STEM OPT Cybersecurity Specialist Jobs
Cybersecurity Specialist roles in threat detection, vulnerability assessment, and security operations qualify for STEM OPT because they typically require a degree in computer science, information technology, or a related STEM field. Your 24-month STEM OPT extension gives you up to 36 months of work authorization, provided your employer is enrolled in E-Verify.
See All Cybersecurity Specialist JobsOverview
Showing 5 of 28+ Cybersecurity Specialist jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Cybersecurity Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Specialist roles.
Get Access To All Jobs
INTRODUCTION
About M.C. Dean
M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber-physical solutions for the nation’s most mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration.
Why Join Us?
Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values—agility, expertise, and trust—we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries.
ROLE AND RESPONSIBILITIES
As part of a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts.
Responsibilities:
- Working closely and supporting team members, vendors, and government customers
- Implementing DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems
- Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process
- Conducting ICS/SCADA system inventories following DoD guidance
- Conducting vulnerability scanning and document system vulnerabilities
- Supporting ISO standardization and Quality inspections
- Participating in continuous improvement of organizational cybersecurity posture
BASIC QUALIFICATIONS
Education:
- 3+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity
- 5+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity
- 8+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity
- 11+ Years with a High School Diploma/ GED
Required Progressive Experience:
- Working with industry and government agencies on the design of platforms and integrated systems
- Working on government and/or commercial projects implementing cybersecurity requirements in a variety of industrial control systems (e.g., building management, electronic security, fire alarm/mass notification, electrical distribution, power management, etc.)
- Proficiency with ACAS and HBSS and mitigation strategies
- Developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data
- Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS
- Establishing, managing, and tracking of Plan of Action & Milestones (POA&M)
- Applying STIGs to servers, databases, applications, and other hardware
- Security Readiness Review (SRR) Tools (scripts and ACAS)
- Ability to identify, maintain, and troubleshoot control network components
- Excellent understanding of the DoD RMF lifecycle and NIST 800-53 controls implementation
- Awareness of NIST Special Publication 800-82, Guide to Industrial Control Systems (ICS) Security and UFC 4-010-06 Unified Facilities Criteria (UFC) Cybersecurity of Facility
- Working knowledge of operational control systems and implementing a variety of security assessment tools
- Working knowledge of other operational control systems
- Familiarity with DoDIN CCRI/CCORI and CYBERCOM TASKORDS
- Familiarity with various industry products
One of the Required Certifications:
- CASP CE
- CISSP
- CISSP – ISSAP
- CISSP - ISSEP
- CSSLP
- CISA
- CISM
- GCED
- GCIH
Also:
- Strong Oral, Written and Presentation Skills with the ability and experience communicating directly with Customers
- Demonstrated background working with multidisciplinary teams
- Demonstrated time management and organization skills to meet deadlines and quality objectives
- Strong MS Excel, Word, PowerPoint, AUTOCAD, Cameo and Visio Skills is a plus.
Abilities:
- Exposure to computer screens for an extended period of time.
- Sitting for extended periods of time.
- Reach by extending hands or arms in any direction.
- Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard.
- Listen to and understand information and ideas presented through spoken words and sentences.
- Communicate information and ideas in speaking so others will understand.
- Read and understand information and ideas presented in writing.
- Apply general rules to specific problems to produce answers that make sense.
- Identify and understand the speech of another person.
See all Cybersecurity Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Specialist roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Cybersecurity Specialist
Verify your CIP code matches cybersecurity
Check that your degree's Classification of Instructional Programs code maps to a STEM-designated field like computer science, information security, or electrical engineering. Your DSO confirms the match before approving your STEM OPT extension request.
Confirm E-Verify enrollment before accepting offers
Ask hiring managers directly whether the specific legal entity making your offer is enrolled in E-Verify, not just a parent company. Enrollment must cover the worksite location where you'll be placed, including third-party client sites for consulting roles.
Target security teams at E-Verify-enrolled contractors
Federal contractors and subcontractors are legally required to use E-Verify, making them reliable targets. Defense, intelligence, and civilian agency contractors regularly hire cybersecurity analysts and are already compliant with the enrollment requirement.
Negotiate your I-983 training plan around real deliverables
Your employer must complete the I-983 before your STEM OPT begins. For cybersecurity roles, ground learning objectives in specific work products, such as incident response runbooks or penetration testing reports, so USCIS sees a genuine training relationship.
Use Migrate Mate to filter by E-Verify enrollment status
Search for Cybersecurity Specialist openings on Migrate Mate, which surfaces employers with verified E-Verify enrollment and LCA filing history so you're not cold-applying to companies that can't legally hire STEM OPT students.
File your extension 90 days before OPT expires
USCIS requires the STEM OPT extension application to be submitted no earlier than 90 days before your initial OPT end date. Missing this window ends your work authorization with no grace period for active employment.
Cybersecurity Specialist jobs are hiring across the US. Find yours.
Find Cybersecurity Specialist JobsFrequently Asked Questions
Does a cybersecurity degree qualify for the STEM OPT extension?
Yes, if your degree carries a STEM-designated CIP code. Degrees in computer science, information assurance, cybersecurity, electrical engineering, and related fields typically qualify. Your DSO will verify the CIP code against the Department of Homeland Security's STEM Designated Degree Program List before approving your extension request. Check your official transcript and confirm the match with your school's international student office before applying.
What does the I-983 training plan require for a Cybersecurity Specialist role?
The I-983 must describe how your day-to-day cybersecurity work relates to your STEM degree, list concrete learning objectives such as threat modeling or security architecture, and identify a supervising mentor. USCIS reviews whether the role provides genuine training, not just employment. Your employer signs the form, and you must report to your DSO every six months to confirm the training relationship remains active.
Does my employer need to be enrolled in E-Verify to hire me on STEM OPT?
Yes. E-Verify enrollment is a hard requirement for every employer that hires a STEM OPT student. The enrollment must cover the specific legal entity and worksite where you'll work. If you're placed at a client site through a staffing or consulting firm, both the staffing firm and the end client may need to satisfy this requirement depending on the employment structure. Confirm enrollment before your start date.
How does cap-gap protection apply if I'm a Cybersecurity Specialist waiting on an H-1B?
If your STEM OPT is still active when an H-1B petition is filed on your behalf for the following fiscal year, cap-gap automatically extends your OPT work authorization through September 30. You can continue working as a Cybersecurity Specialist during this period without interruption. USCIS issues a cap-gap extension on your I-20, which you should carry as proof of continued authorization.
Where can I find Cybersecurity Specialist jobs with employers already enrolled in E-Verify?
Migrate Mate surfaces Cybersecurity Specialist openings filtered by employers with E-Verify enrollment and active LCA filing history, so you can focus applications on companies already set up to hire STEM OPT students. This saves the back-and-forth of asking HR teams to confirm compliance status before you've even had a first interview.
See which Cybersecurity Specialist employers are hiring and sponsoring visas right now.
Search Cybersecurity Specialist Jobs