, or Security+) are recognized by U.S. federal contractors, and document your clearance history in a format U.S. hiring managers can verify.
Target federal contractors over direct government agencies
U.S. federal agencies can't sponsor E-3 visas, but defense and intelligence contractors like Booz Allen, Leidos, and SAIC routinely file LCAs for ISSO roles. Filter your search to contractor employers with active DOL Labor Condition Application histories in the cybersecurity job category.
Use Migrate Mate to find E-3 sponsoring employers
ISSO positions are common in federal contracting but sponsorship history varies widely by employer. Use Migrate Mate to search for companies with active E-3 visa sponsorship records specifically for information security roles, so you're applying where the path is already established.
Get your LCA certified before your start date
Your employer must file and receive DOL certification of the Labor Condition Application before you can attend your consular interview. Build at least three weeks into your offer timeline for LCA processing, and confirm your employer has done this before booking your appointment.
Clarify clearance eligibility with your employer upfront
Some ISSO roles require a U.S. security clearance that E-3 holders can't hold as non-immigrants. Ask explicitly during the offer stage whether the position requires a clearance or just access to cleared environments, since these have different sponsorship implications.
Let Migrate Mate's E-3 filing service handle your paperwork
ISSO roles often involve complex job description language that must match the DOL specialty occupation standard. Migrate Mate's E-3 filing service manages your LCA filing, DS-160, and consulate preparation end-to-end, reducing the risk of a documentation mismatch at the interview stage.
Information Systems Security Officer jobs are hiring across the US. Find yours.
Find Information Systems Security Officer JobsInformation Systems Security Officer E-3 Visa: Frequently Asked Questions
How do I find Information Systems Security Officer jobs that offer E-3 visa sponsorship?
Search on Migrate Mate, which filters roles by confirmed E-3 sponsorship history so you're not guessing which employers will file. ISSO positions are concentrated in federal contracting, defense, finance, and healthcare IT. Targeting employers with existing DOL Labor Condition Application filings for security roles significantly shortens your job search.
How much does it cost to get an E-3 visa?
Migrate Mate's E-3 filing service covers the entire process for $499, including the Labor Condition Application, visa document preparation, and consulate appointment guidance. Traditional immigration lawyers charge $2,000–$5,000+ for the same work. The E-3 has less paperwork than most work visas, so paying thousands for legal help is usually unnecessary.
Does an Information Systems Security Officer role qualify as a specialty occupation for the E-3?
Yes, ISSO roles qualify when the position requires at minimum a bachelor's degree in cybersecurity, information systems, or a directly related field. The key is that the degree requirement must be a genuine prerequisite for the role, not just a preference. Roles that accept any bachelor's degree, regardless of field, can face specialty occupation challenges at the consular interview.
How does the E-3 compare to the H-1B for Information Systems Security Officer roles?
The E-3 has no lottery and no annual cap, so your employer can file at any time and you can start work once your visa is approved, typically within weeks of your interview. The H-1B requires entering a lottery in March with an October 1 start date. For ISSO roles, the E-3 is a faster, more predictable path for Australian nationals.
Can I work on a U.S. security clearance while on an E-3 visa?
E-3 holders are non-immigrants, and most U.S. security clearances require either U.S. citizenship or permanent residency. Some ISSO roles require only access to cleared facilities or working alongside cleared personnel, which may be feasible on an E-3. Confirm the specific clearance requirement with your employer before accepting an offer, since this directly affects whether the role is viable for you.
See which Information Systems Security Officer employers are hiring and sponsoring visas right now.
Search Information Systems Security Officer Jobs