Information Security Manager Green Card Jobs
Information Security Manager roles qualify for EB-2 and EB-3 green card sponsorship through the PERM labor certification process, which requires employers to document recruitment efforts before filing an I-140 petition. Federal contractors, financial institutions, and healthcare systems regularly sponsor this role. Candidates with CISSP credentials or a master's in cybersecurity strengthen their EB-2 eligibility.
See All Information Security Manager JobsOverview
Showing 5 of 29+ Information Security Manager jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 29+ Information Security Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Manager roles.
Get Access To All Jobs
At Beyond Finance, we've made it our mission to help everyday Americans escape the endless cycle of crippling debt and step into a brighter financial future. Through compassionate, individualized care, a culture focused on compliance and ethics, supportive user-centric technology, and customized financial solutions, we've helped over 1 million clients on their path to a brighter future.
While we're proud of what we've already accomplished, we're searching for new collaborators to help us get to the next level! If you're looking to join a forward-thinking, rapidly growing organization with helping people as its number one goal, we want to hear from you.
The Role
As the Information Security Manager, you will lead our security operations function, the team responsible for monitoring the environment, triaging security signals across cloud and endpoints, running the company's Insider Risk program, and owning initial vulnerability triage. You have a demonstrated track record of relentlessly pursuing high security standards and holding your team accountable to them. You will manage analysts who serve as the first line of detection for the security organization, ensuring threats are identified, sized, and routed with the right context and urgency. Your primary objective is to build a disciplined, high-signal operations function that drives down dwell time and keeps the broader security team focused on the most impactful work.
Key Responsibilities
- Security Operations Ownership: Own the day-to-day function of the team — alert triage, signal prioritization, and escalation workflows. Ensure the team operates consistently and with a clear sense of urgency.
- SIEM & Detection Management: Own SIEM operations hands-on — including log source onboarding, pipeline configuration, parsing, detection coverage, rule tuning, and alert fidelity. Ensure the team is operationalizing threat intelligence and not just reacting to whatever fires first.
- Cloud & Endpoint Signal Triage: Oversee triage of security signals sourced from cloud infrastructure, endpoint detection, and network controls. Separate noise from meaningful findings and ensure high-fidelity signals reach the right team with full context.
- Incident Response Ownership: Own the incident response function end-to-end — from initial escalation through containment, cross-functional coordination, and post-incident review. Ensure findings drive detection improvements and close the loop with Security Engineering where remediation is required.
- Insider Risk Program: Lead the Insider Risk process end-to-end — from identifying coverage gaps across cloud and endpoint environments, to behavioral monitoring and DLP signal review, through investigation, escalation, and case closure.
- Vulnerability Triage: Own initial triage and prioritization of vulnerability findings. Size risk, assign severity, and route to Security Engineering with the context needed to make prioritization decisions.
- Team Leadership: Lead and develop a team of security analysts, managing performance and growth while building a culture of rigor and ownership.
- Cross-Functional Partnership: Act as a key interface between the security function and the broader business. Work directly with HR and Legal on Insider Risk cases that require cross-functional handling, and engage with business leadership to communicate risk, provide operational context, and ensure security decisions are grounded in business impact.
Skill Requirements
- 5+ years of hands-on experience in security operations, incident response, or a SOC environment
- Direct people management experience with analysts or security operations staff
- Technical depth in SIEM platforms — log ingestion, pipeline and parsing configuration, detection engineering, and alert tuning
- Demonstrated experience running or contributing to an Insider Risk or DLP investigation program, with the technical understanding to identify coverage gaps across cloud and endpoint environments
- Working knowledge of vulnerability triage and risk prioritization — CVSS, asset context, business impact
- Ability to triage and contextualize signals from cloud infrastructure and endpoint tooling
- Clear communicator who can size and convey risk across technical and non-technical audiences
Desirable Skills
- Experience with cloud-native security tooling and CSPM/CWPP signal interpretation
- Familiarity with phishing triage and email security investigation workflows
- Exposure to threat intelligence operationalization — consuming feeds and translating them into detection coverage
- Experience operating within a multi-team security model with defined handoff processes between operations, engineering, and GRC functions
The Ideal Candidate You run a tight operation and you're still technical enough to get your hands dirty. You've built or managed SOC workflows before and know the difference between a high-fidelity detection program and an alert noise machine. You take Insider Risk seriously — you understand the sensitivity, the cross-functional complexity, and the investigative discipline it requires, and you can look across a cloud and endpoint environment and identify where the coverage gaps actually are. You can stand up a log pipeline, tune a parser, and write a detection — and you can also walk a business leader through what a finding means and why it matters. You communicate clearly, move with urgency, and keep your team sharp on what actually matters.
Why Join Us?
While you make a difference for others, we'll work to make a difference for you, providing an uplifting, collaborative work environment and benefits that reflect your value to us. For eligible full-time employees, we offer:
- Considerable employer contributions for health, dental, and vision programs
- Generous PTO, paid holidays, and paid parental leave
- 401(k) matching program
- Merit advancement opportunities
- Career development & training
And finally, our team spirit and culture! We cultivate an environment of community, connection, and belonging across our entire organization.
Beyond Finance does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies in response to job positions. No fee will be paid to their parties who submit unsolicited candidates directly to Beyond Finance employees or the Beyond Finance HR team. No placement fee will be paid to any third party unless such a request has been made by the Beyond HR team.

At Beyond Finance, we've made it our mission to help everyday Americans escape the endless cycle of crippling debt and step into a brighter financial future. Through compassionate, individualized care, a culture focused on compliance and ethics, supportive user-centric technology, and customized financial solutions, we've helped over 1 million clients on their path to a brighter future.
While we're proud of what we've already accomplished, we're searching for new collaborators to help us get to the next level! If you're looking to join a forward-thinking, rapidly growing organization with helping people as its number one goal, we want to hear from you.
The Role
As the Information Security Manager, you will lead our security operations function, the team responsible for monitoring the environment, triaging security signals across cloud and endpoints, running the company's Insider Risk program, and owning initial vulnerability triage. You have a demonstrated track record of relentlessly pursuing high security standards and holding your team accountable to them. You will manage analysts who serve as the first line of detection for the security organization, ensuring threats are identified, sized, and routed with the right context and urgency. Your primary objective is to build a disciplined, high-signal operations function that drives down dwell time and keeps the broader security team focused on the most impactful work.
Key Responsibilities
- Security Operations Ownership: Own the day-to-day function of the team — alert triage, signal prioritization, and escalation workflows. Ensure the team operates consistently and with a clear sense of urgency.
- SIEM & Detection Management: Own SIEM operations hands-on — including log source onboarding, pipeline configuration, parsing, detection coverage, rule tuning, and alert fidelity. Ensure the team is operationalizing threat intelligence and not just reacting to whatever fires first.
- Cloud & Endpoint Signal Triage: Oversee triage of security signals sourced from cloud infrastructure, endpoint detection, and network controls. Separate noise from meaningful findings and ensure high-fidelity signals reach the right team with full context.
- Incident Response Ownership: Own the incident response function end-to-end — from initial escalation through containment, cross-functional coordination, and post-incident review. Ensure findings drive detection improvements and close the loop with Security Engineering where remediation is required.
- Insider Risk Program: Lead the Insider Risk process end-to-end — from identifying coverage gaps across cloud and endpoint environments, to behavioral monitoring and DLP signal review, through investigation, escalation, and case closure.
- Vulnerability Triage: Own initial triage and prioritization of vulnerability findings. Size risk, assign severity, and route to Security Engineering with the context needed to make prioritization decisions.
- Team Leadership: Lead and develop a team of security analysts, managing performance and growth while building a culture of rigor and ownership.
- Cross-Functional Partnership: Act as a key interface between the security function and the broader business. Work directly with HR and Legal on Insider Risk cases that require cross-functional handling, and engage with business leadership to communicate risk, provide operational context, and ensure security decisions are grounded in business impact.
Skill Requirements
- 5+ years of hands-on experience in security operations, incident response, or a SOC environment
- Direct people management experience with analysts or security operations staff
- Technical depth in SIEM platforms — log ingestion, pipeline and parsing configuration, detection engineering, and alert tuning
- Demonstrated experience running or contributing to an Insider Risk or DLP investigation program, with the technical understanding to identify coverage gaps across cloud and endpoint environments
- Working knowledge of vulnerability triage and risk prioritization — CVSS, asset context, business impact
- Ability to triage and contextualize signals from cloud infrastructure and endpoint tooling
- Clear communicator who can size and convey risk across technical and non-technical audiences
Desirable Skills
- Experience with cloud-native security tooling and CSPM/CWPP signal interpretation
- Familiarity with phishing triage and email security investigation workflows
- Exposure to threat intelligence operationalization — consuming feeds and translating them into detection coverage
- Experience operating within a multi-team security model with defined handoff processes between operations, engineering, and GRC functions
The Ideal Candidate You run a tight operation and you're still technical enough to get your hands dirty. You've built or managed SOC workflows before and know the difference between a high-fidelity detection program and an alert noise machine. You take Insider Risk seriously — you understand the sensitivity, the cross-functional complexity, and the investigative discipline it requires, and you can look across a cloud and endpoint environment and identify where the coverage gaps actually are. You can stand up a log pipeline, tune a parser, and write a detection — and you can also walk a business leader through what a finding means and why it matters. You communicate clearly, move with urgency, and keep your team sharp on what actually matters.
Why Join Us?
While you make a difference for others, we'll work to make a difference for you, providing an uplifting, collaborative work environment and benefits that reflect your value to us. For eligible full-time employees, we offer:
- Considerable employer contributions for health, dental, and vision programs
- Generous PTO, paid holidays, and paid parental leave
- 401(k) matching program
- Merit advancement opportunities
- Career development & training
And finally, our team spirit and culture! We cultivate an environment of community, connection, and belonging across our entire organization.
Beyond Finance does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies in response to job positions. No fee will be paid to their parties who submit unsolicited candidates directly to Beyond Finance employees or the Beyond Finance HR team. No placement fee will be paid to any third party unless such a request has been made by the Beyond HR team.
See all 29+ Information Security Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Manager roles.
Get Access To All JobsTips for Finding Green Card Sponsorship as an Information Security Manager
Document your cybersecurity credentials before applying
PERM requires employers to verify your qualifications match the posted job requirements exactly. Gather transcripts, CISSP or CISM certificates, and employment letters that align your credentials to the specific SOC code employers will use in the labor certification filing.
Target industries with established PERM filing patterns
Federal contractors, defense firms, and regulated financial institutions file PERM petitions routinely for Information Security Manager roles. These employers already have in-house or outside immigration counsel and don't need to build a sponsorship process from scratch for your case.
Search green card sponsoring employers on Migrate Mate
Migrate Mate filters job listings by employers with active green card sponsorship history, letting you focus your search on Information Security Manager openings at organizations that have already navigated PERM and I-140 filings for this role category.
Clarify the EB-2 versus EB-3 path during offer negotiations
Employers can file under either category depending on how they define the role. If the position requires a master's degree or equivalent, push for an EB-2 filing, which can eliminate the need for a PERM audit and may shorten your overall priority date wait.
Verify the prevailing wage before your employer files
DOL requires employers to pay the prevailing wage for the specific work location and job duties. Use the OFLC Wage Search to check the wage level your employer must certify before the PERM application is submitted, so there are no surprises that delay filing.
Understand how PERM recruitment documentation affects your timeline
PERM requires employers to complete mandatory recruitment steps, typically spanning 60 to 90 days, before filing with DOL. If your employer has already run a recent recruitment cycle for this role, that documentation may be reusable and can accelerate the certification timeline.
Information Security Manager jobs are hiring across the US. Find yours.
Find Information Security Manager JobsInformation Security Manager Green Card Sponsorship: Frequently Asked Questions
Does an Information Security Manager role qualify for EB-2 or EB-3 green card sponsorship?
Both categories apply depending on how the employer defines the position. EB-2 applies when the role requires a master's degree or equivalent in a field like cybersecurity, information systems, or computer science. EB-3 covers roles defined at the bachelor's degree level. Employers in regulated industries frequently sponsor at the EB-2 level for senior information security roles because the advanced degree requirement is standard in their job descriptions.
How does PERM green card sponsorship differ from H-1B sponsorship for this role?
H-1B is a temporary work visa subject to an annual lottery with no path to permanent residency on its own. PERM green card sponsorship leads directly to lawful permanent residency through the I-140 and adjustment of status process. There is no annual cap on EB-3 petitions themselves, though per-country limits affect priority date availability for applicants from high-demand countries like India and China. PERM also requires your employer to document that no qualified U.S. worker was available for the role.
Which employers are most likely to sponsor Information Security Manager roles for a green card?
Federal contractors, defense firms, large financial institutions, and healthcare systems sponsor this role most consistently because their compliance frameworks demand experienced security leadership and they maintain ongoing relationships with immigration counsel. Use Migrate Mate to filter job listings by employers with verified green card sponsorship history, so you're targeting organizations that have already filed PERM and I-140 petitions for similar roles.
What documents should I prepare before a PERM-sponsored Information Security Manager application?
Gather your academic transcripts, professional certifications such as CISSP or CISM, and employment verification letters that map your experience to the specific duties in the job description. The PERM filing requires your qualifications to match the posted minimum requirements exactly. Any discrepancy between your credentials and the employer's stated requirements can trigger a DOL audit and delay certification by 12 months or more.
How long does the EB-2 or EB-3 green card process take for an Information Security Manager?
The PERM labor certification stage alone takes six to twelve months under standard DOL processing, not counting any audit. After USCIS approves the I-140 petition, your wait for a visa number depends on your country of birth and the current priority date. Applicants born outside high-demand countries often reach adjustment of status within two to three years total. Indian and Chinese nationals should check the USCIS Visa Bulletin regularly for current priority date movement.
See which Information Security Manager employers are hiring and sponsoring visas right now.
Search Information Security Manager Jobs