OPT Security Researcher Jobs
Security Researcher jobs on OPT are available at defense contractors, tech companies, and government-adjacent firms. Many roles qualify as STEM OPT, giving you up to three years of work authorization. Strong candidates typically hold degrees in computer science, cybersecurity, or electrical engineering and have hands-on research experience.
See All OPT Security Researcher JobsOverview
Showing 5 of 40+ Security Researcher jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 40+ Security Researcher Jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Researcher roles.
Get Access To All Jobs
The application window is expected to close on: 06/05/2026. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received.
This is a fully remote role based in the United States.
Meet The Team
As a member of Talos, you will support cutting edge detection and mitigation technologies. You will work towards keeping yourself abreast of the latest industry threat creation and defense techniques, and you will develop proof-of-concept solutions, provide domain expertise and guide implementation to facilitate successful security posture in of Cisco’s products.
If you enjoy vulnerability research, crash analysis, reverse engineering, and researching new techniques and writing tools to automate these tasks, this job is for you!
Your Impact
- Security research including development of tools for vulnerability analysis and mitigation.
- Development of static and run-time analysis tools to figure out root cause and input conditions related to a vulnerability.
- Vulnerability triage and proof of concept exploit development to support the creation of detection content.
- Write detailed technical reports, summaries, and testing methodologies.
- Research emerging technologies, protocols, and testing methodologies.
- Develop proof of concept exploits for testing vulnerability mitigations.
- Perform patch analysis to find and trigger vulnerabilities.
- Reverse engineer binary applications, protocols, and formats.
- Analyze vulnerabilities and emerging security threats and technologies.
- Provide critical security focused expertise to engineering organizations.
Minimum Qualifications
- 3+ years of experience in vulnerability research or a closely related area such as exploit or mitigation development on Linux Systems.
- 3+ years’ experience with C/C++, and a scripting language (e.g., Python), and assembly (e.g., x86/x64, ARM, etc.).
Preferred Qualifications
- Bachelor’s degree or equivalent in Computer Science, Electrical Engineering, Cyber Security, or other tech-related degree.
- Experience with Linux internals.
- Experience with binary auditing and reverse engineering, and with related tools such as IDA Pro, Binary Ninja, Ghidra, etc. and with plugin development.
- Experience with common vulnerabilities and methods of exploitation, such as memory corruption, web application exploitation, file format vulnerabilities, protocol-based weaknesses, etc.
- Knowledge of common file formats, network protocol structures, and enterprise networking architecture.
- Ability to work independently with minimum supervision and to tackle additional tasks as the need arises.
Why Cisco?
At Cisco, we’re revolutionizing how data and infrastructure connect and protect organizations in the AI era – and beyond. We’ve been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you’ll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
Message to applicants applying to work in the U.S. and/or Canada:
The starting salary range posted for this position is $146,700.00 to $214,800.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco’s plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco’s policies:
- 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees.
- 1 paid day off for employee’s birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco.
- Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees.
- Exempt employees participate in Cisco’s flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations).
- 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next.
- Additional paid time away may be requested to deal with critical or emergency issues for family members.
- Optional 10 paid days per full calendar year to volunteer.
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco’s policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
- .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
- 1.5% of incentive target for each 1% of attainment between 50% and 75%;
- 1% of incentive target for each 1% of attainment between 75% and 100%; and
- Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$165,000.00 - $277,600.00
Non-Metro New York state & Washington state:
$146,700.00 - $247,000.00
- For quota-based sales roles on Cisco’s sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
See all 40+ OPT Security Researcher Jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new OPT Security Researcher Jobs.
Get Access To All JobsTips for Finding OPT Sponsorship in Security Researcher
Lead with published research
CVEs you've discovered, conference papers, or open-source security tools carry more weight than coursework alone. Document your research output clearly. Employers in this space hire for demonstrated capability, not just credentials.
Clarify your STEM OPT timeline upfront
Security research roles almost always qualify for the 24-month STEM OPT extension, giving you three years total. Confirming this early removes a common objection and signals you understand your own work authorization status.
Target employers with existing cleared research programs
Defense contractors and security consultancies already sponsor security staff regularly. They have legal and HR infrastructure in place, which makes sponsorship conversations far less complicated than approaching companies with no prior experience.
Highlight offensive and defensive research skills separately
Employers distinguish between penetration testing, vulnerability research, malware analysis, and threat intelligence. Be explicit about your specialization. Generalist descriptions make it harder for hiring managers to assess fit quickly.
Address security clearance eligibility honestly
Many federal research roles require clearances that non-citizens cannot currently hold. Focus applications on commercial security research, private sector red teams, and civilian-facing roles where clearance is not a listed requirement.
Network through security conferences and CTF communities
DEF CON, Black Hat, and capture-the-flag communities are where hiring decisions start. Presenting research or placing well in competitions puts your name in front of hiring managers before a job posting ever goes live.
Security Researcher OPT: Frequently Asked Questions
Do Security Researcher jobs qualify for the STEM OPT extension?
Most Security Researcher positions qualify for the 24-month STEM OPT extension because the role typically requires a degree in computer science, cybersecurity, electrical engineering, or a related STEM field. You need to confirm your degree CIP code is on the STEM designated degree program list and that your employer meets the E-Verify requirement before filing the extension.
Can I work as a Security Researcher on OPT without a security clearance?
Yes. Many security research positions in the private sector, including roles at tech companies, financial institutions, and cybersecurity consultancies, do not require a security clearance. Federal government roles and some defense contractor positions do require clearances that are generally unavailable to non-citizens on OPT, so filtering for commercial sector roles is the practical approach. Migrate Mate lists OPT-friendly security research roles where clearance is not a barrier.
What degree fields best support an OPT Security Researcher application?
Computer science, cybersecurity, information security, electrical engineering, and computer engineering are the most common qualifying degree fields. Some employers also accept applied mathematics or software engineering degrees when paired with strong research experience. The degree must appear on SEVIS as your program of study, and it should align with the specific research domain the role covers.
How do employers typically verify OPT work authorization for this role?
Employers will ask to see your EAD card, which serves as your work authorization document, and will run E-Verify as required for STEM OPT employers. Some security-focused employers also request your I-20 to confirm your STEM OPT approval and end date. Having these documents ready before your start date prevents onboarding delays.
What types of companies sponsor Security Researchers on OPT?
Commercial cybersecurity firms, large technology companies, financial services security teams, healthcare organizations with dedicated security programs, and independent research labs are the most active sponsors. These employers regularly hire international researchers and are accustomed to OPT timelines. Browsing roles on Migrate Mate lets you filter specifically for positions open to OPT candidates so you are not spending time on applications that will not move forward.