STEM OPT Cybersecurity Consultant Jobs
Cybersecurity Consultant roles qualify for STEM OPT when your degree falls under an eligible CIP code in computer science, information security, or a related field. Your employer must be enrolled in E-Verify, and the 24-month STEM OPT extension gives you up to 36 months total to build client-facing security experience while pursuing H-1B sponsorship.
See All Cybersecurity Consultant JobsOverview
Showing 5 of 81+ Cybersecurity Consultant jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 81+ Cybersecurity Consultant jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Consultant roles.
Get Access To All Jobs
Overview
Baker Tilly is a leading advisory, tax and assurance firm, providing clients with a genuine coast-to-coast and global advantage in major regions of the U.S. and in many of the world’s leading financial centers – New York, London, San Francisco, Los Angeles, Chicago and Boston. Baker Tilly Advisory Group, LP and Baker Tilly US, LLP (Baker Tilly) provide professional services through an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable laws, regulations and professional standards. Baker Tilly US, LLP is a licensed independent CPA firm that provides attest services to its clients. Baker Tilly Advisory Group, LP and its subsidiary entities provide tax and business advisory services to their clients. Baker Tilly Advisory Group, LP and its subsidiary entities are not licensed CPA firms.
Baker Tilly Advisory Group, LP and Baker Tilly US, LLP, trading as Baker Tilly, are independent members of Baker Tilly International, a worldwide network of independent accounting and business advisory firms in 141 territories, with 43,000 professionals and a combined worldwide revenue of $5.2 billion.
Please discuss the work location status with your Baker Tilly talent acquisition professional to understand the requirements for an opportunity you are exploring.
Baker Tilly is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability or protected veteran status, gender identity, sexual orientation, or any other legally protected basis, in accordance with applicable federal, state or local law.
Any unsolicited resumes submitted through our website or to Baker Tilly Advisory Group, LP, employee e-mail accounts are considered property of Baker Tilly Advisory Group, LP, and are not subject to payment of agency fees. In order to be an authorized recruitment agency ("search firm") for Baker Tilly Advisory Group, LP, there must be a formal written agreement in place and the agency must be invited, by Baker Tilly's Talent Attraction team, to submit candidates for review via our applicant tracking system.
JOB DESCRIPTION:
Are you interested in joining one of the fastest growing consulting and accounting firms in the country?
Would you like the ability to join a highly dynamic team focused on providing exceptional client service in the area of informational technology risk advisory?
If yes, consider joining Baker Tilly (BT) as an IT Audit, Cybersecurity & Risk Experienced Consultant! Our Risk Advisory practice provides a full spectrum of services to help our clients assess their risks, develop strategies to compete in an ever-changing business environment, and achieve their goals and objectives. All of this is accomplished through deep industry knowledge of risk, governance, internal audit, compliance, IT, and cybersecurity best practices.
As one of the fastest growing firms in the nation, BT has the ability to offer you upward career trajectory, flexibility in how and where you get your work done and meaningful relationships with clients, teammates and leadership who truly care about you and your development.
DOES THIS DESCRIBE YOU?
- You want to continue to expand your work experiences and hone your skills as an IT risk professional in the areas of compliance, cybersecurity, and internal controls.
- You crave the opportunity to be part of a fast growing, entrepreneurial risk consulting practice where your hard work and creativity will be rewarded.
- You do your best work when you are part of a talented, down-to-earth team that thrives in collaboration and truly enjoys working together.
- You feel valued when you are provided the resources and support to continually sharpen your technical skills and build your career now, for tomorrow.
WHAT YOU WILL DO:
- Work closely with client executives and management teams to understand their businesses and assist in identifying and managing financial and operational risks within their business systems to ensure technology risks are managed:
- Develop in-depth knowledge of clients’ businesses and industries by having direct client interaction while working on multiple aspects of an engagement.
- Think independently and strategically about your clients’ business, systems and risks providing recommendations for business and process improvements based upon knowledge gained relative to the client’s operations, processes and business objectives.
- Provide strategic business advice to clients by assisting in the implementation of new processes and controls that address key risks.
- Assess, manage and optimize information technology risk across a wide range of areas, including cybersecurity, IT strategy and governance, IT regulatory and compliance requirements, and business continuity.
- Review clients' processes and controls against industry frameworks, identifying gaps in design and execution, and communicating issues and recommendations to clients.
- Assist in the development of audit programs and the execution of internal audits and IT control assessments in the areas of:
- IT strategy and governance
- IT operations, business continuity and disaster recovery
- Cybersecurity
- Third party risk
- ITGC and application controls
- SOC reporting
- Regulatory and compliance requirements
- Assist in drafting comprehensive executive summaries and final reports for delivery to the client, documenting and reviewing engagement work papers in accordance with industry-accepted internal audit methodologies.
- Act as a valued business advisor, build relationships and communicate effectively with the client to provide superior client service.
-
Continue to develop your knowledge and experience working with a variety of technology environments, platforms, applications and tools/utilities.
-
Demonstrate the desire to continually grow, learn and develop skills and knowledge through external and internal education, training and cross-training opportunities to maximize personal contribution to the organizational goals and ongoing career development.
- Utilize your entrepreneurial skills to network and build strong relationships internally and externally with clients.
- Enjoy friendships, social activities and team outings that encourage a work-life balance.
SUCCESSFUL CANDIDATES WILL HAVE:
- Bachelor’s degree in management/computer information systems, computer science, accounting information systems, computer engineering, industrial engineering, or related program.
- CISA, CISSP, CISM, CIA, or CPA certification(s) preferred.
- 1+ year(s) experience with IT audit or cybersecurity, previous experienced performing SOX and SOC audits preferred.
- Experience as a client serving professional for a consulting firm desired.
- Excellent analytical, technical and problem solving skills, with strong attention to detail.
- Exceptional verbal and written communication, collaboration, and time management skills.
The pay rate range for this job position is $86,700 to $131,570. Actual compensation is influenced by a variety of relevant factors including but not limited to applicant’s skills, prior experience, qualifications, degrees, professional certifications, work arrangements and geographic location. Baker Tilly offers a comprehensive compensation and benefits package to eligible employees.
LI-LF2
LI-hybrid
See all 81+ Cybersecurity Consultant jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Consultant roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Cybersecurity Consultant
Verify your CIP code before applying
Check that your degree's CIP code appears on the STEM Designated Degree Program List maintained by USCIS. Information security and computer science codes qualify, but some adjacent business or management programs do not, which affects your extension eligibility entirely.
Confirm E-Verify enrollment before accepting offers
Ask your recruiter for the employer's E-Verify Company ID before signing anything. Consulting firms that staff you to clients must be enrolled as the employer of record, not the end client, and many candidates miss this distinction until the I-983 filing stage.
Build certifications that signal H-1B specialty occupation
Credentials like CISSP, CEH, or Security+ document that your role requires theoretical and practical expertise beyond a general degree. Cybersecurity Consultant positions face specialty occupation scrutiny at H-1B filing, so employer-recognized certifications strengthen the petition before you even receive an offer.
Target consulting firms with established STEM OPT pipelines
Use Migrate Mate to filter Cybersecurity Consultant openings by employers with active STEM OPT hiring history. Firms that have structured I-983 training plans already in place move you to offer faster and handle DSO reporting cycles without friction.
Structure your I-983 training plan around billable deliverables
Generic training objectives get flagged during DSO review. Map your learning goals directly to client engagement outcomes, such as penetration testing milestones or compliance audit deliverables, so your Form I-983 reflects actual consulting work rather than classroom-style tasks.
File your H-1B registration before OPT cap-gap risk emerges
STEM OPT cap-gap protection extends your authorization through September 30 if your H-1B is filed before your EAD expires. Cybersecurity Consultant roles on multi-month client engagements need continuity of authorization, so confirm your employer's H-1B filing timeline during the offer negotiation itself.
Cybersecurity Consultant jobs are hiring across the US. Find yours.
Find Cybersecurity Consultant JobsFrequently Asked Questions
Does a cybersecurity or information security degree qualify for the STEM OPT extension?
Yes, provided your degree's CIP code appears on the STEM Designated Degree Program List. Degrees in computer science, information assurance, cybersecurity, and network security typically qualify. Degrees in general business or management information systems may not, even if your coursework was technical. Confirm your specific CIP code with your DSO before applying for the extension, since USCIS ties eligibility to the code on your transcript, not the program title.
Does my consulting firm employer need to be enrolled in E-Verify even if I work at client sites?
Yes. E-Verify enrollment is required for your direct employer, meaning the consulting or staffing firm that issues your paycheck and W-2, not the end client where you perform the work. This distinction matters because many cybersecurity consultants are placed at financial institutions or government contractors whose own E-Verify status is irrelevant to your STEM OPT authorization. Verify the firm's E-Verify Company ID before signing your offer letter.
What goes into a valid I-983 training plan for a Cybersecurity Consultant role?
Your Form I-983 must identify the practical skills you will develop, the oversight structure your employer provides, and how the work relates to your STEM degree. For consulting roles, this means mapping training goals to specific deliverables such as vulnerability assessments, security architecture reviews, or compliance gap analyses rather than generic job duties. Your DSO and employer must both sign the plan, and the employer must submit a six-month evaluation during your extension period.
How does cap-gap protection work if my STEM OPT is still active when H-1B season begins?
If your employer files an H-1B petition on your behalf before your OPT EAD expires and USCIS receives it by April 1, cap-gap protection automatically extends your work authorization through September 30 of that year. For Cybersecurity Consultant roles on long-term client engagements, this continuity is critical. Your employer must confirm they will file in the regular cap season, since cap-exempt filings do not trigger cap-gap protection.
Where should I look for Cybersecurity Consultant jobs with employers who support STEM OPT?
Migrate Mate is built specifically for STEM OPT students and surfaces Cybersecurity Consultant roles at employers already enrolled in E-Verify. You can filter by employer type and hiring history so you spend your time on firms that have successfully onboarded STEM OPT students before, rather than educating recruiters about the program from scratch during early-stage interviews.
See which Cybersecurity Consultant employers are hiring and sponsoring visas right now.
Search Cybersecurity Consultant Jobs