STEM OPT Information Security Officer Jobs
Information Security Officer roles qualify for STEM OPT because they sit squarely within computer science, engineering, and related CIP-coded degree fields. Your 24-month STEM OPT extension gives you up to 36 months total to work for any employer enrolled in E-Verify, the federal requirement for all STEM OPT positions.
See All Information Security Officer JobsOverview
Showing 5 of 9+ Information Security Officer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Information Security Officer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Officer roles.
Get Access To All Jobs
What makes this role important at Ipsos?
Ipsos is seeking a motivated team player to join the Ipsos Global Information Security team in the USA. Reporting to the Global Head of Information Security, as an Information Security Officer, and being part of the Global Information Security team, you will be responsible for monitoring, maintaining and managing Ipsos’s Information Security policies, controls and processes as well as working closely with the US business team in making Ipsos’s information security program a selling point to our end clients.
What you can expect to be doing:
- Plan, implement, and sustain ISO 27001 security controls as per the standard.
- Oversee and manage information security projects across their lifecycle.
- Develop and enforce information security policies, procedures, and processes.
- Conduct risk assessments and snap audits for potential security threats.
- Coordinate internal and external audits for compliance and certification and manage business continuity plans.
- Develop and maintain Business continuity plan and conduct tabletop exercise for BCDR scenarios.
What success in this role looks like:
- Successful implementation of ISO 27001 controls.
- Completion of a variety of security projects on time and within budget.
- Effective mitigation of security threats, identified through risk assessments.
- Effective management of client security compliance requests.
This might be the job for you if you have:
- 3+ years of experience in information security within an industry.
- Relevant degree in IT, cybersecurity, or related field.
- ISO 27001 implementation experience.
- Risk management strategies.
- Experience with incident response plans.
- Strong communication skills.
- Excellent analytical and problem-solving skills.
- Ability to work collaboratively across diverse teams.
If you don’t meet 100% of the requirements, we encourage all who feel they might be a fit for the opportunity to apply. We may consider a variety of backgrounds for a particular role and are also committed to considering candidates for available positions throughout our organization, not just the one you’re applying to!
In accordance with NY/CO/CA/WA law, the estimated base salary range for this role is $100,000 to $105,000. Your final base salary will be determined based on several non-discriminatory factors which may include but are not limited to location, work experience, skills, knowledge, education and/or certifications.
What’s in it for you:
At Ipsos you’ll experience opportunities for Career Development, an exceptional benefits package (including generous PTO, healthcare plans, wellness benefits), a flexible workplace policy, and a strong collaborative culture.
Commitment to Diversity
Ipsos recognizes the necessity of building an inclusive culture that values each employee’s individuality and diverse perspectives. For more than 40 years, our mission has been to generate and analyze data about society, markets, brands, and behaviors to provide our clients with the insights that elevate their understanding of the world. This could not be fulfilled without Ipsos’ diverse employees who compile and analyze this data—they are the essence of who we are and what we do.
We are committed to providing equal opportunity to all employees, creating an environment that promotes inclusion, and enabling employees from all walks of life to flourish. Ipsos encourages our employees to act in a respectful and responsible manner, in line with code of best practices concerning diversity and inclusion, human rights, equality, and civility for every individual.
Ipsos is An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or any other protected class and will not be discriminated against on the basis of disability.
LI-AD1 #LI-Hybrid
See all Information Security Officer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Officer roles.
Get Access To All JobsTips for Finding STEM OPT Authorization in Information Security Officer
Verify your degree's CIP code eligibility
Check your degree's Classification of Instructional Programs code against the official STEM Designated Degree Program List that USCIS maintains. Computer science, cybersecurity, and information assurance degrees typically qualify, but general business IT degrees sometimes don't.
Confirm E-Verify enrollment before applying
Every employer hiring you on STEM OPT must be enrolled in E-Verify before your training plan is submitted. Search the E-Verify employer search tool to confirm enrollment status before investing time in an application or interview process.
Target firms with active security clearance programs
Defense contractors, federal IT consultancies, and financial institutions routinely sponsor STEM OPT holders for Information Security Officer roles because cleared positions have dedicated hiring pipelines. These employers already understand multi-step authorization processes and file I-983 training plans regularly.
Structure your I-983 around measurable security outcomes
Your DSO and employer co-sign the I-983 training plan, which must list specific learning objectives tied to your STEM degree. Frame goals around incident response metrics, vulnerability assessment cycles, or compliance frameworks rather than vague on-the-job learning.
Search Migrate Mate to filter for E-Verify employers
Use Migrate Mate to find Information Security Officer roles at employers already verified for STEM OPT hiring. The platform surfaces DOL Labor Condition Application data so you can identify which companies have active sponsorship history before you apply.
File your STEM OPT extension 90 days before OPT expires
USCIS requires your STEM OPT extension application to be submitted no earlier than 90 days before your initial OPT end date. Missing this window forces a gap in work authorization, so coordinate with your DSO and confirm your employer's I-983 signature well in advance.
Information Security Officer jobs are hiring across the US. Find yours.
Find Information Security Officer JobsFrequently Asked Questions
Does an Information Security Officer role qualify for the STEM OPT extension?
Yes, provided your underlying degree is in a qualifying STEM field such as computer science, cybersecurity, information assurance, or a related CIP-coded program on the USCIS STEM Designated Degree Program List. The role itself must also be directly related to that degree. Your DSO will verify the connection between your degree and the position when approving your I-983 training plan.
What does my employer need to do to hire me on STEM OPT as an Information Security Officer?
Your employer must be enrolled in E-Verify before your STEM OPT extension begins. They also need to co-sign your I-983 training plan, which outlines learning goals tied to your STEM degree, your supervision structure, and how the role advances your training. The employer must report any material changes to your DSO within five business days of those changes occurring.
How does the I-983 training plan apply specifically to an Information Security Officer position?
The I-983 must document how your Information Security Officer duties directly relate to your STEM degree. Effective plans for this role include objectives such as conducting vulnerability assessments, implementing security frameworks like NIST or ISO 27001, or managing incident response protocols. Generic job descriptions don't satisfy USCIS requirements, so your plan needs measurable, degree-specific learning goals that your supervisor can evaluate.
What happens to my STEM OPT authorization if my employer loses E-Verify enrollment?
If your employer's E-Verify enrollment lapses or is terminated, you're no longer authorized to work for them under STEM OPT, even if your EAD is still valid. You must either find a new E-Verify-enrolled employer or stop working immediately. USCIS treats continued employment without a compliant employer as a status violation, so monitor your employer's E-Verify status throughout your extension period.
Where can I find Information Security Officer jobs at employers set up for STEM OPT hiring?
Migrate Mate lists Information Security Officer roles at employers with documented sponsorship history, using DOL Labor Condition Application data to show which companies actively hire international students. Filtering for E-Verify-enrolled employers saves time and helps you focus applications on organizations already familiar with the I-983 training plan process and STEM OPT compliance requirements.
See which Information Security Officer employers are hiring and sponsoring visas right now.
Search Information Security Officer Jobs