IT Security Analyst Jobs for OPT Students
IT Security Analyst roles qualify for OPT work authorization under CIP codes in computer and information sciences. Most positions require a degree in cybersecurity, information systems, or a related field. STEM OPT extension eligibility gives you up to three years of authorized work, making you an attractive hire for employers building long-term security teams.
See All IT Security Analyst JobsOverview
Showing 5 of 82+ IT Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 82+ IT Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Analyst roles.
Get Access To All Jobs
Posting closes on 4/20/2026
The IT Security Analyst assists in day-to-day operations identifying, investigating and resolving security breaches detected by ARDOT security solutions. Other responsibilities will include contributing to the implementation of new security solutions and in the creation and or maintenance of policies, standards, baselines, guidelines and procedures, as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals.
Examples of Work
The following examples are intended only as illustrations of various types of work performed. No attempt is made to be exhaustive. Related, similar, or other logical duties are performed as assigned. The Department may require employees to perform functions beyond those contained in job descriptions. The Department may modify job descriptions based on Department needs. The Arkansas Department of Transportation is an "at will" employer.
- Contribute to the planning and design of enterprise security architecture based on industry-standard best practices.
- Contribute to the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures).
- Contribute to the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, where appropriate.
- Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
- Assist in formulating security solutions or enhancements to ensure new or existing platforms are implemented in line with security best practices and ARDOT policies.
- Assist in performing the deployment, integration and initial configuration of new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
- Recommend, schedule, and perform security improvements, upgrades, and/or purchases.
- Assist in the deployment, management and maintenance of security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
- Design and perform penetration testing of ARDOT systems in order to identify system vulnerabilities.
- Design, implement, and report on security system and end user activity audits.
- Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
- Download and test new security software and/or technologies.
- Provide technical assistance to junior members of the Information Technology Division.
- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
- Maintain operational configurations of all in-place security solutions as per the established baselines.
- Monitor all in-place security solutions for efficient and appropriate operations.
- Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise recommendations for appropriate resolution.
- Participate in investigations into problematic activity.
- Contribute in the design and execution of vulnerability assessments, penetration tests and security audits.
- Participate in team meetings and one-on-one manager/technician meetings.
- Participate or represent IT Security on assigned ARDOT projects.
- Perform other duties that may be assigned in the best interest of ARDOT and Information Technology Division.
Minimum Requirements
Education and experience: The educational equivalent to a bachelor’s degree from an accredited college or university in computer science, business administration, or related field of Information Technology application management or the educational equivalent to a high school diploma plus four years of computer related experience.
Knowledge, skills and abilities: Ability to facilitate relations between business groups and technology department. Ability to work both independently and in a team-oriented, collaborative environment. Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities. Ability to read communication styles of project team leads, team members, and contractors who come from a broad spectrum of disciplines. Ability to effectively manage conflict within team dynamics. Advanced interpersonal, written, and oral communication skills. Adept at conducting research into project-related issues and products. Must be able to learn, understand, and apply new technologies. Ability to effectively prioritize and execute tasks in a high-pressure environment.
Working conditions: Office environment.
("Accredited" means the educational institution or program is accredited by an accrediting organization recognized either by the United States Department of Education or by the Council for Higher Education Accreditation.)
A criminal background check will be required to determine suitability of employment, and failure to meet these standards may cause the applicant to be rejected or terminated from that position.
This position does not require theoretical and practical application of highly specialized knowledge or a bachelor’s degree or higher in the field; thus, this position is not eligible for H-1B visa sponsorship.

Posting closes on 4/20/2026
The IT Security Analyst assists in day-to-day operations identifying, investigating and resolving security breaches detected by ARDOT security solutions. Other responsibilities will include contributing to the implementation of new security solutions and in the creation and or maintenance of policies, standards, baselines, guidelines and procedures, as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals.
Examples of Work
The following examples are intended only as illustrations of various types of work performed. No attempt is made to be exhaustive. Related, similar, or other logical duties are performed as assigned. The Department may require employees to perform functions beyond those contained in job descriptions. The Department may modify job descriptions based on Department needs. The Arkansas Department of Transportation is an "at will" employer.
- Contribute to the planning and design of enterprise security architecture based on industry-standard best practices.
- Contribute to the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures).
- Contribute to the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, where appropriate.
- Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
- Assist in formulating security solutions or enhancements to ensure new or existing platforms are implemented in line with security best practices and ARDOT policies.
- Assist in performing the deployment, integration and initial configuration of new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
- Recommend, schedule, and perform security improvements, upgrades, and/or purchases.
- Assist in the deployment, management and maintenance of security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
- Design and perform penetration testing of ARDOT systems in order to identify system vulnerabilities.
- Design, implement, and report on security system and end user activity audits.
- Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
- Download and test new security software and/or technologies.
- Provide technical assistance to junior members of the Information Technology Division.
- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
- Maintain operational configurations of all in-place security solutions as per the established baselines.
- Monitor all in-place security solutions for efficient and appropriate operations.
- Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise recommendations for appropriate resolution.
- Participate in investigations into problematic activity.
- Contribute in the design and execution of vulnerability assessments, penetration tests and security audits.
- Participate in team meetings and one-on-one manager/technician meetings.
- Participate or represent IT Security on assigned ARDOT projects.
- Perform other duties that may be assigned in the best interest of ARDOT and Information Technology Division.
Minimum Requirements
Education and experience: The educational equivalent to a bachelor’s degree from an accredited college or university in computer science, business administration, or related field of Information Technology application management or the educational equivalent to a high school diploma plus four years of computer related experience.
Knowledge, skills and abilities: Ability to facilitate relations between business groups and technology department. Ability to work both independently and in a team-oriented, collaborative environment. Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities. Ability to read communication styles of project team leads, team members, and contractors who come from a broad spectrum of disciplines. Ability to effectively manage conflict within team dynamics. Advanced interpersonal, written, and oral communication skills. Adept at conducting research into project-related issues and products. Must be able to learn, understand, and apply new technologies. Ability to effectively prioritize and execute tasks in a high-pressure environment.
Working conditions: Office environment.
("Accredited" means the educational institution or program is accredited by an accrediting organization recognized either by the United States Department of Education or by the Council for Higher Education Accreditation.)
A criminal background check will be required to determine suitability of employment, and failure to meet these standards may cause the applicant to be rejected or terminated from that position.
This position does not require theoretical and practical application of highly specialized knowledge or a bachelor’s degree or higher in the field; thus, this position is not eligible for H-1B visa sponsorship.
How to Get Visa Sponsorship as an IT Security Analyst
Prioritize employers with active security clearance pipelines
Defense contractors and federal IT vendors regularly hire for security analyst roles and have established visa sponsorship infrastructure. These employers understand long-term authorization timelines better than companies hiring their first international candidate.
Stack certifications that reduce employer hiring risk
CompTIA Security+, CySA+, and CEH signal job-readiness to employers who may be unfamiliar with OPT. Certified candidates are easier to justify internally when a hiring manager needs approval to sponsor a work visa down the line.
Target mid-size companies with dedicated security teams
Large enterprises have HR processes for sponsorship. Mid-size firms with five or more security headcount are often underserved and more willing to invest in retaining a strong analyst candidate through the H-1B process.
Frame your international background as a security asset
Multilingual candidates with cross-border compliance awareness can support global security operations. Positioning your background this way shifts the conversation from your visa status to the specific value you bring to a security team.
Apply before your OPT start date if possible
Many IT security roles require background checks and onboarding that take four to six weeks. Starting your job search two to three months before your OPT authorization begins ensures you can actually start on day one.
IT Security Analyst jobs are hiring across the US. Find yours.
Find IT Security Analyst JobsSee all 82+ IT Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Analyst roles.
Get Access To All JobsFrequently Asked Questions
Does IT Security Analyst qualify for the STEM OPT extension?
Yes, IT Security Analyst roles typically qualify for the 24-month STEM OPT extension when your degree is in a STEM-designated field such as cybersecurity, computer science, or information systems. Your university's DSO confirms eligibility based on your CIP code, not just your job title. If approved, you get up to three years of total OPT work authorization.
Do IT Security Analyst employers commonly sponsor H-1B visas?
Yes. IT Security Analyst is classified as a specialty occupation under H-1B rules because the role requires at least a bachelor's degree in a specific technical field. Employers in finance, healthcare, defense contracting, and enterprise tech sponsor this role regularly. Searching Migrate Mate filters for OPT-friendly and sponsorship-willing employers so you're not applying blind.
Can I work as an IT Security Analyst if my degree is in a related field like information systems or computer engineering?
Yes, as long as there's a logical connection between your degree field and the security analyst role, your OPT authorization covers it. USCIS and DSOs look for a reasonable relationship, not an exact match. A degree in information systems, network engineering, or computer science all support a security analyst job under OPT.
What happens to my OPT if my IT Security Analyst job ends?
You enter a 60-day unemployment grace period after your job ends. You can use this time to find a new position. OPT allows up to 90 days of cumulative unemployment during the initial 12-month authorization period, and up to 150 days during the STEM extension. Exceeding these limits violates your F-1 status, so tracking dates carefully matters.
Do IT Security Analyst roles at government contractors require a security clearance, and does that affect OPT eligibility?
Some roles require or prefer a security clearance, which is a separate federal process from your OPT work authorization. F-1 students on OPT are generally not eligible for most U.S. security clearances since clearance eligibility typically requires a green card or citizenship. However, many contractor roles in IT security do not require clearance, and those positions are fully accessible on OPT.
See which IT Security Analyst employers are hiring and sponsoring visas right now.
Search IT Security Analyst Jobs