STEM OPT Security Analyst Jobs
Security Analyst roles sit squarely within STEM-designated CIP codes, making them a strong fit for the 24-month STEM OPT extension. Your employer must be enrolled in E-Verify, and your degree in computer science, information technology, or a related STEM field qualifies you to work up to 36 months total on OPT.
See All Security Analyst JobsOverview
Showing 5 of 147+ Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 147+ Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Analyst roles.
Get Access To All Jobs
Current Employees:
If you are a current Staff, Faculty or Temporary employee at the University of Miami, please click here to log in to Workday to use the internal application process. To learn how to apply for a faculty or staff position, please review this tip sheet.
Location: On Site- Miami, Florida: Irregular Rotating Shifts
The University of Miami Health System, "UHealth", Information Technology Department has an exciting opportunity for a full-time SOC Security Analyst for our 24/7/365 Security Operations Center (SOC) in Miami, Florida.
The Security Analyst 2 conducts advanced computer forensic investigations, data recovery, and electronic discovery. The incumbent in this role maintains and enhances systems to protect data from unauthorized access, as well as develops and implements security protocols and policies. This position identifies, reports, and resolves more complex security violations and threats.
CORE RESPONSIBILITIES:
- Works closely with clients and senior management to define and refine security management requirements, ensuring alignment with organizational goals and regulatory standards.
- Conducts comprehensive evaluations of security controls, identifies potential vulnerabilities, and recommends enhancements to mitigate risks.
- Develop and deliver advanced training and awareness programs tailored to different levels within the organization, promoting a strong security culture.
- Collaborates with human resources and other departments to integrate security considerations into all aspects of organizational processes.
- Provides specialized consulting services across the organization, addressing complex security challenges and advising on best practices.
- Leads the documentation and analysis of security incidents, ensuring a timely and effective response.
- Continuously researches new technologies and methodologies to enhance the organization's security posture and recommends their implementation.
- Develop and oversee auditing and monitoring processes to ensure compliance with internal and external security policies.
- Provides strategic advice to information asset owners, including risk assessments and the development of action plans for securing data.
- Supervises security coordinators and junior analysts, providing guidance and professional development opportunities.
- Adheres to University and unit-level policies and procedures and safeguards University assets.
Department Specific Functions:
- Understanding of cybersecurity fundamentals
- Familiarity with security tools like SPLUNK, CrowdStrike, Proofpoint, and MS Defender
- Knowledge of networking protocols and ability to analyze security incidents
- Strong problem-solving skills and attention to detail
- Ability to communicate findings effectively
This list of duties and responsibilities is not intended to be all-inclusive and may be expanded to include other duties or responsibilities as necessary.
MINIMUM QUALIFICATIONS:
- Bachelor’s Degree in relevant field
- CompTIA Security+ Certification
- Ability to work rotating or irregular shifts (8am to 4:30pm, 4pm to 12:30am, 12am to 8:30am, holidays and weekends).
- Minimum 3 years of experience, with at least 2 years preferably in higher education, healthcare, or a healthcare-related organization working in a Cybersecurity Operations Center or Cybersecurity Incident Response Team.
- Experience collecting, organizing, and analyzing data gathered from SIEM, IPS, NAC, vulnerability scanners, network scanners, log aggregation tools preferred
- Ability to recognize, analyze, and solve a variety of problems.
- Ability to exercise sound judgment in making critical decisions.
Any appropriate combination of relevant education, experience and/or certifications may be considered.
LI-AS1
The University of Miami offers competitive salaries and a comprehensive benefits package including medical, dental, tuition remission and more.
UHealth-University of Miami Health System, South Florida's only university-based health system, provides leading-edge patient care powered by the groundbreaking research and medical education at the Miller School of Medicine. As an academic medical center, we are proud to serve South Florida, Latin America and the Caribbean. Our physicians represent more than 100 specialties and sub-specialties, and have more than one million patient encounters each year. Our tradition of excellence has earned worldwide recognition for outstanding teaching, research and patient care. We're the challenge you've been looking for.
The University of Miami is an Equal Opportunity Employer. Applicants and employees are protected from discrimination based on certain categories protected by Federal law.
Job Status: Full time
Employee Type: Staff
See all 147+ Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Analyst roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Security Analyst
Verify your CIP code matches Security Analyst
Check that your degree's CIP code falls under a STEM-designated field recognized by ICE. Computer science (11.0701), information assurance (11.0901), and cybersecurity (11.1003) all support STEM OPT eligibility for Security Analyst roles.
Confirm E-Verify enrollment before accepting offers
Your employer must be enrolled in E-Verify before your DSO can issue the STEM OPT I-20 extension. Ask hiring managers directly, or search the E-Verify employer database by company name before signing anything.
Tailor your I-983 training plan to security work
Your I-983 must list specific learning objectives tied to your Security Analyst duties, such as threat detection, incident response, or vulnerability assessment. Vague descriptions like 'general IT work' invite RFEs and risk your extension approval.
Target employers with active LCA filings in cybersecurity
Use Migrate Mate to filter Security Analyst roles by employers with verified E-Verify enrollment and Labor Condition Application filing history in cybersecurity SOC codes, so you're only applying where STEM OPT is already operationally supported.
Use OFLC Wage Search to benchmark your offer
Security Analyst prevailing wages vary by metropolitan area and experience level. Run the OFLC Wage Search before your offer negotiation so you know whether the salary meets DOL wage-level requirements for your location and role classification.
Security Analyst jobs are hiring across the US. Find yours.
Find Security Analyst JobsFrequently Asked Questions
Does a Security Analyst role qualify for the STEM OPT extension?
Yes, if your degree is in a STEM-designated field such as computer science, information technology, cybersecurity, or a related discipline with a qualifying CIP code. The role itself must also use your STEM training in a meaningful way, which your I-983 training plan documents. Your DSO confirms eligibility before issuing the extended I-20.
How do I find Security Analyst employers who are enrolled in E-Verify?
E-Verify enrollment is required for any employer hiring a STEM OPT student. You can search the official E-Verify employer database by company name to confirm enrollment status before applying. Migrate Mate also filters Security Analyst listings by employers with verified E-Verify enrollment and active LCA filing history, saving you the manual lookup.
What goes into the I-983 training plan for a Security Analyst position?
Your I-983 must specify concrete learning objectives directly tied to your Security Analyst duties, your supervising employer's name and E-Verify company ID, your compensation, and how the work relates to your STEM degree. Both you and your employer sign it. Objectives should name specific competencies like log analysis, SIEM platform use, or incident response protocols rather than generic job descriptions.
What happens to my STEM OPT authorization if my Security Analyst employer loses E-Verify enrollment?
You must stop working immediately if your employer's E-Verify participation is terminated. USCIS requires you to report the change to your DSO within five business days. Your DSO will update your SEVIS record, and you'll need to find a new E-Verify-enrolled employer and file an amended I-983 to continue your STEM OPT period lawfully.
Can I use my STEM OPT cap-gap period to keep working as a Security Analyst while my H-1B is pending?
Yes. If your employer files an H-1B petition on your behalf before your OPT EAD expires, cap-gap protection extends your work authorization automatically through September 30 of the fiscal year, or until USCIS adjudicates the petition. You can continue working in your Security Analyst role during this period without interruption, as long as your status remains otherwise valid.
See which Security Analyst employers are hiring and sponsoring visas right now.
Search Security Analyst Jobs