Senior Cybersecurity Analyst Green Card Jobs
Senior Cybersecurity Analyst roles qualify for EB-2 and EB-3 green card sponsorship through the PERM labor certification process, which requires employers to document recruitment efforts before filing an I-140 petition. Cybersecurity's tight labor market and specialized degree requirements make these positions strong PERM candidates. Find employers offering permanent sponsorship here.
See All Senior Cybersecurity Analyst JobsOverview
Showing 5 of 203+ Senior Cybersecurity Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 203+ Senior Cybersecurity Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Analyst roles.
Get Access To All Jobs
Requisition ID: 179964
Job Level: Senior Level
Home District/Group: DHO Information Technology Group
Department: Technology Group
Market: Corporate Home Office
Employment Type: Full Time
Position Overview
Kiewit Technology group is looking for a Senior Security Analyst who is passionate about cybersecurity, and a professional who is looking to take on new challenges. This experienced security analyst and operations professional will join our Security Operations team and be responsible for actively monitoring Kiewit systems for attacks and intrusions. You will apply your experience and skills to own and drive the resolution of complex security incidents and investigations and technical security issues. You will help design, build, and use infrastructure securely, including work to orchestrate and automate the security process. This position will report to the Cybersecurity Manager within Kiewit Technology Group.
District Overview
Kiewit Technology Group builds solutions to enable and support our company's expansive operations. Our mission is to deliver project schedule and cost certainty by employing technology designed by and for the construction industry. Our team utilizes systems and tools that manage every part of Kiewit's business and the project lifecycle to improve planning and day-to-day execution in the field. We give our people real-time data to make faster, smarter decisions.
Location
This is a full time in office role located on our LaVista, NE campus. We are not offering relocation assistance for this role.
Responsibilities
- Central role in securing Kiewit systems and data from potential threats or compromise
- Actively participates in security threat monitoring, attack methods, and incident response
- Cross-department collaboration and communication to ensure appropriate processes, procedures and tools are installed, monitored, and effectively operating and alerting
- Strategy, planning, and operational excellence through continuous improvement and automation
- Ability to lead projects, provide guidance and awareness of secure solutions and requirements
- Ensure monitoring of alerts and logs from enterprise security tools such as firewalls, IDS, antivirus, data loss protection (DLP) and vulnerability scanners
- Document and conform to processes related to security monitoring and detection
- Prioritize workflow, addressing technical and non-technical escalations to satisfaction
- Create monitoring and alarm rules and configurations
- Perform cyber news analysis, security awareness training and recommend new analytic methods for detecting threats
- Participate in knowledge sharing with other analysts to develop various levels of skill sets on the team
- Interface with technical personnel and other teams as required
- Support the information security function within the company as needed
- Stay informed and educated on security industry trends, potential threats and vulnerabilities
Qualifications
- Bachelor's degree in computer related field such as Information Assurance, Computer Science, Mathematics or Engineering (equivalent combination of education and experience will be considered)
- 10 years related work experience required in Information Technology
- 5 years of work experience required in Information Security
- Related work experience required in system administration, software development, security operations, or risk and governance a plus
- Professional certifications such as CompTIA Network+, Security+, CISSP, CISM, GCFE, or GCIH a plus
- Understanding of security related technologies such as cryptography, IPsec, PKI, VPNs, firewalls, proxy services, DNS, access lists, and application vulnerabilities
- Familiarity with tools used in security operations, incident response, and forensics
- Natural curiosity, and a desire to continually learn and improve
- Experience collecting and using data to build compelling or engaging visuals is a plus
- Experience with Security Information and Event Management (SIEM) tools
- Thorough understanding of the latest security principles, techniques, and protocols
- Good interpersonal, oral, and written communication skills
- Must be able to identify issues, obtain relevant information, relate and compare data from different sources, and identify alternative solutions
- Must be able to provide guidance and feedback to help an employee or groups of employees strengthen their knowledge, skills and abilities to accomplish a task or solve a problem
- Must have the ability to write technical information in a clear and concise manner and to be able to convey information appropriately for a variety of audiences
- Must be highly motivated, self-starting and self-directed with the ability to multi-task, work independently and as a part of multiple teams
- Ability to work off-hours when required and be part of an on-call rotation. #LI-AK1
Other Requirements:
- Regular, reliable attendance
- Work productively and meet deadlines timely
- Communicate and interact effectively and professionally with supervisors, employees, and others individually or in a team environment.
- Perform work safely and effectively. Understand and follow oral and written instructions, including warning signs, equipment use, and other policies.
- Work during normal operating hours to organize and complete work within given deadlines. Work overtime and weekends as required.
- May work at various different locations and conditions may vary.
We offer our fulltime staff employees a comprehensive benefits package that’s among the best in our industry, including top-tier medical, dental and vision plans covering eligible employees and dependents, voluntary wellness and employee assistance programs, life insurance, disability, retirement plans with matching, and generous paid time off.
Equal Opportunity Employer, including disability and protected veteran status.

Requisition ID: 179964
Job Level: Senior Level
Home District/Group: DHO Information Technology Group
Department: Technology Group
Market: Corporate Home Office
Employment Type: Full Time
Position Overview
Kiewit Technology group is looking for a Senior Security Analyst who is passionate about cybersecurity, and a professional who is looking to take on new challenges. This experienced security analyst and operations professional will join our Security Operations team and be responsible for actively monitoring Kiewit systems for attacks and intrusions. You will apply your experience and skills to own and drive the resolution of complex security incidents and investigations and technical security issues. You will help design, build, and use infrastructure securely, including work to orchestrate and automate the security process. This position will report to the Cybersecurity Manager within Kiewit Technology Group.
District Overview
Kiewit Technology Group builds solutions to enable and support our company's expansive operations. Our mission is to deliver project schedule and cost certainty by employing technology designed by and for the construction industry. Our team utilizes systems and tools that manage every part of Kiewit's business and the project lifecycle to improve planning and day-to-day execution in the field. We give our people real-time data to make faster, smarter decisions.
Location
This is a full time in office role located on our LaVista, NE campus. We are not offering relocation assistance for this role.
Responsibilities
- Central role in securing Kiewit systems and data from potential threats or compromise
- Actively participates in security threat monitoring, attack methods, and incident response
- Cross-department collaboration and communication to ensure appropriate processes, procedures and tools are installed, monitored, and effectively operating and alerting
- Strategy, planning, and operational excellence through continuous improvement and automation
- Ability to lead projects, provide guidance and awareness of secure solutions and requirements
- Ensure monitoring of alerts and logs from enterprise security tools such as firewalls, IDS, antivirus, data loss protection (DLP) and vulnerability scanners
- Document and conform to processes related to security monitoring and detection
- Prioritize workflow, addressing technical and non-technical escalations to satisfaction
- Create monitoring and alarm rules and configurations
- Perform cyber news analysis, security awareness training and recommend new analytic methods for detecting threats
- Participate in knowledge sharing with other analysts to develop various levels of skill sets on the team
- Interface with technical personnel and other teams as required
- Support the information security function within the company as needed
- Stay informed and educated on security industry trends, potential threats and vulnerabilities
Qualifications
- Bachelor's degree in computer related field such as Information Assurance, Computer Science, Mathematics or Engineering (equivalent combination of education and experience will be considered)
- 10 years related work experience required in Information Technology
- 5 years of work experience required in Information Security
- Related work experience required in system administration, software development, security operations, or risk and governance a plus
- Professional certifications such as CompTIA Network+, Security+, CISSP, CISM, GCFE, or GCIH a plus
- Understanding of security related technologies such as cryptography, IPsec, PKI, VPNs, firewalls, proxy services, DNS, access lists, and application vulnerabilities
- Familiarity with tools used in security operations, incident response, and forensics
- Natural curiosity, and a desire to continually learn and improve
- Experience collecting and using data to build compelling or engaging visuals is a plus
- Experience with Security Information and Event Management (SIEM) tools
- Thorough understanding of the latest security principles, techniques, and protocols
- Good interpersonal, oral, and written communication skills
- Must be able to identify issues, obtain relevant information, relate and compare data from different sources, and identify alternative solutions
- Must be able to provide guidance and feedback to help an employee or groups of employees strengthen their knowledge, skills and abilities to accomplish a task or solve a problem
- Must have the ability to write technical information in a clear and concise manner and to be able to convey information appropriately for a variety of audiences
- Must be highly motivated, self-starting and self-directed with the ability to multi-task, work independently and as a part of multiple teams
- Ability to work off-hours when required and be part of an on-call rotation. #LI-AK1
Other Requirements:
- Regular, reliable attendance
- Work productively and meet deadlines timely
- Communicate and interact effectively and professionally with supervisors, employees, and others individually or in a team environment.
- Perform work safely and effectively. Understand and follow oral and written instructions, including warning signs, equipment use, and other policies.
- Work during normal operating hours to organize and complete work within given deadlines. Work overtime and weekends as required.
- May work at various different locations and conditions may vary.
We offer our fulltime staff employees a comprehensive benefits package that’s among the best in our industry, including top-tier medical, dental and vision plans covering eligible employees and dependents, voluntary wellness and employee assistance programs, life insurance, disability, retirement plans with matching, and generous paid time off.
Equal Opportunity Employer, including disability and protected veteran status.
See all 203+ Senior Cybersecurity Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Analyst roles.
Get Access To All JobsTips for Finding Green Card Sponsorship as a Senior Cybersecurity Analyst
Align your credentials to PERM job requirements
PERM certification locks in the minimum requirements at the time of filing. If your degree is in a related field like computer science or information assurance, document how it meets the specific role's stated requirements before your employer submits the ETA 9089.
Target employers with in-house immigration infrastructure
Large financial institutions, defense contractors, and federal IT consulting firms regularly sponsor Senior Cybersecurity Analysts and maintain dedicated immigration teams. These employers can move through PERM, I-140, and adjustment of status without outsourcing each step to a new attorney.
Search green card sponsors using Migrate Mate
Use Migrate Mate to filter Senior Cybersecurity Analyst roles by employers with active EB-2 and EB-3 sponsorship history. This cuts out the guesswork of cold-applying to companies that have never filed PERM for cybersecurity roles.
Understand how EB-3 backlog affects your country
If you're from India or China, EB-3 priority dates can lag years behind filing. Confirm your country's current cut-off in the USCIS Visa Bulletin before accepting an offer, since cybersecurity PERM cases often qualify for both EB-2 and EB-3 simultaneously.
Request a prevailing wage determination review before signing
Your employer must file a prevailing wage determination with DOL before starting PERM recruitment. Ask for the wage level assigned to your role. A Level I or II determination on a senior title can signal a weak case and create RFE exposure during I-140 adjudication.
Document certifications that strengthen your EB-2 profile
Credentials like CISSP, CISM, or CEH aren't required for PERM but reinforce that the role demands advanced expertise. If your employer is pursuing EB-2, having these on record supports the argument that the position requires more than a standard bachelor's degree.
Senior Cybersecurity Analyst jobs are hiring across the US. Find yours.
Find Senior Cybersecurity Analyst JobsSenior Cybersecurity Analyst Green Card Sponsorship: Frequently Asked Questions
Does a Senior Cybersecurity Analyst role qualify for EB-2 or EB-3 sponsorship?
Most Senior Cybersecurity Analyst positions qualify for EB-2 if the role requires an advanced degree or the equivalent in specialized experience. EB-3 covers roles with a standard bachelor's degree requirement. Employers can pursue both categories simultaneously using a process called concurrent filing, which lets you lock in an earlier EB-3 priority date while the EB-2 petition proceeds.
How does green card sponsorship differ from H-1B for this role?
H-1B is a temporary status with a three-year initial period and no direct path to permanency on its own. PERM-based green card sponsorship is a permanent employer commitment. There's no annual lottery for EB-3, and the I-140 approval establishes a priority date that travels with you even if you change employers, as long as the new role is in a similar occupational category under AC21 portability rules.
What does the PERM recruitment process look like for a cybersecurity role?
Your employer must conduct DOL-mandated recruitment, including job postings in a Sunday print newspaper, on the company's own website, and through additional channels like job fairs or professional journals. For cybersecurity roles, employers often satisfy additional recruitment steps through ISCAS or professional association postings. The entire recruitment window takes a minimum of 30 days before the ETA 9089 can be filed with DOL.
How can I find employers actively sponsoring Senior Cybersecurity Analysts for green cards?
Use Migrate Mate to search Senior Cybersecurity Analyst jobs filtered by employers with verified EB-2 and EB-3 sponsorship history. This is more reliable than applying broadly and asking during interviews, since PERM filing history is a stronger signal of sponsorship intent than a job posting that simply lists 'sponsorship available.'
Can I switch employers after my I-140 is approved but before I have a green card?
Yes. Under AC21 portability, once your I-140 has been approved and your I-485 adjustment of status application has been pending for 180 days or more, you can change employers or roles without losing your priority date, as long as the new position is in the same or a similar occupational classification. For Senior Cybersecurity Analyst roles, this typically means staying within information security or closely related IT management functions.
See which Senior Cybersecurity Analyst employers are hiring and sponsoring visas right now.
Search Senior Cybersecurity Analyst Jobs