STEM OPT IT Security Analyst Jobs
IT Security Analyst roles qualify for the 24-month STEM OPT extension if your degree falls under an eligible CIP code in computer science, cybersecurity, or information technology. Your employer must be enrolled in E-Verify and sign your I-983 training plan. That gives you up to 36 months of OPT work authorization to build hands-on security experience.
See All IT Security Analyst JobsOverview
Showing 5 of 34+ IT Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 34+ IT Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Analyst roles.
Get Access To All Jobs
Position Type:
Full time
Type Of Hire:
Experienced (relevant combo of work and education)
Education Desired:
Bachelor of Information Technology
Travel Percentage:
0%
Job Description
We are FIS. Our technology powers the world’s economy and our teams bring innovation to life. We champion diversity to deliver the best products and solutions for our colleagues, clients and communities. If you’re ready to start learning, growing and making an impact with a career in fintech, we’d like to know: Are you FIS?
About the role:
As an IT Security Analyst with FIS, your skills will be put to the test on the front lines of cyber-crime. Information security is at the heart of fintech and you’ll help protect and secure highly-sensitive financial data for customers around the world.
About the team:
SIEM Engineering team is based in 3 locations USA, UK and India. We manage, deploy and expand SIEM/Data Science/observability tools in FIS. Our responsibilities include security log collection, parsing collected logs, helping with content development, maintain high availability of SIEM/Data science/observability tools etc.
What you will be doing:
- Implementing information security controls and preventing hackers from infiltrating company information and jeopardizing programs.
- Administration of SIEM and Observability platforms
- Working with the user community to understand security needs.
- Proactively handles security vulnerabilities and responds to active threats
What you will need:
- Knowledge of network and security technologies.
- Knowledge of cloud infrastructure and cloud logs integration with SIEM
- Experience with SIEM design and engineering.
- A bachelor's in computer science or a related field, or the equivalent experience.
Added bonus if you have:
- Hands on experience on Cribl, cloud technologies like GCP, Azure, Aws, API for log collection, Logscale.
What we offer you:
At FIS, you can learn, grow and make an impact in your career. Our benefits include:
- Flexible and creative work environment
- Diverse and collaborative atmosphere
- Professional and personal development resources
- Opportunities to volunteer and support charities
- Competitive salary and benefits
Privacy Statement
FIS is committed to protecting the privacy and security of all personal information that we process in order to provide services to our clients. For specific information on how FIS protects personal information online, please see the Online Privacy Notice.
EEOC Statement
FIS is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, genetic information, national origin, disability, veteran status, and other protected characteristics. The EEO is the Law poster is available here supplement document available here
For positions located in the US, the following conditions apply. If you are made a conditional offer of employment, you will be required to undergo a drug test. ADA Disclaimer: In developing this job description care was taken to include all competencies needed to successfully perform in this position. However, for Americans with Disabilities Act (ADA) purposes, the essential functions of the job may or may not have been described for purposes of ADA reasonable accommodation. All reasonable accommodation requests will be reviewed and evaluated on a case-by-case basis.
Sourcing Model
Recruitment at FIS works primarily on a direct sourcing model; a relatively small portion of our hiring is through recruitment agencies. FIS does not accept resumes from recruitment agencies which are not on the preferred supplier list and is not responsible for any related fees for resumes submitted to job postings, our employees, or any other part of our company.
pridepass
See all 34+ IT Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Analyst roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as an IT Security Analyst
Verify your degree's CIP code eligibility
Check that your degree's Classification of Instructional Programs code appears on the official STEM Designated Degree Program List. Computer science, cybersecurity, and information systems degrees typically qualify, but program names vary by school and can affect your extension eligibility.
Confirm E-Verify enrollment before accepting offers
Ask your recruiter or HR contact directly whether the company is enrolled in E-Verify before you advance past the offer stage. STEM OPT requires E-Verify enrollment, and not every employer with a security practice has completed that registration.
Target employers with active security clearance pipelines
Federal contractors and defense-adjacent firms file LCAs for IT Security Analyst roles at high volume. Filter for employers who have filed recent LCAs through DOL, since active filings signal they already know the paperwork requirements for employing F-1 students.
Search Migrate Mate for E-Verify verified security roles
Filter your search on Migrate Mate to surface IT Security Analyst positions at employers already enrolled in E-Verify. That single filter removes the friction of vetting each company manually and keeps your application pipeline focused on eligible roles.
Structure your I-983 training plan around SOC code duties
When drafting your I-983 with your employer, align the listed training goals to the SOC 15-1212 duties documented in O*NET. Supervisors unfamiliar with I-983 requirements respond better when the training objectives map directly to defined job tasks rather than generic skill goals.
Time your extension request against your OPT end date
Your DSO must recommend the STEM OPT extension at least 90 days before your current OPT EAD expires. File the I-765 with USCIS promptly after that recommendation, since USCIS processing can run several months and a late filing risks a work authorization gap.
IT Security Analyst jobs are hiring across the US. Find yours.
Find IT Security Analyst JobsFrequently Asked Questions
Does an IT Security Analyst role qualify for the STEM OPT extension?
Yes, if your employer is enrolled in E-Verify and your degree carries an eligible CIP code. IT Security Analyst positions fall under SOC code 15-1212, and degrees in computer science, cybersecurity, information systems, or closely related STEM fields typically qualify. Confirm your specific CIP code on the official STEM Designated Degree Program List maintained by the Department of Homeland Security.
What does the I-983 training plan cover for an IT Security Analyst position?
The I-983 documents the practical training your employer will provide, how it connects to your STEM degree, and how your supervisor will evaluate your progress. For IT Security Analyst roles, training goals typically cover threat monitoring, vulnerability assessment, incident response, or security compliance work. Your employer signs the form, and your DSO submits it to update your SEVIS record before your extension begins.
How do I verify that a potential employer is enrolled in E-Verify?
Ask HR or your recruiter directly whether the company has an active E-Verify account, and request the E-Verify company ID if you want to confirm enrollment. E-Verify enrollment is a hard requirement for STEM OPT employers, not an optional credential. Some employers in the security sector are enrolled at the parent company level but not at subsidiary locations, so ask specifically about the office where you would work.
Can I work as an IT Security Analyst while my STEM OPT extension application is pending?
Yes, if you filed your I-765 before your current OPT EAD expired, the cap-gap provision extends your work authorization automatically while USCIS adjudicates your application. Your authorization is tied to the timely and pending status of your extension filing. Carry your SEVIS I-20 showing the DSO-recommended extension alongside your expired EAD as combined proof of continued authorization.
Where can I find IT Security Analyst jobs where the employer already understands STEM OPT requirements?
Migrate Mate filters IT Security Analyst listings to show employers enrolled in E-Verify, which removes the most common hiring obstacle for STEM OPT students. Targeting employers with existing STEM OPT or H-1B filing history also signals that their HR teams are already familiar with the I-983 process, the 90-day reporting obligations, and the practical training documentation USCIS expects.
See which IT Security Analyst employers are hiring and sponsoring visas right now.
Search IT Security Analyst Jobs