OPT IT Security Analyst Jobs
IT Security Analyst roles qualify for OPT work authorization under CIP codes in computer and information sciences. Most positions require a degree in cybersecurity, information systems, or a related field. STEM OPT extension eligibility gives you up to three years of authorized work, making you an attractive hire for employers building long-term security teams.
See All OPT IT Security Analyst JobsOverview
Showing 5 of 46+ IT Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 46+ IT Security Analyst Jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Analyst roles.
Get Access To All Jobs
At Standard Textile, we’re dedicated to providing comfort and care across generations. Guided by our values, we focus on solutions that serve our customers, support our associates, and strengthen our communities. Since 1940, we’ve remained committed to creating better textiles—delivered seamlessly by experts who care.
IT Security Analyst
The IT Security Analyst is responsible for defending our manufacturing environment against cyber threats. Core duties include monitoring and triaging security alerts across endpoint, network, identity, and cloud telemetry; investigating and responding to incidents; hardening systems and infrastructure; managing vulnerabilities; and supporting security tooling such as XDR, EDR, email security, and firewalls.
This role reports to and works directly with our IT Security Lead, who will mentor the IT Security Analyst on our tooling, playbooks, and environment. You will work firsthand with AI agents and automation built into our security operations. The ideal candidate has a foundation in security operations, strong fundamentals, and an interest in growing into broader IT cybersecurity work.
Key Responsibilities:
- Monitor XDR, EDR, and other security tooling to detect, triage, and investigate suspicious activity across endpoints, network, identity, and cloud environments.
- Use AI agents and automated workflows to accelerate alert triage, enrichment, and initial investigation.
- Assist in incident response activities (containment, eradication, recovery, and post-incident review) and maintain the playbooks and runbooks that support them.
- Participate in threat hunting using known TTPs and threat intelligence and help tune detection logic to reduce false positives.
- Run the vulnerability management lifecycle (scanning, prioritization, coordination of remediation, and verification).
- Support identity and access controls (privileged access, conditional access, account reviews).
- Assist with hardening endpoints, servers, Active Directory, and cloud workloads against common attack techniques (e.g., MITRE ATT&CK).
Collaboration and Communication
- Partner with IT infrastructure, application, and operations teams to embed security into systems, projects, and day-to-day operations.
- Partner with Security Lead to identify high-leverage automation opportunities and help build, evaluate, and tune agentic workflows for the SOC.
- Communicate security risks, incidents, and mitigation strategies clearly to technical teams, senior management, and, when needed, external partners or incident response retainers.
Qualifications Include:
- Bachelor’s degree in Cybersecurity, Information System Analytics, Computer Science, or a closely related discipline.
- 1–3 years of experience in a SOC, IT security, or closely related IT role (internships and co-ops count). Firsthand exposure to incident response, networking, or system administration.
- Solid fundamentals in cybersecurity, common attacker tradecraft (e.g., MITRE ATT&CK), networking, and Windows/Linux/Active Directory administration. Firsthand exposure to a SIEM, XDR, or EDR platform is a plus.
- Relevant certifications such as CompTIA Security+, CySA+, Network+, Microsoft SC-200, Cisco CyberOps Associate, Blue Team Level 1 (BTL1), or GIAC GSEC/GCIH are preferred.
Proudly, Standard Textile has earned a title of US Best Managed Company for the fifth year running, an honor awarded by Deloitte Private and The Wall Street Journal, celebrating the exceptional achievements of American private companies and their management teams.
Standard Textile is an Equal Opportunity Employer, including Veterans and Individuals with Disabilities.
Join us!
See all 46+ OPT IT Security Analyst Jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new OPT IT Security Analyst Jobs.
Get Access To All JobsTips for Finding OPT Sponsorship as an IT Security Analyst
Lead with your STEM OPT timeline upfront
Tell hiring managers early that your STEM OPT gives you up to three years of authorized work. This removes the immediate H-1B visa urgency and gives employers a concrete runway to evaluate you before committing to sponsorship.
Prioritize employers with active security clearance pipelines
Defense contractors and federal IT vendors regularly hire for security analyst roles and have established visa sponsorship infrastructure. These employers understand long-term authorization timelines better than companies hiring their first international candidate.
Stack certifications that reduce employer hiring risk
CompTIA Security+, CySA+, and CEH signal job-readiness to employers who may be unfamiliar with OPT. Certified candidates are easier to justify internally when a hiring manager needs approval to sponsor a work visa down the line.
Target mid-size companies with dedicated security teams
Large enterprises have HR processes for sponsorship. Mid-size firms with five or more security headcount are often underserved and more willing to invest in retaining a strong analyst candidate through the H-1B process.
Frame your international background as a security asset
Multilingual candidates with cross-border compliance awareness can support global security operations. Positioning your background this way shifts the conversation from your visa status to the specific value you bring to a security team.
Apply before your OPT start date if possible
Many IT security roles require background checks and onboarding that take four to six weeks. Starting your job search two to three months before your OPT authorization begins ensures you can actually start on day one.
IT Security Analyst OPT: Frequently Asked Questions
Does IT Security Analyst qualify for the STEM OPT extension?
Yes, IT Security Analyst roles typically qualify for the 24-month STEM OPT extension when your degree is in a STEM-designated field such as cybersecurity, computer science, or information systems. Your university's DSO confirms eligibility based on your CIP code, not just your job title. If approved, you get up to three years of total OPT work authorization.
Do IT Security Analyst employers commonly sponsor H-1B visas?
Yes. IT Security Analyst is classified as a specialty occupation under H-1B rules because the role requires at least a bachelor's degree in a specific technical field. Employers in finance, healthcare, defense contracting, and enterprise tech sponsor this role regularly. Searching Migrate Mate filters for OPT-friendly and sponsorship-willing employers so you're not applying blind.
Can I work as an IT Security Analyst if my degree is in a related field like information systems or computer engineering?
Yes, as long as there's a logical connection between your degree field and the security analyst role, your OPT authorization covers it. USCIS and DSOs look for a reasonable relationship, not an exact match. A degree in information systems, network engineering, or computer science all support a security analyst job under OPT.
What happens to my OPT if my IT Security Analyst job ends?
You enter a 60-day unemployment grace period after your job ends. You can use this time to find a new position. OPT allows up to 90 days of cumulative unemployment during the initial 12-month authorization period, and up to 150 days during the STEM extension. Exceeding these limits violates your F-1 status, so tracking dates carefully matters.
Do IT Security Analyst roles at government contractors require a security clearance, and does that affect OPT eligibility?
Some roles require or prefer a security clearance, which is a separate federal process from your OPT work authorization. F-1 students on OPT are generally not eligible for most U.S. security clearances since clearance eligibility typically requires a green card or citizenship. However, many contractor roles in IT security do not require clearance, and those positions are fully accessible on OPT.