STEM OPT Senior Cybersecurity Analyst Jobs
Senior Cybersecurity Analyst roles in threat detection, incident response, and security operations qualify for STEM OPT work authorization under CIP codes in computer science and information security. Your employer must be enrolled in E-Verify, and the 24-month STEM OPT extension gives you up to 36 months total to build your U.S. career.
See All Senior Cybersecurity Analyst JobsOverview
Showing 5 of 42+ Senior Cybersecurity Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 42+ Senior Cybersecurity Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Analyst roles.
Get Access To All Jobs
Security Analyst Senior
Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Ideal candidates will be able to report to our Pulse Point location in Indianapolis, IN. Alternate locations may be considered if candidates reside within a commuting distance from an office.
Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law.
The Security Analyst Senior is responsible for managing the delivery of information and network security systems and/or technology services, which may include server, desktop, software, network, database, and helpdesk components.
How you will make an impact:
- Provides trouble resolution on complex problems and leads implementations for system and network security technologies.
- Develops testing plans to ensure quality of implementation.
- Coordinates and prepares the reporting of data security events and incidents.
- Provides system and network architecture support for information and network security technologies.
- Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies.
- Represents major upgrades and reconfigurations in change control.
- Designs and analyzes mix of vendor services meeting business and information security requirements.
- Maintains relationship with key vendors.
- Leads lights on initiatives to consolidate equipment and/or implement business relocations.
- Determines and performs complex configuration changes to meet business and information security requirements.
- Performs capacity analysis.
- Recommends and implements capacity increases.
- Serves as the technical escalation for results of preventative maintenance routines.
- Supervises preventative maintenance.
- Represents infrastructure security support in significant projects and performs the most complex operations and administration tasks.
- Responds to level 3 and 4 change and problem requests without supervision.
Minimum Requirements:
- Requires a bachelor’s degree or equivalent combination of education and experience that would provide the knowledge to perform such work. Experience must include a minimum of 3 years of experience in a support and operations or design and engineering role in any of the following areas: access management or network security technologies, servers, networks, Network communications, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role; or any combination of education and experience, which would provide an equivalent background.
- Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
Preferred Skills, Capabilities and Experiences:
- Technical security certifications (e.g. Systems Security Certified Practitioner) highly preferred.
- BA/BS degree in Information System and Computer Science or related field of study highly preferred.
Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health.
Who We Are
Elevance Health is a health company dedicated to improving lives and communities – and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve.
How We Work
At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success – for our consumers, our associates, our communities and our business.
We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few.
Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process.
The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws.
Elevance Health is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact elevancehealthjobssupport@elevancehealth.com for assistance.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
Prospective employees required to be screened under Florida law should review the education and awareness resources at HB531 | Florida Agency for Health Care Administration.
See all 42+ Senior Cybersecurity Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Analyst roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Senior Cybersecurity Analyst
Verify your degree qualifies under STEM CIP codes
Confirm your computer science, information assurance, or cybersecurity degree appears on the official STEM Designated Degree Program List before applying. Degrees in adjacent fields like electrical engineering or applied mathematics can also qualify, but your DSO must verify the CIP code match.
Check employer E-Verify enrollment before applying
STEM OPT requires your employer to be actively enrolled in E-Verify, not just registered. Search the E-Verify employer database directly to confirm enrollment status before accepting an offer, since some companies let enrollment lapse after initial registration.
Target security clearance roles strategically
Many Senior Cybersecurity Analyst positions require or prefer a U.S. security clearance, which F-1 students are ineligible for. Filter postings for clearance-optional or clearance-sponsorship-considered roles to avoid wasting applications on positions you structurally cannot fill.
Use Migrate Mate to identify E-Verify enrolled employers
Search Senior Cybersecurity Analyst openings on Migrate Mate, which filters listings to employers already enrolled in E-Verify and with documented STEM OPT hiring history, so you skip the manual enrollment verification step entirely.
Negotiate your I-983 training plan before your start date
Your employer must sign a Form I-983 training plan outlining your learning objectives and supervision structure before USCIS approves your STEM OPT extension. Raise this in your offer negotiation so HR prepares it alongside your onboarding paperwork, not weeks after you start.
File your STEM OPT extension 90 days before OPT expires
Submit your STEM OPT extension application no later than 90 days before your initial OPT end date. If USCIS hasn't adjudicated by your expiration date, your 180-day cap-gap automatically extends your work authorization while the application is pending.
Senior Cybersecurity Analyst jobs are hiring across the US. Find yours.
Find Senior Cybersecurity Analyst JobsFrequently Asked Questions
Does a Senior Cybersecurity Analyst role qualify for the STEM OPT extension?
Yes, Senior Cybersecurity Analyst positions qualify for STEM OPT when your underlying degree is in a STEM-designated field such as computer science, information assurance, cybersecurity, or a related discipline on the DHS STEM Designated Degree Program List. The role itself must also provide practical training directly related to your degree field, which security operations, threat analysis, and incident response work typically satisfies.
What STEM degrees make you eligible for STEM OPT as a cybersecurity analyst?
Eligible degrees include computer science, information security, information assurance, cybersecurity, electrical engineering, and applied mathematics, among others on the DHS STEM Designated Degree Program List matched by CIP code. Degrees in business information systems or general IT management may not qualify depending on the specific CIP code your institution assigned. Your DSO can confirm your degree's eligibility before you file.
How do I confirm my Senior Cybersecurity Analyst employer is enrolled in E-Verify?
Search the E-Verify employer search tool on the E-Verify website to confirm your prospective employer holds active enrollment. Active enrollment is required throughout your entire STEM OPT period, not just at the time of hire. If a company's enrollment has lapsed, your STEM OPT extension will be denied regardless of the job offer, so verify before signing any offer letter.
What goes into the I-983 training plan for a Senior Cybersecurity Analyst role?
Your Form I-983 must describe specific learning objectives tied to your STEM degree, the supervision structure your employer will provide, how the role develops your technical skills in areas like threat detection or security architecture, and an attestation that you aren't displacing a U.S. worker. Your employer's HR or legal team completes their sections, and both parties sign before your DSO submits the STEM OPT extension application to USCIS.
Where can I find Senior Cybersecurity Analyst jobs that hire on STEM OPT?
Migrate Mate lists Senior Cybersecurity Analyst openings filtered to employers enrolled in E-Verify, which is the baseline requirement for STEM OPT eligibility. You can also cross-reference the O*NET occupation profile for the role's official SOC code and use the OFLC Wage Search to review prevailing wage data by location before evaluating offers.
See which Senior Cybersecurity Analyst employers are hiring and sponsoring visas right now.
Search Senior Cybersecurity Analyst Jobs