Security Operations Engineer Green Card Jobs
Security Operations Engineer roles qualify for employment-based green card sponsorship under EB-2 or EB-3, depending on your degree and experience level. Employers file PERM labor certification with DOL before petitioning USCIS, permanently sponsoring you rather than renewing temporary status. Priority dates and per-country backlogs vary, so starting early matters.
See All Security Operations Engineer JobsOverview
Showing 5 of 406+ Security Operations Engineer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 406+ Security Operations Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Operations Engineer roles.
Get Access To All Jobs
Job Summary
The Senior Security Operations Engineer is a highly experienced hands-on individual contributor responsible for executing and continuously improving core cybersecurity operations. This role focuses on technical depth, operational excellence, and consistent execution across vulnerability management, endpoint protection, incident investigation, and security process maturity.
Job Description
LOCATION
Mountain America Center - Hybrid:
9800 S Monroe St
Sandy, UT 84070
SCHEDULE
Full Time
This role is not a security architecture or platform‑engineering role. It focuses on hands‑on security operations, investigation, and operating established controls rather than designing or building them.
As a Security Operations Engineer, you are a key contributor to the day‑to‑day defense and reliability of our cybersecurity program. This is a hands‑on security operations role focused on monitoring, investigation, vulnerability execution, and consistent operation of established security controls.
You’ll work within defined frameworks and procedures while collaborating closely with Cybersecurity Engineering, Architecture, and Incident Response. This role is ideal for engineers who enjoy operational security work, real‑world investigations, and steadily improving how security is executed every day.
What You’ll Do
To be successful in this role, you will:
- Monitor, triage, and investigate security alerts across endpoint, network, cloud, and SaaS environments to support timely detection and response.
- Participate in on‑call and escalation rotations to ensure continuous operational security coverage.
- Execute day‑to‑day vulnerability management activities, including scanning, validation, risk analysis, and remediation tracking.
- Help tune detections and operational policies to improve signal quality, reduce false positives, and increase efficiency within existing security tooling.
- Support the operational implementation and monitoring of data classification, data loss prevention (DLP), and data protection controls.
- Investigate and respond to data protection alerts and events, escalating as appropriate.
- Develop and maintain security operations documentation, including runbooks, procedures, and standards that enable consistent execution.
- Participate in change management processes, reviewing proposed changes to security controls for operational impact and adherence to standards.
- Collaborate with Cybersecurity Engineering, Architecture, and Incident Response by providing operational feedback on tooling effectiveness, detections, and control performance.
- Support audits, assessments, and regulatory activities by producing operational evidence and providing technical input.
- Stay current on emerging threats, vulnerabilities, and industry best practices, applying relevant insights to daily security operations.
Knowledge, Skills & Abilities
The qualifications below represent the knowledge, skills, and abilities required to perform the role effectively.
Experience
- 3+ years of progressive experience in cybersecurity operations or a closely related technical security role.
- Hands‑on experience supporting vulnerability management programs.
- Experience working with endpoint security platforms (AV, EDR, XDR).
- Foundational knowledge of data classification, DLP, and data protection concepts.
- Strong analytical and troubleshooting skills, with the ability to evaluate risk and prioritize response actions.
- Ability to produce clear, accurate operational documentation to support incidents, audits, and internal processes.
- Ability to work independently with minimal supervision while collaborating effectively across teams.
- Strong organizational and time‑management skills in a fast‑paced operational environment.
- Adaptable, curious, and motivated to continuously learn and grow technical security skills.
Education & Experience
- Bachelor’s degree in Information Security, Computer Science, or equivalent practical experience.
Certifications (Preferred)
- Security+, CySA+, Security X, GCIH, GCED, GCIA, CISSP, or equivalent certifications.
Role Expectations & Growth
- This is an individual contributor role focused on operational execution and technical development.
- Success in this role comes from reliable execution, sound judgment, and continuous improvement, with opportunities to grow deeper expertise in investigations, detection tuning, and vulnerability operations.
PHYSICAL ABILITIES / WORKING CONDITIONS
- Physical Demands
- Ability to sit, talk and hear consistently
- Ability to lift up to 10 pounds frequently and up to 25 pounds occasionally.
- Environmental
- There are no unusual environmental factors. Work is conducted in a typical office setting with moderate noise.
This Job is not eligible to be performed in Colorado or Connecticut, either remotely or in-person.
Mountain America Credit Union is an EEO/AA/ADA/Veterans employer.

Job Summary
The Senior Security Operations Engineer is a highly experienced hands-on individual contributor responsible for executing and continuously improving core cybersecurity operations. This role focuses on technical depth, operational excellence, and consistent execution across vulnerability management, endpoint protection, incident investigation, and security process maturity.
Job Description
LOCATION
Mountain America Center - Hybrid:
9800 S Monroe St
Sandy, UT 84070
SCHEDULE
Full Time
This role is not a security architecture or platform‑engineering role. It focuses on hands‑on security operations, investigation, and operating established controls rather than designing or building them.
As a Security Operations Engineer, you are a key contributor to the day‑to‑day defense and reliability of our cybersecurity program. This is a hands‑on security operations role focused on monitoring, investigation, vulnerability execution, and consistent operation of established security controls.
You’ll work within defined frameworks and procedures while collaborating closely with Cybersecurity Engineering, Architecture, and Incident Response. This role is ideal for engineers who enjoy operational security work, real‑world investigations, and steadily improving how security is executed every day.
What You’ll Do
To be successful in this role, you will:
- Monitor, triage, and investigate security alerts across endpoint, network, cloud, and SaaS environments to support timely detection and response.
- Participate in on‑call and escalation rotations to ensure continuous operational security coverage.
- Execute day‑to‑day vulnerability management activities, including scanning, validation, risk analysis, and remediation tracking.
- Help tune detections and operational policies to improve signal quality, reduce false positives, and increase efficiency within existing security tooling.
- Support the operational implementation and monitoring of data classification, data loss prevention (DLP), and data protection controls.
- Investigate and respond to data protection alerts and events, escalating as appropriate.
- Develop and maintain security operations documentation, including runbooks, procedures, and standards that enable consistent execution.
- Participate in change management processes, reviewing proposed changes to security controls for operational impact and adherence to standards.
- Collaborate with Cybersecurity Engineering, Architecture, and Incident Response by providing operational feedback on tooling effectiveness, detections, and control performance.
- Support audits, assessments, and regulatory activities by producing operational evidence and providing technical input.
- Stay current on emerging threats, vulnerabilities, and industry best practices, applying relevant insights to daily security operations.
Knowledge, Skills & Abilities
The qualifications below represent the knowledge, skills, and abilities required to perform the role effectively.
Experience
- 3+ years of progressive experience in cybersecurity operations or a closely related technical security role.
- Hands‑on experience supporting vulnerability management programs.
- Experience working with endpoint security platforms (AV, EDR, XDR).
- Foundational knowledge of data classification, DLP, and data protection concepts.
- Strong analytical and troubleshooting skills, with the ability to evaluate risk and prioritize response actions.
- Ability to produce clear, accurate operational documentation to support incidents, audits, and internal processes.
- Ability to work independently with minimal supervision while collaborating effectively across teams.
- Strong organizational and time‑management skills in a fast‑paced operational environment.
- Adaptable, curious, and motivated to continuously learn and grow technical security skills.
Education & Experience
- Bachelor’s degree in Information Security, Computer Science, or equivalent practical experience.
Certifications (Preferred)
- Security+, CySA+, Security X, GCIH, GCED, GCIA, CISSP, or equivalent certifications.
Role Expectations & Growth
- This is an individual contributor role focused on operational execution and technical development.
- Success in this role comes from reliable execution, sound judgment, and continuous improvement, with opportunities to grow deeper expertise in investigations, detection tuning, and vulnerability operations.
PHYSICAL ABILITIES / WORKING CONDITIONS
- Physical Demands
- Ability to sit, talk and hear consistently
- Ability to lift up to 10 pounds frequently and up to 25 pounds occasionally.
- Environmental
- There are no unusual environmental factors. Work is conducted in a typical office setting with moderate noise.
This Job is not eligible to be performed in Colorado or Connecticut, either remotely or in-person.
Mountain America Credit Union is an EEO/AA/ADA/Veterans employer.
See all 406+ Security Operations Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Operations Engineer roles.
Get Access To All JobsTips for Finding Green Card Sponsorship as a Security Operations Engineer
Document your SOC code alignment early
Security Operations Engineer roles typically map to SOC 15-1212 under DOL's classification system. Confirming your job duties match this code before applications go out prevents PERM audit delays caused by occupational misclassification.
Verify your degree meets EB-2 criteria
EB-2 requires a U.S. master's degree or foreign equivalent in a relevant field like computer science or cybersecurity. Get a credential evaluation completed before targeting EB-2-sponsoring employers so you can confirm eligibility in early conversations.
Target employers already running PERM filings
Many security teams sponsor roles but only after internal approval processes that take months. Use Migrate Mate to filter employers with active green card sponsorship history in security and engineering, cutting your search time significantly.
Ask about PERM filing timelines during offers
Negotiate the PERM start date as part of your offer discussions. Employers often default to waiting six to twelve months post-hire before filing; getting a commitment in writing from HR sets a concrete sponsorship timeline.
Check the prevailing wage before accepting job titles
Your offered salary must meet or exceed the DOL prevailing wage for your location and job title. Run your role through the OFLC Wage Search before finalizing any offer to confirm compliance and avoid PERM denial on wage grounds.
Account for per-country backlog in your planning
EB-3 has no annual cap on petitions, but nationals from India and China face priority date backlogs stretching years. Check the USCIS visa bulletin regularly and factor your country of birth into how urgently you need to start the sponsorship process.
Security Operations Engineer jobs are hiring across the US. Find yours.
Find Security Operations Engineer JobsSecurity Operations Engineer Green Card Sponsorship: Frequently Asked Questions
Does a Security Operations Engineer role qualify for EB-2 or EB-3 green card sponsorship?
Both categories are available depending on your credentials. EB-2 applies if the role requires a master's degree or if you hold a bachelor's plus five years of progressive experience in security operations, network defense, or a related specialty. EB-3 covers roles requiring a bachelor's degree and at least two years of experience. Your employer's job description and DOL's PERM requirements determine which category applies.
How does green card sponsorship differ from H-1B for this role?
H-1B is a temporary nonimmigrant status with a three-year initial period and annual cap lottery exposure. Employment-based green card sponsorship through PERM leads to lawful permanent residency with no renewal cycle. There's no annual cap on PERM filings themselves, though per-country priority date backlogs can delay the final green card for nationals from backlogged countries. The process takes longer overall but results in permanent authorization.
What does the PERM labor certification process involve for security roles?
Your employer files an ETA Form 9089 with DOL's Office of Foreign Labor Certification, certifying that no qualified U.S. worker was available for the role. They must conduct a supervised recruitment process beforehand, including job postings, internal notices, and documented review of applicants. Security Operations Engineer roles often face audit scrutiny because cybersecurity is a high-demand field, so thorough documentation from your employer is critical.
How do I find employers who actively sponsor Security Operations Engineer green cards?
Use Migrate Mate to search for Security Operations Engineer roles filtered by employment-based green card sponsorship history. Many employers sponsor visas but don't advertise PERM sponsorship in job postings, so filtering by actual sponsorship data rather than job description language saves significant time and avoids offers that won't lead to permanent residency.
Can I switch employers after my PERM is filed?
Changing employers before your I-140 petition is approved restarts the PERM process from the beginning with the new employer. After your I-140 is approved and your priority date is current or nearly current, portability rules under AC21 may let you transfer the underlying petition to a new employer in a same or similar occupational classification, which security engineering roles often qualify for.
See which Security Operations Engineer employers are hiring and sponsoring visas right now.
Search Security Operations Engineer Jobs