STEM OPT Information Security Engineer Jobs
Information Security Engineer roles sit squarely within STEM OPT eligibility, letting you work for up to 36 months on your F-1 authorization if your employer is enrolled in E-Verify. A STEM degree in computer science, information assurance, or a related CIP-coded field unlocks the 24-month extension. Every employer on this page is verified to hire STEM OPT students.
See All Information Security Engineer JobsOverview
Showing 5 of 28+ Information Security Engineer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Information Security Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Engineer roles.
Get Access To All Jobs
Responsibilities:
- Conduct security assessments and risk analysis to identify vulnerabilities within the organization’s IT infrastructure.
- Implement, configure, and maintain security solutions, including Varonis SaaS, Mimecast, SecureWorks XDR and VDR, Cato Platform and Firewalls, Cato EPP, Cisco AMP, and Cisco Umbrella.
- Monitor and analyze security systems, identifying and responding to potential threats and incidents in a timely manner.
- Investigate security incidents, conduct forensic analysis, and implement corrective actions.
- Develop and maintain security policies, procedures, standards, and runbooks.
- Collaborate with cross-functional teams to ensure security best practices are integrated into all IT processes.
- Use threat hunting techniques to proactively identify and neutralize threats.
- Leverage cloud platforms (AWS, Azure) for security solutions and operations.
- Maintain a strong understanding of industry best practices and emerging threats.
- Use tools like LucidChart to create clear and concise security documentation and diagrams.
- Communicate complex technical information effectively to both technical and non-technical audiences.
- Collaborate within the organization using tools such as Microsoft Teams, OneDrive, and SharePoint.
Qualifications
- Bachelor’s degree in computer science, Information Security, or a related field, or equivalent practical experience.
- 3–5 years of experience in information security with a focus on threat detection and response.
- Hands-on experience with enterprise security tools such as Varonis SaaS, Mimecast, SecureWorks XDR/VDR, Cato Platform and Firewalls, Cato EPP, Cisco AMP, and Cisco Umbrella.
- Working knowledge of cloud security architecture (AWS, Azure).
- Familiarity with Linux administration; experience with Kali Linux is a plus.
- Strong analytical and problem-solving skills.
- Strong attention to detail and ability to work under pressure.
- Good written and verbal communication and interpersonal skills.
- Ability to thrive in a fast-paced, dynamic environment.
Preferred Qualifications:
- Certifications such as CISSP, CISA, CEH, CHFI, CISM, Security+, or CySA+.
- Experience with incident response and digital forensics.
- Scripting experience with Python, PowerShell, or Bash.
See all Information Security Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Engineer roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as an Information Security Engineer
Confirm your CIP code before applying
Pull up your transcript and cross-reference your degree's Classification of Instructional Programs code against the DHS STEM OPT designated degree list. Computer science, cybersecurity, and information assurance CIP codes all qualify, but information systems codes sometimes don't.
Screen employers for E-Verify enrollment first
Before any application, look up the employer in the E-Verify employer search tool to confirm active enrollment. An employer that isn't enrolled cannot legally hire you on STEM OPT, and retroactive enrollment after your start date won't satisfy the requirement.
Draft your I-983 training plan before offer stage
Security engineers often cover multiple domains like penetration testing, incident response, and cloud security. Map each responsibility to a specific learning objective in your I-983 draft now so negotiations over job duties don't delay your DSO's signature later.
Search Migrate Mate to filter verified STEM OPT employers
Use Migrate Mate to browse Information Security Engineer roles at employers already confirmed to hire STEM OPT students. Filtering by E-Verify status at the search stage saves you from pursuing leads that will stall at the authorization check.
Target companies with active security clearance pipelines
Defense contractors and federal IT vendors frequently hire information security engineers and tend to maintain continuous E-Verify enrollment as a government contracting requirement. That institutional enrollment habit reduces the risk of a last-minute E-Verify gap on your start date.
Negotiate your start date around OPT cap-gap timing
If your initial OPT expires while an H-1B petition is pending, the cap-gap rule extends your work authorization through September 30. Confirm with your DSO that your Information Security Engineer offer letter start date falls within that protected window before signing.
Information Security Engineer jobs are hiring across the US. Find yours.
Find Information Security Engineer JobsFrequently Asked Questions
Does an Information Security Engineer role qualify for STEM OPT?
Yes, if your underlying degree carries a qualifying CIP code. Degrees in computer science, cybersecurity, information assurance, and electrical engineering are on the DHS STEM designated degree list and support the 24-month STEM OPT extension. General information systems or business IT degrees may not qualify, so verify your specific CIP code with your DSO before accepting an offer.
What does the E-Verify requirement mean for my job search?
Every employer who hires you on STEM OPT must be enrolled in E-Verify for the specific site where you'll work. You can confirm enrollment through the E-Verify employer search tool before applying. If an employer is not enrolled, they cannot sponsor your STEM OPT extension regardless of how qualified you are. Use Migrate Mate to find Information Security Engineer roles at employers who already meet this requirement.
How does the I-983 training plan work for information security roles?
Your employer and DSO co-sign the I-983, which documents the formal training relationship between your security engineering duties and your STEM degree. You and your supervisor must complete a self-evaluation every six months and a full evaluation at the end of the training period. Information security roles with duties spread across multiple domains, such as cloud security, compliance, and incident response, require each area to be reflected in the I-983 learning objectives.
Can I switch employers mid-STEM OPT if I get a better security engineering offer?
Yes, but the transition requires your DSO to update your I-20 to reflect the new employer before your last day at the current job. The new employer must also be enrolled in E-Verify and willing to co-sign a revised I-983 training plan. There's no grace period between employers on STEM OPT, so the paperwork must be completed before your first day at the new company.
What happens to my STEM OPT authorization if an H-1B is filed on my behalf?
If your employer files an H-1B petition before your OPT expires and it's selected in the lottery, the cap-gap rule automatically extends your work authorization through September 30 of that year. You can keep working as an Information Security Engineer throughout that period without any interruption. USCIS issues a cap-gap extension automatically when the petition is timely filed, but confirm the status with your DSO so your I-20 reflects the extension correctly.
See which Information Security Engineer employers are hiring and sponsoring visas right now.
Search Information Security Engineer Jobs