STEM OPT Security Engineer Jobs
Security Engineer roles fall squarely within STEM OPT eligibility, giving you up to 24 months of extended work authorization beyond your initial OPT period. Your employer must be enrolled in E-Verify, and your degree in computer science, information security, or a related STEM field must align with the role's CIP code to qualify.
See All Security Engineer JobsOverview
Showing 5 of 446+ Security Engineer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 446+ Security Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Engineer roles.
Get Access To All Jobs
INTRODUCTION
Citrin Cooperman offers a dynamic work environment, fostering professional growth and collaboration. We’re continuously seeking talented individuals who bring a problem-solving mindset, fresh perspectives, and sharp technical expertise. We know you have choices, so our team of collaborative, innovative professionals are ready to support your professional development. At Citrin Cooperman, we offer competitive compensation and benefits and most importantly, the flexibility to manage your personal and professional life to focus on what matters most to you!
We are seeking a Senior – Security Engineer, Information Security, to join our Information Security team within the Information Technology department. They’re responsible for protecting our organization's digital assets through the deployment, management, and optimization of security technologies, including but not limited to Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM), Data Loss Prevention (DLP), and email security. The ideal candidate will manage vulnerability and threat programs, lead incident response efforts, and have strong technical skills in threat detection and security operations.
RESPONSIBILITIES ARE, BUT NOT LIMITED TO
Enterprise Detection and Response
- Deploy and manage EDR solutions across enterprise endpoints including workstations, servers, and mobile devices.
- Configure detection rules and automated response actions to identify malware, suspicious behaviors, and advanced persistent threats.
- Conduct proactive threat hunting to identify compromised systems and hidden threats.
- Maintain agent deployment coverage and optimize EDR performance across all critical assets.
Security Information and Event Management (SIEM)
- Administer SIEM platform including log source onboarding, parsing, and correlation rule development.
- Design use cases and correlation rules to detect security incidents and policy violations.
- Monitor and triage security alerts to determine severity, scope, and impact.
- Create dashboards and reports for security metrics, compliance, and executive visibility.
- Integrate threat intelligence feeds to enhance detection capabilities.
Incident Response
- Serve as escalation point for security incidents following established procedures.
- Perform digital forensics and investigation including log analysis, memory analysis, and disk forensics.
- Coordinate incident response across IT, legal, HR, and executive stakeholders.
- Document incidents thoroughly including timelines, indicators of compromise, and remediation actions.
- Develop and maintain incident response playbooks for common attack scenarios.
- Participate in tabletop exercises and conduct post-incident reviews to improve security posture.
Threat and Vulnerability Management
- Establish and maintain a continuous vulnerability management program.
- Deploy and manage vulnerability scanning tools across network, systems, applications, and cloud infrastructure.
- Analyze vulnerability scan results and prioritize remediation based on risk, exploitability, and business impact.
- Work with system owners and IT teams to develop remediation plans and track vulnerability closure.
- Monitor threat intelligence sources for emerging threats, exploit activity, and vulnerabilities affecting the organization.
- Conduct risk assessments for newly discovered vulnerabilities and provide guidance on compensating controls.
- Generate vulnerability metrics and reports for management and compliance purposes.
- Integrate vulnerability data with SIEM and EDR for enhanced threat correlation.
- Perform penetration testing coordination and validate remediation effectiveness.
- Maintain vulnerability management policies, procedures, and SLAs.
Security Operations and Collaboration
- Participate in 24/7/365 security operations center (SOC) rotation (if applicable) or on-call rotation.
- Collaborate with IT operations, development, and business teams on security initiatives.
- Mentor junior security analysts and share knowledge across the security team.
- Stay current with emerging threats, attack techniques, and security technologies.
- Contribute to security awareness training programs by providing real-world incident examples.
Email Security
- Manage email security gateway solutions to detect and block malicious emails, phishing attempts, and spam.
- Investigate and respond to reported phishing emails and business email compromise (BEC) attempts.
- Analyze email-based threats and implement rules to block malicious senders, domains, and attachment types.
- Monitor email security metrics and trends to identify emerging attack patterns.
- Work with human security awareness team to shape awareness campaigns and phishing simulations to improve user vigilance.
Data Loss Prevention (DLP)
- Implement and manage DLP solutions across email, endpoints, network, and cloud applications.
- Create and tune DLP policies to prevent unauthorized data exfiltration while minimizing false positives.
- Monitor DLP alerts and investigate potential data leakage incidents.
- Classify sensitive data and configure appropriate protection controls based on data classification.
- Collaborate with business units to understand data flows and implement appropriate DLP controls.
- Generate DLP metrics and reports for compliance and risk management purposes.
THE IDEAL CANDIDATE MUST:
- Have a bachelor’s degree in computer science, Information Security, Cybersecurity, or technical field related.
- Have equivalent work experience may be considered in lieu of degree.
- 3+ years of hands-on experience in information security operations, SOC, or similar role.
- Have demonstrated experience with EDR platforms and endpoint security management.
- Have experience conducting incident response investigations and forensic analysis.
- Have hands-on experience with vulnerability management and remediation programs.
- Have experience with email security solutions and investigating phishing/BEC attacks.
- Be familiar with DLP technologies and data protection strategies.
- Have a track record of managing security incidents from detection through resolution.
- Possess a strong understanding of attack vectors, TTPs, and MITRE ATT&CK framework.
- Be proficient in log analysis, correlation, and security event interpretation.
- Have experience with EDR platforms (CrowdStrike, SentinelOne, Microsoft Defender, Carbon Black, Cortex XDR).
- Have hands-on experience with SIEM solutions (Splunk, QRadar, Azure Sentinel, LogRhythm, Elastic SIEM).
- Be knowledgeable of vulnerability management tools (Tenable, Qualys, Rapid7).
- Have experience with email security gateways (Proofpoint, Mimecast, Barracuda, Microsoft Defender for Office 365).
- Be familiar with DLP platforms (Symantec DLP, Microsoft Purview, Forcepoint, Digital Guardian).
- Understand network protocols, packet analysis, and network security monitoring.
- Have experience with scripting/automation (Python, PowerShell, Bash) for security operations.
- Be knowledgeable of cloud security (AWS, Azure, GCP) and hybrid environments.
- Understand security frameworks (NIST CSF, CIS Controls, ISO 27001, MITRE ATT&CK).
- Be knowledgeable of compliance requirements (PCI DSS, HIPAA, SOX, GDPR) as applicable.
- Possess a strong security-focused mindset with deep understanding of compliance frameworks.
- Work effectively under pressure and adapt to rapidly changing environments.
- Be highly analytical, detail-oriented, and self-driven with strong ownership.
- Possess excellent verbal and written communication skills.
- Possess strong collaboration, interpersonal skills, and consistent follow-through.
See all 446+ Security Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Engineer roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Security Engineer
Verify your CIP code matches the role
Check that your degree's CIP code aligns with the Security Engineer position before applying. O*NET lists the typical education requirements for this occupation, which you can cross-reference against your I-20 to confirm STEM OPT eligibility.
Confirm E-Verify enrollment before accepting offers
Ask recruiters directly whether the company is enrolled in E-Verify before you reach the offer stage. Many smaller security firms or government contractors operate under subcontracting arrangements where the legal employer, not the worksite, must hold the E-Verify enrollment.
Target companies with active LCA filings in cybersecurity
Search Migrate Mate to find employers with verified E-Verify enrollment and LCA filing history for security roles. This filters out companies that verbally claim sponsorship readiness but lack a track record of filing for STEM OPT or H-1B workers.
Build your I-983 training plan around security competencies
Work with your DSO and hiring manager to map your Security Engineer duties to concrete STEM learning objectives on Form I-983. USCIS scrutinizes training plans that list generic IT tasks rather than specific security engineering skills tied to your degree field.
Apply 90 days before your OPT end date
Submit your STEM OPT extension application to USCIS no later than 90 days before your current EAD expires. Filing inside that window lets you keep working without a gap even if USCIS processing extends past your end date.
Check prevailing wage before negotiating your offer
Look up the wage level for your Security Engineer role using the OFLC Wage Search before finalizing compensation. Your employer's LCA must certify a wage at or above the applicable prevailing wage, so knowing the floor protects you from offers that would block the filing.
Security Engineer jobs are hiring across the US. Find yours.
Find Security Engineer JobsFrequently Asked Questions
Does a computer science or information technology degree qualify for STEM OPT as a Security Engineer?
Yes, degrees in computer science, computer engineering, information security, and closely related STEM fields typically qualify, provided the CIP code on your I-20 maps to the STEM Designated Degree Program List. Your DSO can confirm whether your specific degree program is listed. If your degree is in a borderline field like management information systems, verify the CIP code before applying for the extension.
What E-Verify requirement applies to my Security Engineer employer during STEM OPT?
Your employer must be enrolled in E-Verify at the worksite where you perform your job duties, not just at their headquarters. If you're placed at a client site through a staffing arrangement, E-Verify enrollment must apply to the legal employer named on your I-983, not the client company. Verify enrollment status directly with HR before signing any offer.
What should the I-983 training plan include for a Security Engineer role?
Your I-983 must connect your day-to-day security engineering duties to specific STEM learning goals tied to your degree field. List concrete objectives such as threat modeling, vulnerability assessment, or security architecture design rather than broad IT support tasks. USCIS has rejected training plans that read as standard job descriptions without an educational rationale linking the work to your degree program.
How does cap-gap protection apply if my employer files an H-1B petition while I'm on STEM OPT?
If your STEM OPT EAD expires while an H-1B petition filed on your behalf is pending or approved for October 1, cap-gap automatically extends your work authorization through September 30. You don't need a new EAD for this period. Keep your current EAD, your employer's H-1B receipt notice, and your OPT approval as documentation of your continued authorization during the cap-gap window.
Where can I find Security Engineer jobs where employers are already set up for STEM OPT?
Migrate Mate filters Security Engineer listings by employers with verified E-Verify enrollment and LCA filing history, so you can focus on companies that have already navigated the STEM OPT process. This saves time compared to filtering manually after submitting applications, especially important when your OPT timeline limits how long you can afford to spend in a drawn-out hiring process.
See which Security Engineer employers are hiring and sponsoring visas right now.
Search Security Engineer Jobs