STEM OPT IT Security Specialist Jobs
IT Security Specialist roles qualify for the 24-month STEM OPT extension if your degree falls under an eligible CIP code in computer science, information technology, or a related STEM field. Your employer must be enrolled in E-Verify, and you'll need a signed I-983 training plan before your extension begins.
See All IT Security Specialist JobsOverview
Showing 5 of 14+ IT Security Specialist jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all IT Security Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Specialist roles.
Get Access To All Jobs
INTRODUCTION
IT Security Specialist 2/ITSS2
ROLE DESCRIPTION:
- Monitors computer networks for security violations.
- Installs new security software.
- Prepares reports on security breaches.
- Conducts penetration testing to find vulnerabilities.
- Develops IT security standards, policies and procedures to implement security practices.
- Teaches peers about security procedures.
- Specializes in information and network security.
- Analyzes security risks, and plans controls.
- Implements security improvements by assessing current situation, evaluating trends anticipating requirements.
- Broad understanding of Information Security as a field, including experience evaluating and implementing security policies and practices.
- Coordinates implementation of security controls and implements controls.
- Provides users and management with technical support on matters related to access control.
- Monitors compliance with security policies and procedures.
- Recommends security changes to executive team.
- Knowledge of current and emerging threats/threat vectors.
- Knowledge of security framework (NIST SP 800-53, ISO 27001, NERC, etc.).
- Communicate effectively with both technical and non-technical individuals at all levels of the organization.
- Assess risk of proposed changes to infrastructure, code, and connectivity.
- Perform application updates to Security applications and devices.
- Determine security violations and inefficiencies by conducting periodic audits.
- Act as a technical information security reviewer of performance reports, system status, operating procedures manual and other documents produced.
- May assist with the selection, installation of automated tools that enforce or monitor the compliance with information security policies, standards, procedures, and similar information security requirements.
- Knowledge in vulnerability assessments, intrusion prevention and detection, access control and authorization, policy enforcement, design of secure infrastructure, protocol analysis, and firewall rulesets.
- Incident response.
BASIC QUALIFICATIONS:
4+ years of experience in the field or in a related area
PREFERRED QUALIFICATIONS:
4 year college degree or equivalent technical study.
LOCATION:
Columbus, OH/On-Site
DURATION:
6+ months
See all IT Security Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new IT Security Specialist roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as an IT Security Specialist
Verify your CIP code before applying
Check your degree's CIP code against the DHS STEM Designated Degree Program List before targeting IT Security roles. Information security degrees often qualify, but general business IT degrees may not, so confirm eligibility with your DSO early.
Filter employers by E-Verify enrollment status
Confirm every prospective employer is actively enrolled in E-Verify before accepting an offer. An employer who was enrolled last year may have lapsed, so ask your HR contact for their E-Verify Company ID as a concrete verification step.
Build your I-983 training plan around security competencies
Draft your I-983 before your offer closes, not after. IT Security Specialists should map training goals to specific competencies like threat detection, SIEM tools, or incident response frameworks so the plan reflects genuine job duties, not generic language.
Use Migrate Mate to target verified STEM OPT employers
Search for IT Security Specialist openings on Migrate Mate, which surfaces employers with documented STEM OPT hiring history. Targeting companies that have filed for STEM OPT workers before cuts time spent on employers unfamiliar with E-Verify requirements.
Check prevailing wage before negotiating your offer
Use the OFLC Wage Search to look up the prevailing wage for your specific SOC code and work location before entering salary discussions. STEM OPT doesn't require LCA filing, but knowing the wage benchmark strengthens your negotiating position with the employer.
Submit your STEM OPT extension application 90 days early
File your STEM OPT extension with USCIS up to 90 days before your initial OPT end date. IT Security roles often require background checks and clearance processes that take time, so a delayed extension filing can disrupt your start date if USCIS processing runs long.
IT Security Specialist jobs are hiring across the US. Find yours.
Find IT Security Specialist JobsFrequently Asked Questions
Does my degree qualify me for the STEM OPT extension for IT Security Specialist jobs?
Your degree qualifies if it appears on the DHS STEM Designated Degree Program List and carries an eligible CIP code. Degrees in computer science, cybersecurity, information assurance, and electrical engineering typically qualify. General IT management or business administration degrees often don't. Confirm your specific CIP code with your DSO before applying to IT Security roles under the STEM OPT extension.
What E-Verify requirement applies to my IT Security Specialist employer?
Your employer must be actively enrolled in E-Verify at the specific worksite where you'll be employed, not just at the corporate level. Before accepting an offer, ask HR to confirm their E-Verify Company ID. If your employer isn't enrolled, your DSO cannot approve the I-983 training plan, and your STEM OPT extension cannot begin regardless of when USCIS approves your application.
What should my I-983 training plan include for an IT Security Specialist role?
Your I-983 must describe how the IT Security Specialist position provides practical training directly related to your STEM degree. Include specific learning objectives tied to job duties such as vulnerability assessments, security monitoring, or compliance auditing. Both you and your supervisor sign the plan, and your DSO must approve it before your extension activates. Vague or generic descriptions increase the risk of a DSO rejection.
Does the cap-gap rule protect my work authorization if I'm selected in the H-1B lottery while on STEM OPT?
Yes. If your STEM OPT expires on September 30 and your H-1B petition is properly filed and accepted by USCIS before that date, the cap-gap rule extends your work authorization automatically through September 30 of that year. Your employer can keep you working in your IT Security Specialist role without interruption as long as the petition remains pending or approved. USCIS issues updated guidance on cap-gap each fiscal year.
How do I find IT Security Specialist employers who are already familiar with STEM OPT requirements?
Search for IT Security Specialist openings on Migrate Mate, which identifies employers with verified STEM OPT and E-Verify enrollment history. Targeting companies that have previously hired STEM OPT workers significantly reduces the risk of late-stage offer withdrawals caused by employers who discover E-Verify or I-983 requirements for the first time after extending an offer.
See which IT Security Specialist employers are hiring and sponsoring visas right now.
Search IT Security Specialist Jobs