STEM OPT Information Security Analyst Jobs
Information Security Analyst roles qualify for the STEM OPT extension, giving you up to 24 additional months of work authorization beyond your initial OPT period. Your employer must be enrolled in E-Verify, and your degree in computer science, cybersecurity, or a related STEM field must align with the role's CIP code requirements.
See All Information Security Analyst JobsOverview
Showing 5 of 19+ Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Analyst roles.
Get Access To All Jobs
INTRODUCTION
Imagine what you can do here. Apple is a place where extraordinary people gather to do their lives best work. Together we create products and experiences people once couldn’t have imagined, and now, can’t imagine living without. It’s the diversity of those people and their ideas that inspires the innovation that runs through everything we do.
Description
APPLE INC has the following available in Cupertino, California and various unanticipated locations throughout the USA. Lead IT SOX Audit and financial audit day-to-day audit tasks, including interacting with auditors and collecting necessary IT evidence. Interpret large sets of customer and transactional data set, lead meetings with IT cross-functional IT engineering team, collaborate with engineers and communicate issues to various stakeholders, providing feedback and challenge auditor issues. Investigate and understand Apple Services systems and processes for SOX. Meet Direct Responsible Individuals throughout Apple Services Engineering (ASE) to gain understanding of Apple Services to assist in writing SOX narratives, identify key IT controls, and develop testing procedures for key internal IT controls. Gain technical understanding of ASE systems through evaluating and defining IT general controls. Work collaboratively with BAC and the ASE SOX Program Manager to finalize controls and procedures for IT controls to minimize and address significant IT financial risks that prevent Millions of dollars in frauds. Perform SOX testing for the gift card business. Manage user access to internal system that is the core business for Apple Customer Support retail team members as well as internal employees, contractors, and vendor for the entire Apple Services business. Perform User Access Review, creating user reports and analytics as well as distributing lists to be reviewed and following up to ensure it’s completed by different role approvers, to ensure privacy as well as authorized access to sensitive internal system and customer PII information. 40 hours/week. At Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $178,506 - $207,300/yr and your base pay will depend on your skills, qualifications, experience, and location.
PAY & BENEFITS: Apple employees also have the opportunity to become an Apple shareholder through participation in Apple’s discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple’s Employee Stock Purchase Plan. You’ll also receive benefits including: Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses - including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation. Learn more about Apple Benefits: https://www.apple.com/careers/us/benefits.html.
Note: Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program.
MINIMUM QUALIFICATIONS
Bachelor’s degree or foreign equivalent in Business Administration or a related field and 2 years of experience in the job offered or related occupation.
2 years of experience with each of the following skills is required:
- Working understanding of Sarbanes Oxley requirements, including risk and control design and operating effectiveness testing.
- Understanding and communicating the “audit language” with both external and internal parties.
- Performing risk assessments and audits of Information Technology General Controls that apply to all systems, components, processes and data ensuring the physical & environmental security, software implementation, logical security, backup and recovery, incident management, computing infrastructure and information/data security.
- Reading and understanding programming language including Java and C++ while navigating software repositories including GitHub.
- Applying data scientist skills including utilizing SQL for data mining, writing queries for audit requests and providing business insights on mined data.
- Utilizing Excel and Tableau for ad hoc analysis and reporting.
- Leading collaborations between IT and Business stakeholders to implement contractual and regulatory requirements for customer facing and internal corporate systems.
- Developing business process solutions within high tech industry with a focus on minimizing corporate risks.
- Understanding and translating contractual language and implementing business process and technological requirements.
- Utilizing knowledge of financial accounting systems, including financial configuration, as well as a working knowledge of financial transactions, profit and loss, and balance statement reporting.
PREFERRED QUALIFICATIONS
N/A
See all Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Analyst roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as an Information Security Analyst
Verify your CIP code before applying
Cross-check your degree's CIP code against the DHS STEM Designated Degree Program List to confirm it qualifies for the 24-month extension. Cybersecurity and computer science degrees typically qualify, but information systems degrees vary by institution.
Filter jobs by E-Verify status first
Use Migrate Mate to search Information Security Analyst roles filtered by employers enrolled in E-Verify, the legal prerequisite for your STEM OPT extension. Applying to non-enrolled employers wastes your OPT clock on roles that can't authorize you.
Target employers with active security clearance pipelines
Federal contractors and defense firms hiring Information Security Analysts routinely use E-Verify because federal contracts require it. These employers are structurally more likely to be STEM OPT-compliant than startups or small businesses.
Draft your I-983 training plan before the offer stage
Employers unfamiliar with STEM OPT often stall at the I-983 requirement. Arrive at the offer conversation with a draft training plan tied to specific security analyst competencies so your employer can review and sign without delay.
Confirm your role maps to O*NET code 15-1212
Pull the O*NET profile for Information Security Analysts and document how your job duties match the listed tasks and knowledge areas. USCIS and your DSO may request this alignment to validate your training plan during the extension filing.
Request written E-Verify enrollment confirmation early
Ask your recruiter or HR contact for the employer's E-Verify company ID or a screenshot of their enrollment status before you accept an offer. Verbal assurances aren't enough, and your DSO needs documented proof to process your extension application.
Information Security Analyst jobs are hiring across the US. Find yours.
Find Information Security Analyst JobsFrequently Asked Questions
Does an Information Security Analyst role qualify for the STEM OPT extension?
Yes, Information Security Analyst positions qualify for the 24-month STEM OPT extension when your degree is in a DHS-designated STEM field such as computer science, cybersecurity, or information technology, and your CIP code appears on the STEM Designated Degree Program List. Your DSO will verify the degree-to-role alignment when processing your extension through SEVIS.
How do I confirm my employer is enrolled in E-Verify?
You can search the E-Verify employer search tool by company name to check enrollment status. Enrollment is a strict legal requirement for STEM OPT employers, not optional. If a company isn't listed, they can't legally employ you under the STEM OPT extension, even if they're willing to sign your I-983 training plan. Always verify before accepting an offer.
What goes into the I-983 training plan for an Information Security Analyst?
Your I-983 must describe how the role develops practical skills tied to your STEM degree, including specific learning objectives, supervision structure, and evaluation methods. For Information Security Analysts, this typically covers security operations, risk assessment, vulnerability management, and incident response. Your employer signs the form and your DSO submits it as part of the extension application to USCIS.
What happens to my work authorization if my employer's H-1B petition is selected in the lottery?
If your employer files an H-1B petition during your STEM OPT period and it's selected, cap-gap protection automatically extends your OPT work authorization through September 30 of that year while USCIS adjudicates the petition. You don't need to take any action beyond ensuring your employer files before your OPT EAD expires. USCIS guidance covers the specific conditions that apply.
Where can I find Information Security Analyst jobs where the employer is already set up for STEM OPT?
Migrate Mate lets you search Information Security Analyst roles filtered specifically for E-Verify-enrolled employers, so you're not wasting time applying to companies that can't legally authorize your STEM OPT extension. The platform surfaces employers with demonstrated hiring history for international candidates, which reduces the back-and-forth around I-983 compliance at the offer stage.
See which Information Security Analyst employers are hiring and sponsoring visas right now.
Search Information Security Analyst Jobs