Information Security Manager Jobs for OPT Students
Information Security Manager jobs on OPT require employers willing to sponsor H-1B or support STEM OPT extensions, since most roles demand a degree in cybersecurity, computer science, or information systems. With 24-month STEM OPT available, you have meaningful runway to build U.S. leadership experience in a field where demand consistently outpaces supply.
See All Information Security Manager JobsOverview
Showing 5 of 7+ Information Security Manager jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 7+ Information Security Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Manager roles.
Get Access To All Jobs
HOURLY RANGE: $52.51 - $72.97
DISTINGUISHING FEATURES OF THE CLASS: The work involves assisting the Chief Healthcare Information Security Officer (CISO) in managing the Information Security Program at the Erie County Medical Center Corporation (ECMCC). The work involves addressing the electronic systems architecture and functionality as it affects safeguards of protected health information (PHI) and business information assets, as directed by the Healthcare Information Security Director or CISO. The incumbent monitors, assesses the IT business continuity and disaster recovery program and performs network penetration tests, application vulnerability assessment scans, and risk assessment reviews. The work is performed under the general direction of the Healthcare Information Security Director or CISO. Supervision may be exercised over lower-level technical staff. Does related work as required.
TYPICAL WORK ACTIVITIES:
- Manages the Information Security Program procedures, technical systems and workforce training to maintain the confidentiality, integrity, and availability of data within all information systems;
- Coordinates resources (staff, equipment, vendors, and consultants) across projects, manages the budget for assigned projects, monitors project progress (risks & issues) and adjusts resources and priorities accordingly;
- Drives adoption of secure hardening and configuration practices in the systems security deployment cycle throughout central technology and line of business technical engineering teams;
- Performs information security awareness and training to educate workforce about information risks;
- Prepares and presents progress reports for management and ensures technologies are appropriately integrated to support the objectives of Cybersecurity Program;
- Provides subject-matter-expertise in the discipline of Core Platform security to Cybersecurity operation team and others;
- Provides consultancy for secure system design, development, engineering, and operation;
- Provides project management and operational responsibility for administrative coordination and implementation of the organization’s security program;
- Assists in development of Security Program Policies and enforces policies and procedures;
- Assists with enforcement of access control needs of the organization;
- Identifies and helps implement continuous process enhancements/improvements to Cybersecurity Operations;
- Assists in managing information security directives as mandated by Federal and State regulations, including but not limited to the Health Insurance Portability and Accountability Act (HIPAA);
- Assists with disaster recovery, business continuity, incident response, and risk management programs;
- As directed by the Healthcare Information Security Director of CISO, performs or works with third-party consultants to perform information risk assessments, security audits, and accreditation surveys, ensuring that information systems are adequately protected and meet HIPAA certification requirements;
- Participates in accreditation surveys;
- Attends and participates in meetings, seminars, and training sessions.
FULL PERFORMANCE KNOWLEDGE, SKILLS, ABILITIES AND PERSONAL CHARACTERISTICS: Thorough knowledge of state of the art computer security; good knowledge of project management and development; good knowledge of internal computer logic, programs and facilities; good knowledge of technical infrastructure security components and integrated computerized rules-based systems; familiarity with Federal and State privacy and security laws and regulations and industry best practices as they relate to healthcare information security; ability to enforce programs to ensure the security of health information across a widely dispersed workforce with a variety of information mediums; ability to read, interpret and apply technical information; ability to analyze and resolve security problems quickly; ability to supervise others; ability to establish and maintain effective working relationships with a diverse constituency; critical thinking skills; problem solving skills; technical skills; capable of performing the essential functions of the position with or without reasonable accommodation.
MINIMUM QUALIFICATIONS:
- Possession of a Master’s Degree in Health Information Systems, Computer Science/Computer Programming, or related computer technology or healthcare related field and one (1) year of experience in computer or information security* which included experience with federal and state privacy and security laws, regulations and accreditation standards for maintaining information security and confidentiality; or:
- Possession of a Bachelor’s Degree in Health Information Systems, Computer Science/Computer Programming, or related computer technology or healthcare related field and three (3) years of experience in computer or information security*, one (1) year of which included experience with federal and state privacy and security laws, regulations and accreditation standards for maintaining information security and confidentiality; or:
- An equivalent combination of training and experience as defined by the limits of (A) and (B).
Information Security, for the purpose of qualifying applications, is defined as the processes designed and implemented to protect information, systems, and networks against unauthorized access, use or disruption utilizing various forms of technology.
NOTE*: Your degree must have been awarded by a college or university accredited by a regional, national or specialized agency recognized as an accrediting agency by the U.S. Department of Education/U.S. Secretary of Education. If your degree was awarded by an educational institution outside the United States and its territories, you must provide independent verification of equivalency. A list of acceptable companies who provide this service can be found on the internet at http://www.cs.ny.gov/jobseeker/degrees.cfm. You must pay the required evaluation fee.
NOTE 2: Verifiable part-time and/or volunteer experience will be pro-rated toward meeting full-time experience requirements.

HOURLY RANGE: $52.51 - $72.97
DISTINGUISHING FEATURES OF THE CLASS: The work involves assisting the Chief Healthcare Information Security Officer (CISO) in managing the Information Security Program at the Erie County Medical Center Corporation (ECMCC). The work involves addressing the electronic systems architecture and functionality as it affects safeguards of protected health information (PHI) and business information assets, as directed by the Healthcare Information Security Director or CISO. The incumbent monitors, assesses the IT business continuity and disaster recovery program and performs network penetration tests, application vulnerability assessment scans, and risk assessment reviews. The work is performed under the general direction of the Healthcare Information Security Director or CISO. Supervision may be exercised over lower-level technical staff. Does related work as required.
TYPICAL WORK ACTIVITIES:
- Manages the Information Security Program procedures, technical systems and workforce training to maintain the confidentiality, integrity, and availability of data within all information systems;
- Coordinates resources (staff, equipment, vendors, and consultants) across projects, manages the budget for assigned projects, monitors project progress (risks & issues) and adjusts resources and priorities accordingly;
- Drives adoption of secure hardening and configuration practices in the systems security deployment cycle throughout central technology and line of business technical engineering teams;
- Performs information security awareness and training to educate workforce about information risks;
- Prepares and presents progress reports for management and ensures technologies are appropriately integrated to support the objectives of Cybersecurity Program;
- Provides subject-matter-expertise in the discipline of Core Platform security to Cybersecurity operation team and others;
- Provides consultancy for secure system design, development, engineering, and operation;
- Provides project management and operational responsibility for administrative coordination and implementation of the organization’s security program;
- Assists in development of Security Program Policies and enforces policies and procedures;
- Assists with enforcement of access control needs of the organization;
- Identifies and helps implement continuous process enhancements/improvements to Cybersecurity Operations;
- Assists in managing information security directives as mandated by Federal and State regulations, including but not limited to the Health Insurance Portability and Accountability Act (HIPAA);
- Assists with disaster recovery, business continuity, incident response, and risk management programs;
- As directed by the Healthcare Information Security Director of CISO, performs or works with third-party consultants to perform information risk assessments, security audits, and accreditation surveys, ensuring that information systems are adequately protected and meet HIPAA certification requirements;
- Participates in accreditation surveys;
- Attends and participates in meetings, seminars, and training sessions.
FULL PERFORMANCE KNOWLEDGE, SKILLS, ABILITIES AND PERSONAL CHARACTERISTICS: Thorough knowledge of state of the art computer security; good knowledge of project management and development; good knowledge of internal computer logic, programs and facilities; good knowledge of technical infrastructure security components and integrated computerized rules-based systems; familiarity with Federal and State privacy and security laws and regulations and industry best practices as they relate to healthcare information security; ability to enforce programs to ensure the security of health information across a widely dispersed workforce with a variety of information mediums; ability to read, interpret and apply technical information; ability to analyze and resolve security problems quickly; ability to supervise others; ability to establish and maintain effective working relationships with a diverse constituency; critical thinking skills; problem solving skills; technical skills; capable of performing the essential functions of the position with or without reasonable accommodation.
MINIMUM QUALIFICATIONS:
- Possession of a Master’s Degree in Health Information Systems, Computer Science/Computer Programming, or related computer technology or healthcare related field and one (1) year of experience in computer or information security* which included experience with federal and state privacy and security laws, regulations and accreditation standards for maintaining information security and confidentiality; or:
- Possession of a Bachelor’s Degree in Health Information Systems, Computer Science/Computer Programming, or related computer technology or healthcare related field and three (3) years of experience in computer or information security*, one (1) year of which included experience with federal and state privacy and security laws, regulations and accreditation standards for maintaining information security and confidentiality; or:
- An equivalent combination of training and experience as defined by the limits of (A) and (B).
Information Security, for the purpose of qualifying applications, is defined as the processes designed and implemented to protect information, systems, and networks against unauthorized access, use or disruption utilizing various forms of technology.
NOTE*: Your degree must have been awarded by a college or university accredited by a regional, national or specialized agency recognized as an accrediting agency by the U.S. Department of Education/U.S. Secretary of Education. If your degree was awarded by an educational institution outside the United States and its territories, you must provide independent verification of equivalency. A list of acceptable companies who provide this service can be found on the internet at http://www.cs.ny.gov/jobseeker/degrees.cfm. You must pay the required evaluation fee.
NOTE 2: Verifiable part-time and/or volunteer experience will be pro-rated toward meeting full-time experience requirements.
How to Get Visa Sponsorship as an Information Security Manager
Target STEM OPT-eligible degree fields
Information Security Manager roles almost always require a degree in computer science, cybersecurity, or information systems, all STEM-designated fields. Confirming your degree qualifies for the 24-month STEM OPT extension gives you significantly more time to secure H-1B sponsorship.
Prioritize large enterprises and regulated industries
Financial institutions, healthcare systems, defense contractors, and large tech companies maintain dedicated security teams and established H-1B sponsorship pipelines. These employers hire Information Security Managers regularly and are far more likely to have immigration infrastructure already in place.
Lead with certifications alongside your OPT status
CISSP, CISM, or CISA certifications signal readiness for a management-level security role. Employers weighing sponsorship costs are more willing to invest when a candidate reduces onboarding risk with industry-recognized credentials that validate both technical depth and leadership competency.
Apply before your OPT start date if possible
Information Security Manager searches typically take longer than individual contributor roles. Starting your job search three to four months before OPT begins gives employers time to complete hiring processes without feeling pressured by your authorization timeline.
Frame your visa timeline clearly and confidently
Employers unfamiliar with OPT often assume authorization complexity. Explaining that you're authorized to work immediately, with a STEM extension available, and that H-1B sponsorship happens later, removes uncertainty and keeps hiring conversations focused on your qualifications.
Highlight compliance and risk management experience
Information Security Managers who can demonstrate experience with NIST, SOC 2, ISO 27001, or FedRAMP frameworks stand out strongly. Employers in regulated industries treat compliance expertise as a direct business need, which strengthens the case for sponsoring your visa.
Information Security Manager jobs are hiring across the US. Find yours.
Find Information Security Manager JobsSee all 7+ Information Security Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Manager roles.
Get Access To All JobsFrequently Asked Questions
Can I work as an Information Security Manager on OPT?
Yes, F-1 students authorized for OPT can work as Information Security Managers without any additional visa sponsorship during the OPT period. Your OPT EAD card is your work authorization. If your degree is in a STEM field like computer science or cybersecurity, you may also qualify for a 24-month STEM OPT extension, giving you up to three years of total post-graduation work authorization.
Does the Information Security Manager role qualify for the STEM OPT extension?
The role itself does not determine STEM OPT eligibility, but your degree does. If your bachelor's, master's, or doctoral degree is in a STEM-designated field such as computer science, information security, or electrical engineering, and your employer qualifies, you can apply for the 24-month STEM OPT extension. Most Information Security Manager positions explicitly require STEM degrees, so the extension is commonly available to candidates in this field.
How do I find Information Security Manager jobs that sponsor OPT or H-1B?
Migrate Mate filters job listings specifically for employers open to OPT and visa sponsorship, so you are not wasting applications on companies that will not hire international candidates. Information Security Manager roles at large enterprises, government contractors, and financial institutions are the most common sponsoring employers. Searching on Migrate Mate by role and filtering for sponsorship-friendly employers is the most direct approach.
Is Information Security Manager considered a specialty occupation for H-1B purposes?
Yes. Information Security Manager is consistently recognized as a specialty occupation because the role requires at minimum a bachelor's degree in a specific technical field such as computer science, cybersecurity, or information systems. USCIS expects a direct relationship between the degree field and the job duties. Roles involving security policy development, risk management, and team leadership within an IT security function meet this standard.
What should I do if my OPT expires before I receive an H-1B approval?
If your employer files an H-1B petition before your OPT or STEM OPT expires, you may be eligible for a cap-gap extension that bridges your status until October 1 of the fiscal year the H-1B takes effect. This automatic extension allows you to continue working without interruption. Coordinating your H-1B filing timeline with your employer well before your OPT expiration date is essential to avoid any gap in work authorization.
See which Information Security Manager employers are hiring and sponsoring visas right now.
Search Information Security Manager Jobs