STEM OPT Security Researcher Jobs
Security Researcher roles in vulnerability research, threat intelligence, and penetration testing qualify for STEM OPT's 24-month extension when your degree is in computer science, cybersecurity, or a related STEM field. Your employer must be enrolled in E-Verify, and you'll need a signed I-983 training plan before your start date.
See All Security Researcher JobsOverview
Showing 5 of 13+ Security Researcher jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Security Researcher jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Researcher roles.
Get Access To All Jobs
The application window is expected to close on: 05/11/2026. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received.
The successful applicant will be performing work on US Government classified environments, and therefore, must be a U.S. Person (i.e., U.S. citizen, U.S. national, lawful permanent resident, asylee, or refugee). This position may also perform work that the U.S. government has specified can only be performed by a U.S. citizen on U.S. soil.
Meet the Team
Our security team is dynamic, hardworking, fun, and high-energy, but the work is done in a very casual environment that strongly encourages a work/life balance. Not only will you work alongside a team of skilled security researchers with a diverse spectrum of talents and experience levels, but you will also be interacting with a variety of engineering teams across Cisco. Cisco ASIG cultivates an environment where every individual's input and experience is valued. We prioritize training sessions and a mentor program surrounding you with the resources you will need to succeed.
The Advanced Security Initiatives Group (ASIG) serves as Cisco’s elite security research unit, dedicated to identifying vulnerabilities and hardening our global products against real-world threats. By adopting an attacker mentality, the team ensures that Cisco’s critical infrastructure remains resilient for global ISPs, Fortune 500 companies, and world governments. This dynamic, high-energy group is composed of skilled researchers with diverse technical backgrounds who thrive in a casual, supportive, and collaborative environment. What makes this team truly exciting is the unique opportunities to research security topics independently or collaboratively to explore and develop tools and ideas as part of our "Free Frida" innovation and incubation process.
Your Impact
Evaluate global products and services to identify security vulnerabilities, weaknesses, and potential improvements to ensure the integrity of Cisco’s infrastructure. Adopt an attacker mentality using specialized tools and techniques to emulate real-world adversaries and proactively secure our systems. Partner with industry-leading engineering teams to assess complex architectures and contribute to creative security solutions that protect our customers. Research emerging security topics independently or collaboratively to develop new tools and ideas that drive the evolution of our security posture. Achieve success by delivering highly secured solutions that meet the rigorous demands of our most critical global clients.
Minimum Qualifications
- Master’s degree in Computer Science, Cybersecurity, or related field (with security research or project-based experience) or a Bachelor’s degree with 2+ years of professional security experience.
- 2+ years of experience in secure coding/development, code analysis for vulnerabilities, or software testing.
- Experience with operating system concepts, including memory management or binary analysis.
- 2 years of demonstrated experience in building, maintaining, and supporting technical tooling.
- Experience with AI/ML frameworks and research tooling.
Preferred Qualifications
- Experience in at least two of the following: Unix system hardening, applied cryptography, network protocol analysis, or DevOps security.
- Possession of industry-recognized certifications such as OSCP.
- Strong ability to work collaboratively within a diverse, high-energy research team.
- Consistent record of innovative problem-solving and independent research.
- Excellent communication skills for multi-functional engagement with engineering teams.
- Adaptability to work with emerging technologies and evolving security landscapes.
Why Cisco?
At Cisco, we’re revolutionizing how data and infrastructure connect and protect organizations in the AI era – and beyond. We’ve been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you’ll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
Message to applicants applying to work in the U.S. and/or Canada:
The starting salary range posted for this position is $101,500.00 to $144,500.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco’s plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco’s policies:
- 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
- 1 paid day off for employee’s birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
- Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
- Exempt employees participate in Cisco’s flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
- 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
- Additional paid time away may be requested to deal with critical or emergency issues for family members
- Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco’s policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
- .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
- 1.5% of incentive target for each 1% of attainment between 50% and 75%;
- 1% of incentive target for each 1% of attainment between 75% and 100%; and
- Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$123,600.00 - $200,100.00
Non-Metro New York state & Washington state:
$109,900.00 - $181,600.00
- For quota-based sales roles on Cisco’s sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
See all Security Researcher jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Researcher roles.
Get Access To All JobsTips for Finding STEM OPT Authorization in Security Researcher
Verify your CIP code before applying
Check that your degree's Classification of Instructional Programs code maps to an approved STEM field on the ICE STEM-designated degree list. Cybersecurity, computer science, and information assurance CIP codes all qualify, but "general IT" programs sometimes don't.
Confirm E-Verify status before accepting offers
Ask HR directly whether the company is enrolled in E-Verify before you sign anything. Federal contractors are required to participate, but many private-sector security research teams aren't. USCIS won't approve your STEM OPT extension if the employer isn't enrolled at the time of filing.
Build a training plan tied to security research skills
Your I-983 must list concrete learning objectives: reverse engineering, malware analysis, or CVE research are defensible. Vague goals like "gain professional experience" get flagged during DSO review. Align each objective to a deliverable your manager can assess at the 12-month evaluation.
Target employers with cleared research programs
Many Security Researcher roles sit inside cleared facilities or support cleared programs, which can complicate STEM OPT timing. Identify employers that sponsor both the work authorization and any required clearance pathway upfront, since clearance processing rarely aligns with OPT deadlines.
Search Migrate Mate for verified STEM OPT employers
Filter your Security Researcher job search on Migrate Mate to surface employers already verified for STEM OPT hiring. Seeing a company's prior authorization history tells you whether their HR team knows the I-983 and E-Verify process before you spend time on applications.
File your extension at least 90 days before OPT ends
Your DSO must recommend the STEM OPT extension in SEVIS, and USCIS recommends submitting your I-765 at least 90 days before your current EAD expires. If the application is pending on your end date, the cap-gap provision keeps you authorized while USCIS adjudicates.
Security Researcher jobs are hiring across the US. Find yours.
Find Security Researcher JobsFrequently Asked Questions
Does my degree qualify me for the STEM OPT extension as a Security Researcher?
Your degree qualifies if its CIP code appears on the ICE STEM-designated degree list. Degrees in computer science, cybersecurity, information assurance, electrical engineering, and mathematics all typically qualify. If your degree is in a field like criminal justice with a cybersecurity concentration, check the CIP code with your DSO before assuming eligibility, since the listed field of study controls, not the job title.
What does the I-983 training plan need to include for a Security Researcher role?
The I-983 must connect your day-to-day Security Researcher work to the STEM field of your degree. List specific learning goals such as vulnerability assessment methodology, exploit development, or threat modeling. Your supervisor signs off on evaluations at 12 months and again at the end of the extension. Generic descriptions won't satisfy DSO review, so tie each objective to a measurable outcome.
How do I confirm my employer is enrolled in E-Verify?
Ask the recruiter or HR contact directly whether the company is an E-Verify participant. You can also search the E-Verify employer search tool on the E-Verify website to look up participating employers by name. Enrollment must be active before your STEM OPT extension is approved, and your I-983 must name the employer's E-Verify company identification number.
Where can I find Security Researcher jobs where employers already understand STEM OPT?
Migrate Mate lists Security Researcher openings filtered for employers who are familiar with STEM OPT authorization and E-Verify enrollment. Searching there lets you focus on roles where the hiring process is already set up for F-1 candidates, rather than educating employers about the extension requirements from scratch.
What happens to my work authorization if my H-1B is selected in the lottery before my STEM OPT ends?
If your H-1B petition is filed while your STEM OPT EAD is valid and your status remains in F-1, the cap-gap provision extends your work authorization automatically through September 30 of the fiscal year the H-1B takes effect. You can continue working as a Security Researcher during the gap without a new EAD, as long as your employer filed before your OPT expired.
See which Security Researcher employers are hiring and sponsoring visas right now.
Search Security Researcher Jobs