Senior Information Security Analyst Green Card Jobs
Senior Information Security Analyst roles qualify for EB-2 and EB-3 green card sponsorship through PERM labor certification, which requires employers to test the U.S. labor market before filing your I-140 immigrant petition. Cybersecurity expertise in threat analysis, SIEM platforms, and compliance frameworks strengthens your profile for advanced-degree EB-2 sponsorship pathways.
See All Senior Information Security Analyst JobsOverview
Showing 5 of 18+ Senior Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 18+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All Jobs
Number of Vacancies 1
Location Rio Grande Valley, Texas
Department Information Security
FTE 1.0
FLSA Exempt
Scope of Job
Responsible for the implementation, configuration, operation, and ongoing maintenance of the various security solutions and the identification, investigation and resolution of security events detected by those systems. Ensures the university is in compliance with UT System policies as well as state and federal statutes and regulations.
Description of Duties
- Develops, implements, monitors and supports the access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
- Ensures the overall university security program is in compliance with UTS 165 and TAC 202.
- Collaborates with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
- Ensures that all consultation on information security controls related to university information systems are appropriate and operating as intended.
- Coordinates and documents response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
- Oversees risk assessment assistance requests and makes recommendations to management.
- Acts as main point of contact regarding university audits.
- Reviews and analyzes intrusion detection reports provided by UT System for unusual patterns, security breaches, and exploitation of information resources.
- Develops, prepares and recommends improvements for documentation, including security policies and procedures, security notifications and alerts.
- Develops and implements processes to secure the confidentiality, integrity and availability of information resources and technology.
- Observes, monitors, evaluates, and reports security policy compliance.
- Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
- Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
- Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
- Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
- Participates in university committees and meetings with the UT System Security Council.
- Perform other related duties as assigned.
Supervision Received
General supervision from assigned supervisor.
Supervision Given
Direct supervision of assigned staff.
Required Education
Bachelor’s degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
Preferred Education
Bachelor’s Degree in Cybersecurity or Information Assurance from an accredited university.
Licenses/Certifications
Preferred: Certified Information Systems Security Professional (CISSP)
Required Experience
- Four (4) years of relevant IT security, IT operations and/or IT audit experience to include the following: deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools, basic networking concepts, protocols (TCP/IP), common ports and knowledge of risk assessment, disaster recovery and business continuity methods and practices, host/network common vulnerabilities and exploits (CVEs) and experience with hacker methodologies, tactics, and the tools used or
- Bachelor’s degree from an accredited university in unrelated field with five (5) years of the required experience.
- Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.
Preferred Experience
- Experience with major operating systems, including command-line proficiency.
- Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
- Experience in managing, configuring, deploying, and monitoring security infrastructure.
- Experience with standard concepts, practices, and procedures for security operation centers.
- Knowledge of ITIL processes and standards.
- Experience conducting risk assessments and identifying effective risk mitigation strategies.
- Experience installing, configuring and repairing computer hardware and system software.
Equipment
Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.
Working Conditions
Needs to be able to successfully perform all required duties. Exposure to standard office conditions. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Job involves moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Work is performed primarily in a general office environment.
Other
Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP.
To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position.
Physical Capabilities
N/A
Employment Category Full-Time
Minimum Salary Commensurate with Experience
Posted Salary Commensurate with Experience
Position Available Date 04/29/2026
Grant Funded Position No
If Yes, Provide Grant Expiration Date
EEO Statement
It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.
Special Instructions to Applicants
Dear Applicant,
Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:
Date of Birth
Gender
- Ethnicity/Race
Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission. The University of Texas Rio Grande Valley reserves the right to discontinue accepting applications prior to the stated close date of this position, after meeting the posting requirement of three (3) calendar days.
If you have any questions, please visit our Careers site for detailed contact information.
Additional Information
UTRGV is a distributed location institution and working location is subject to change based on need.
All UTRGV employees are required to have a criminal background check (CBC). Incomplete applications will not be considered.
Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development.

Number of Vacancies 1
Location Rio Grande Valley, Texas
Department Information Security
FTE 1.0
FLSA Exempt
Scope of Job
Responsible for the implementation, configuration, operation, and ongoing maintenance of the various security solutions and the identification, investigation and resolution of security events detected by those systems. Ensures the university is in compliance with UT System policies as well as state and federal statutes and regulations.
Description of Duties
- Develops, implements, monitors and supports the access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
- Ensures the overall university security program is in compliance with UTS 165 and TAC 202.
- Collaborates with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
- Ensures that all consultation on information security controls related to university information systems are appropriate and operating as intended.
- Coordinates and documents response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
- Oversees risk assessment assistance requests and makes recommendations to management.
- Acts as main point of contact regarding university audits.
- Reviews and analyzes intrusion detection reports provided by UT System for unusual patterns, security breaches, and exploitation of information resources.
- Develops, prepares and recommends improvements for documentation, including security policies and procedures, security notifications and alerts.
- Develops and implements processes to secure the confidentiality, integrity and availability of information resources and technology.
- Observes, monitors, evaluates, and reports security policy compliance.
- Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
- Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
- Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
- Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
- Participates in university committees and meetings with the UT System Security Council.
- Perform other related duties as assigned.
Supervision Received
General supervision from assigned supervisor.
Supervision Given
Direct supervision of assigned staff.
Required Education
Bachelor’s degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
Preferred Education
Bachelor’s Degree in Cybersecurity or Information Assurance from an accredited university.
Licenses/Certifications
Preferred: Certified Information Systems Security Professional (CISSP)
Required Experience
- Four (4) years of relevant IT security, IT operations and/or IT audit experience to include the following: deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools, basic networking concepts, protocols (TCP/IP), common ports and knowledge of risk assessment, disaster recovery and business continuity methods and practices, host/network common vulnerabilities and exploits (CVEs) and experience with hacker methodologies, tactics, and the tools used or
- Bachelor’s degree from an accredited university in unrelated field with five (5) years of the required experience.
- Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.
Preferred Experience
- Experience with major operating systems, including command-line proficiency.
- Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
- Experience in managing, configuring, deploying, and monitoring security infrastructure.
- Experience with standard concepts, practices, and procedures for security operation centers.
- Knowledge of ITIL processes and standards.
- Experience conducting risk assessments and identifying effective risk mitigation strategies.
- Experience installing, configuring and repairing computer hardware and system software.
Equipment
Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.
Working Conditions
Needs to be able to successfully perform all required duties. Exposure to standard office conditions. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Job involves moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Work is performed primarily in a general office environment.
Other
Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP.
To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position.
Physical Capabilities
N/A
Employment Category Full-Time
Minimum Salary Commensurate with Experience
Posted Salary Commensurate with Experience
Position Available Date 04/29/2026
Grant Funded Position No
If Yes, Provide Grant Expiration Date
EEO Statement
It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.
Special Instructions to Applicants
Dear Applicant,
Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:
Date of Birth
Gender
- Ethnicity/Race
Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission. The University of Texas Rio Grande Valley reserves the right to discontinue accepting applications prior to the stated close date of this position, after meeting the posting requirement of three (3) calendar days.
If you have any questions, please visit our Careers site for detailed contact information.
Additional Information
UTRGV is a distributed location institution and working location is subject to change based on need.
All UTRGV employees are required to have a criminal background check (CBC). Incomplete applications will not be considered.
Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development.
See all 18+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All JobsTips for Finding Green Card Sponsorship as a Senior Information Security Analyst
Document your security certifications strategically
CISSP, CISM, CEH, and similar credentials directly support your PERM and I-140 filing by demonstrating specialized knowledge beyond a general IT background. Gather original certificates, renewal records, and continuing education transcripts before you start applications.
Target employers with active PERM filing history
Use the OFLC Wage Search to identify companies that have previously sponsored PERM applications for information security analyst roles. Employers already familiar with the process move faster and are less likely to abandon sponsorship mid-filing.
Distinguish your EB-2 versus EB-3 eligibility early
If your role requires a master's degree or you hold a bachelor's plus five years of progressive security experience, EB-2 may apply and could offer a shorter green card timeline for your country of birth. Confirm which category fits your credentials before negotiating an offer.
Search green card sponsor jobs on Migrate Mate
Filter specifically for Senior Information Security Analyst positions at employers with verified PERM sponsorship history using Migrate Mate. This narrows your search to companies willing to fund the full EB-2 or EB-3 process, not just temporary H-1B transfers.
Negotiate job duties that survive PERM audit scrutiny
The job description filed in your PERM application must match your actual duties. Avoid titles or descriptions that bundle generic IT support with security analysis, since DOL auditors flag roles that appear inconsistent with the specialized occupation being certified.
Confirm your employer's prevailing wage obligation upfront
DOL sets prevailing wages for information security analyst roles by geographic area and experience level using O*NET job zone classifications. Ask your employer to confirm the wage level they intend to file at before the PERM is submitted, since a downgrade later can restart the process.
Senior Information Security Analyst jobs are hiring across the US. Find yours.
Find Senior Information Security Analyst JobsSenior Information Security Analyst Green Card Sponsorship: Frequently Asked Questions
Does a Senior Information Security Analyst role qualify for EB-2 or EB-3 green card sponsorship?
Both categories are possible depending on your credentials and the employer's job requirements. EB-3 applies when the role requires a bachelor's degree in a relevant field such as computer science or information systems. EB-2 applies when the position requires a master's degree or you can demonstrate a bachelor's degree plus at least five years of progressive, specialized security experience that effectively substitutes for an advanced degree.
How does the PERM green card process differ from H-1B sponsorship for this role?
H-1B is a temporary nonimmigrant status capped at 65,000 per year with a lottery, while PERM-based green card sponsorship leads to permanent residency with no annual lottery. The PERM process requires your employer to conduct a DOL-supervised recruitment campaign proving no qualified U.S. workers were available. Timeline is longer, typically two to four years for most countries, but the outcome is lawful permanent residency rather than a renewable temporary status.
What makes an employer willing to sponsor PERM for a Senior Information Security Analyst?
Employers in sectors with persistent cybersecurity talent shortages, such as financial services, healthcare, defense contracting, and cloud infrastructure, are most likely to invest in PERM sponsorship. Companies that already have internal immigration counsel or use outside immigration firms have lower friction. Roles involving compliance frameworks like FedRAMP, HIPAA, or PCI-DSS are particularly strong candidates because the specialization is harder to fill domestically.
How can I find Senior Information Security Analyst jobs that include green card sponsorship?
Migrate Mate lets you search specifically for Senior Information Security Analyst positions at employers with verified PERM and I-140 filing history, so you're not guessing which companies will sponsor. Standard job boards surface roles without any filter for green card willingness, which wastes significant time during a process where employer commitment is essential from day one.
Can my priority date be affected by country of birth even if I'm on an H-1B now?
Yes. Your priority date is set when DOL approves your PERM application, but how quickly you can use it depends on your country of birth, not citizenship. Nationals born in India or China face significantly longer backlogs in EB-2 and EB-3 due to per-country caps. Nationals born in most other countries, including those in Europe, Australia, and Southeast Asia, typically reach the front of the EB-3 queue within one to three years of PERM approval.
See which Senior Information Security Analyst employers are hiring and sponsoring visas right now.
Search Senior Information Security Analyst Jobs