H-1B Visa Senior Information Security Analyst Jobs
Senior Information Security Analyst roles qualify as H-1B specialty occupations because they require a bachelor's degree or higher in computer science, cybersecurity, or a related field. Employers filing H-1B petitions for this role must certify a prevailing wage through a DOL Labor Condition Application before USCIS can approve the petition.
See All Senior Information Security Analyst JobsOverview
Showing 5 of 18+ Senior Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All Jobs
Number of Vacancies 1
Location Rio Grande Valley, Texas
Department Information Security
FTE 1.0
FLSA Exempt
Scope of Job
Responsible for the implementation, configuration, operation, and ongoing maintenance of the various security solutions and the identification, investigation and resolution of security events detected by those systems. Ensures the university is in compliance with UT System policies as well as state and federal statutes and regulations.
Description of Duties
- Develops, implements, monitors and supports the access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
- Ensures the overall university security program is in compliance with UTS 165 and TAC 202.
- Collaborates with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
- Ensures that all consultation on information security controls related to university information systems are appropriate and operating as intended.
- Coordinates and documents response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
- Oversees risk assessment assistance requests and makes recommendations to management.
- Acts as main point of contact regarding university audits.
- Reviews and analyzes intrusion detection reports provided by UT System for unusual patterns, security breaches, and exploitation of information resources.
- Develops, prepares and recommends improvements for documentation, including security policies and procedures, security notifications and alerts.
- Develops and implements processes to secure the confidentiality, integrity and availability of information resources and technology.
- Observes, monitors, evaluates, and reports security policy compliance.
- Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
- Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
- Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
- Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
- Participates in university committees and meetings with the UT System Security Council.
- Perform other related duties as assigned.
Supervision Received
General supervision from assigned supervisor.
Supervision Given
Direct supervision of assigned staff.
Required Education
Bachelor’s degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
Preferred Education
Bachelor’s Degree in Cybersecurity or Information Assurance from an accredited university.
Licenses/Certifications
Preferred: Certified Information Systems Security Professional (CISSP)
Required Experience
- Four (4) years of relevant IT security, IT operations and/or IT audit experience to include the following: deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools, basic networking concepts, protocols (TCP/IP), common ports and knowledge of risk assessment, disaster recovery and business continuity methods and practices, host/network common vulnerabilities and exploits (CVEs) and experience with hacker methodologies, tactics, and the tools used or
- Bachelor’s degree from an accredited university in unrelated field with five (5) years of the required experience.
- Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.
Preferred Experience
- Experience with major operating systems, including command-line proficiency.
- Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
- Experience in managing, configuring, deploying, and monitoring security infrastructure.
- Experience with standard concepts, practices, and procedures for security operation centers.
- Knowledge of ITIL processes and standards.
- Experience conducting risk assessments and identifying effective risk mitigation strategies.
- Experience installing, configuring and repairing computer hardware and system software.
Equipment
Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.
Working Conditions
Needs to be able to successfully perform all required duties. Exposure to standard office conditions. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Job involves moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Work is performed primarily in a general office environment.
Other
Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP.
To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position.
Physical Capabilities
N/A
Employment Category Full-Time
Minimum Salary Commensurate with Experience
Posted Salary Commensurate with Experience
Position Available Date 04/29/2026
Grant Funded Position No
If Yes, Provide Grant Expiration Date
EEO Statement
It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.
Special Instructions to Applicants
Dear Applicant,
Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:
Date of Birth
Gender
- Ethnicity/Race
Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission. The University of Texas Rio Grande Valley reserves the right to discontinue accepting applications prior to the stated close date of this position, after meeting the posting requirement of three (3) calendar days.
If you have any questions, please visit our Careers site for detailed contact information.
Additional Information
UTRGV is a distributed location institution and working location is subject to change based on need.
All UTRGV employees are required to have a criminal background check (CBC). Incomplete applications will not be considered.
Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development.
See all Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All JobsTips for Finding H-1B Visa Sponsorship as a Senior Information Security Analyst
Map your credentials to SOC code 15-1212
USCIS adjudicators use O*NET occupation profiles to verify specialty occupation status. Pull the 15-1212 profile before interviews so you can align your resume language to the specific knowledge, skills, and degree requirements USCIS expects to see documented.
Filter employers by LCA filing history
Use Migrate Mate to surface employers who have active Labor Condition Applications for information security analyst roles. This filters out companies that claim they sponsor H-1B visas but have no DOL filing history to back it up.
Request the prevailing wage tier in your offer
Ask your recruiter which DOL wage level the LCA will certify at, Level I through Level IV. Senior roles should be certified at Level III or IV. A Level I certification on a senior title raises an RFE risk that affects your timeline.
Verify security clearance sponsorship separately
Federal contractor roles often require a U.S. security clearance that H-1B holders can't always obtain. Confirm clearance eligibility with the hiring manager before the offer stage, not after, so you don't lose time on a role that can't proceed.
Document your incident response and SIEM experience precisely
USCIS may issue an RFE questioning whether the role requires a specific degree rather than general IT experience. Your offer letter and support letter should name tools like SIEM platforms and reference your degree field explicitly, not just job titles.
Negotiate filing before the April 1 cap-subject window
If you're transitioning from OPT or another cap-subject status, your employer must file between April 1 and the registration deadline. Confirm your employer's legal team has filed H-1B petitions before and understands USCIS premium processing timelines for this role category.
Senior Information Security Analyst jobs are hiring across the US. Find yours.
Find Senior Information Security Analyst JobsSenior Information Security Analyst H-1B Visa: Frequently Asked Questions
Does a Senior Information Security Analyst role qualify as an H-1B specialty occupation?
Yes. USCIS consistently recognizes information security analyst positions as specialty occupations because they require at least a bachelor's degree in computer science, information systems, cybersecurity, or a closely related field. The key is that both the job description and your degree must align. Roles that accept any bachelor's degree regardless of field face higher RFE rates, so the offer letter wording matters.
Which employers sponsor H-1B visas for Senior Information Security Analyst positions?
Employers with active DOL Labor Condition Applications for information security analyst roles are your most reliable targets. Technology companies, financial institutions, healthcare systems, and defense contractors file consistently for this occupation. Migrate Mate lets you browse verified H-1B sponsoring employers filtered specifically for this role, so you can focus your applications where sponsorship is already established.
How does the DOL prevailing wage affect my H-1B offer for this role?
Your employer must certify through an LCA that your salary meets the DOL prevailing wage for your specific job title, experience level, and work location. For a senior-level analyst role, that's typically a Level III or Level IV wage determination. You can verify expected wage floors for your metro area using the OFLC Wage Search before salary negotiations begin.
Can I switch employers on H-1B status if I'm working as a Senior Information Security Analyst?
Yes, through H-1B portability under AC21. Your new employer files an H-1B transfer petition, and you can start working for them once USCIS receives it, without waiting for approval. The new role must still qualify as a specialty occupation at the senior level. If your original petition has been approved for more than 365 days and an I-140 is pending, you may also have additional portability protections.
Does a security clearance requirement affect H-1B sponsorship for this role?
It can. H-1B status doesn't automatically disqualify you from security clearances, but many federal contractor roles require clearances that involve a Foreign National review process, which some employers are unwilling to initiate. Positions at private sector companies, financial firms, and healthcare organizations rarely have clearance requirements and sponsor H-1B visas for this role more straightforwardly. Clarify clearance requirements before accepting an offer.
See which Senior Information Security Analyst employers are hiring and sponsoring visas right now.
Search Senior Information Security Analyst Jobs