STEM OPT Senior Cybersecurity Engineer Jobs
Senior Cybersecurity Engineer roles qualify for the 24-month STEM OPT extension, giving you up to 36 months of F-1 work authorization. Your employer must be enrolled in E-Verify, and your degree in computer science, information security, or a related STEM field must match a qualifying CIP code. This page lists employers actively hiring for this role.
See All Senior Cybersecurity Engineer JobsOverview
Showing 5 of 130+ Senior Cybersecurity Engineer jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 130+ Senior Cybersecurity Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Engineer roles.
Get Access To All Jobs
Opportunity to work in a hybrid model: Potential to work 4 days onsite and 1 day remote
Why GM Financial Cybersecurity?
Innovation isn’t just a talking point at GM Financial, it’s how we operate. By joining our team, you’ll work in a mission-focused environment with specialized teams, including Engineering, Threat Intelligence, Vulnerability Management, Incident Response, Firewall, Governance, Risk, Architecture and Offensive Security. These teams collaborate to identify, manage and respond to threats, all while driving innovation across the environment.
Cybersecurity is central to our strategic vision, so you’ll benefit from exceptional leadership visibility, with direct reporting lines to the CEO. This structure ensures your work is recognized and supported at the highest levels, while also enabling bold innovation and the adoption of cutting-edge technologies.
Shape the future of Cybersecurity at GM Financial, with the freedom to explore, the tools to build and the support to thrive.
About the role:
As a Sr Cybersecurity Engineer specializing in Vulnerability Management and Application Security, you will play a critical role in safeguarding enterprise systems and applications against evolving threats. Your primary focus will be on identifying, assessing, and mitigating vulnerabilities across infrastructure and application layers, while ensuring compliance with security standards and best practices.
In this role you will:
- Develop and maintain technical security requirements, standards, and documentation for vulnerability management and application security.
- Design and implement security solutions with emphasis on:
- Vulnerability Management (VM) platforms and processes
- Application Security tools (SAST, DAST, IAST)
- Web Application Firewalls (WAF)
- Secure coding practices and CI/CD pipeline integration
- Perform vulnerability assessments and penetration testing for applications and systems; analyze findings and drive remediation efforts.
- Utilize Qualys VMDR to perform automated and on-demand vulnerability scans across infrastructure, applications, and cloud environments.
- Analyze scan results, assess risk, and collaborate with system owners to prioritize and remediate vulnerabilities.
- Monitor and analyze system logs and security alerts to detect unauthorized access or anomalies.
- Create and present remediation progress, security metrics, vulnerability trends, and risk reports to leadership.
- Participate in incident response activities, providing technical expertise for application-related security incidents.
- Conduct periodic risk assessments for applications and supporting infrastructure.
- Evaluate and recommend security tools and technologies to enhance vulnerability detection and remediation capabilities.
- Stay current on emerging threats, vulnerabilities, and regulatory requirements impacting application security.
What makes you a dream candidate?
- Deep understanding of vulnerability management processes, CVSS scoring, and remediation strategies.
- Hands-on experience with Qualys VMDR, including asset discovery, authenticated scanning, vulnerability assessment, and reporting.
- Strong knowledge of vulnerability lifecycle management.
- Ability to interpret Qualys findings and translate technical vulnerabilities into actionable remediation guidance for technical and non-technical stakeholders.
- Familiarity with container security, Kubernetes, and cloud-native application security.
- Experience securing cloud environments (AWS, Azure, GCP) and implementing IaC security controls (Terraform, CloudFormation).
- Proficiency in scripting and automation (Python, Bash, or similar) for vulnerability scanning and remediation workflows.
- Solid understanding of networking fundamentals, TCP/IP, OSI model, and application layer protocols (HTTP, SSL/TLS, DNS).
- Knowledge of security frameworks and standards (NIST CSF, ISO 27001, OWASP Top 10).
- Strong analytical skills for interpreting vulnerability data and assessing business impact.
- Excellent communication skills for collaborating with developers, operations teams, and leadership.
- Ability to think strategically, innovate, and implement scalable security solutions.
- Experience with CI/CD security integration and automated vulnerability scanning.
- Familiarity with microservices architecture and securing APIs.
- Knowledge of threat modeling and risk assessment methodologies.
Experience
- 3-5 years of experience in large and complex business environments with a successful track record working directly with senior level management preferred.
- 3-5 years of experience in one or more of the following domains: Cybersecurity, Information Security, Network Engineering, or Network Operations, Information Technology, Application Development preferred.
- Cybersecurity related certifications strongly preferred.
- Bachelor’s Degree in related field or equivalent work experience strongly preferred.
- High School Diploma or equivalent required.
What We Offer: Generous benefits package available on day one to include: 401K matching, bonding leave for new parents (12 weeks, 100% paid), tuition assistance, training, GM employee auto discount, community service pay and nine company holidays.
Our Culture: Our team members define and shape our culture — an environment that welcomes innovative ideas, fosters integrity, and creates a sense of community and belonging. Here we do more than work — we thrive.
Compensation: Competitive pay and bonus eligibility.
Work Life Balance: Hybrid work environment, 4 days a week in the office.
See all 130+ Senior Cybersecurity Engineer jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Cybersecurity Engineer roles.
Get Access To All JobsTips for Finding STEM OPT Authorization as a Senior Cybersecurity Engineer
Verify your CIP code before applying
Check that your degree program's CIP code appears on the STEM Designated Degree Program List published by DHS. Cybersecurity-adjacent degrees in information assurance or network security qualify under different codes than computer science. Confirm with your DSO before your OPT end date.
Filter employers by E-Verify enrollment status
STEM OPT requires your employer to be enrolled in E-Verify before your extension starts. Ask recruiters to confirm enrollment during the screening call. Employers who can't confirm it immediately may not be set up to hire STEM OPT students legally.
Use Migrate Mate to target active STEM OPT employers
Search Senior Cybersecurity Engineer roles on Migrate Mate, which surfaces employers with verified STEM OPT hiring history. This cuts the time you'd otherwise spend cold-screening employers for E-Verify status and STEM OPT familiarity.
Draft your I-983 training plan before the offer stage
Your I-983 must describe how your cybersecurity role directly applies your STEM degree, naming specific skills like threat modeling, vulnerability assessment, or security architecture. Employers unfamiliar with the form appreciate receiving a draft, which also accelerates the signing process.
Target employers with dedicated security teams
Organizations with in-house security operations centers or dedicated compliance teams are more likely to have structured onboarding for work-authorized hires. Government contractors subject to CMMC or FedRAMP requirements often have established processes for I-983 completion and E-Verify workflows.
Align your extension timeline with the H-1B cap season
If your OPT ends before October 1 and your H-1B is selected in the lottery, the cap-gap rule automatically extends your work authorization. Confirm your 24-month STEM OPT end date with your DSO so you can plan the H-1B filing window with your employer's HR team.
Senior Cybersecurity Engineer jobs are hiring across the US. Find yours.
Find Senior Cybersecurity Engineer JobsFrequently Asked Questions
Does a Senior Cybersecurity Engineer role qualify for the STEM OPT extension?
Yes, provided your underlying degree falls under a qualifying CIP code on the DHS STEM Designated Degree Program List. Degrees in computer science, information security, electrical engineering, or applied mathematics typically qualify. Your DSO confirms eligibility and issues the updated I-20 before you apply for the extension through USCIS using Form I-765.
What E-Verify requirement applies to my employer for STEM OPT?
Your employer must be actively enrolled in E-Verify before your STEM OPT extension begins. Enrollment must cover the work site where you'll perform your duties, not just the company's headquarters. You can ask your recruiter to provide the E-Verify company ID or have HR confirm enrollment directly with your DSO during the offer stage.
What goes into an I-983 training plan for a cybersecurity role?
The I-983 must connect your day-to-day responsibilities to the STEM field of your degree. For a Senior Cybersecurity Engineer, that means documenting specific learning objectives such as security architecture design, incident response, or penetration testing methodologies. Both you and your employer sign it, and your DSO reviews it for approval before your extension start date.
How does the cap-gap rule affect me as a STEM OPT student in cybersecurity?
If your employer files an H-1B petition on your behalf before your STEM OPT expires and your registration is selected, the cap-gap provision extends your F-1 work authorization through September 30 of that year. You can continue working in your Senior Cybersecurity Engineer role without interruption while USCIS adjudicates the petition. Your DSO updates your I-20 to reflect cap-gap status.
Where can I find Senior Cybersecurity Engineer jobs that hire STEM OPT students?
Migrate Mate lists Senior Cybersecurity Engineer roles from employers with confirmed STEM OPT hiring activity, so you're not filtering blindly through postings from companies unfamiliar with E-Verify or the I-983 process. Searching by role on Migrate Mate surfaces positions where the employer infrastructure for STEM OPT onboarding is already in place.
See which Senior Cybersecurity Engineer employers are hiring and sponsoring visas right now.
Search Senior Cybersecurity Engineer Jobs