TN Visa Cybersecurity Jobs
Cybersecurity roles qualify for TN visa sponsorship under the USMCA as Computer Systems Analyst positions, covering security architecture, penetration testing, and network defense. Canadian citizens can apply at the port of entry with no cap or lottery. Mexican citizens need a consular appointment. Employers rarely need to file I-129 for Canadians, which speeds up the process considerably.
See All Cybersecurity JobsOverview
Showing 5 of 2,970+ Cybersecurity jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 2,970+ Cybersecurity jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity roles.
Get Access To All Jobs
INTRODUCTION
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
This talent will serve as a hands-on leader responsible for overseeing the implementation, maintenance, and reporting of container vulnerability identification and management. The ideal candidate will combine strong technical knowledge with prior people-management experience. An established team is currently in place. As the organization transitions to Wiz, prior experience with this platform is highly desirable.
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Lead, implement, and maintain scanning tools to identify vulnerabilities in Container images and running containers
- Lead and analyze vulnerabilities and assist development teams to understand and address vulnerability remediation
- Assist in automation of business requirements
- Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack
- Lead and contribute to the design, planning, evaluation, and implementation of enterprise cybersecurity technologies, including baseline analysis, trend and capacity planning, and preparation for future system requirements.
- Analyze and recommend new or enhanced security technologies, overseeing configuration, integration, change management, and operational handoff to ensure efficient, scalable, and effective use of resources.
- Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
- Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
- Previous experience in leading complex IT projects
OTHER JOB REQUIREMENTS / WORKING CONDITIONS
Sitting
Constantly (More than 50% of the time)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Availability
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.
Travel
Minimal and up to 10%
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law E-Verify IER Right to Work

INTRODUCTION
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
This talent will serve as a hands-on leader responsible for overseeing the implementation, maintenance, and reporting of container vulnerability identification and management. The ideal candidate will combine strong technical knowledge with prior people-management experience. An established team is currently in place. As the organization transitions to Wiz, prior experience with this platform is highly desirable.
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Lead, implement, and maintain scanning tools to identify vulnerabilities in Container images and running containers
- Lead and analyze vulnerabilities and assist development teams to understand and address vulnerability remediation
- Assist in automation of business requirements
- Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack
- Lead and contribute to the design, planning, evaluation, and implementation of enterprise cybersecurity technologies, including baseline analysis, trend and capacity planning, and preparation for future system requirements.
- Analyze and recommend new or enhanced security technologies, overseeing configuration, integration, change management, and operational handoff to ensure efficient, scalable, and effective use of resources.
- Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
- Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
- Previous experience in leading complex IT projects
OTHER JOB REQUIREMENTS / WORKING CONDITIONS
Sitting
Constantly (More than 50% of the time)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Availability
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.
Travel
Minimal and up to 10%
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law E-Verify IER Right to Work
See all 2,970+ Cybersecurity jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity roles.
Get Access To All JobsTips for Finding TN Visa Sponsorship as a Cybersecurity
Align your credentials to the Computer Systems Analyst category
TN visa approval for cybersecurity roles depends on fitting the Computer Systems Analyst classification. A bachelor's degree in computer science, information systems, or a related field strengthens your case. Unrelated degrees raise adjudication risk even if your job duties are clearly security-focused.
Build a support letter that maps duties to TN criteria
Your employer's support letter must connect specific job duties to the Computer Systems Analyst definition. Generic titles like 'Security Engineer' without duty descriptions fail more often at ports of entry. Request that HR include deliverables like vulnerability assessments, security architecture design, or incident response planning.
Target employers with existing TN visa filing experience
Search for companies that have sponsored TN visa holders before. Employers already familiar with the process move faster, prepare accurate support letters, and don't push back on the paperwork. Migrate Mate surfaces employers actively hiring for TN-eligible cybersecurity roles so you can focus your applications strategically.
Understand the Mexican consular process before accepting an offer
Mexican citizens must schedule a consular interview rather than using port-of-entry admission. Build at least four to six weeks into your start date timeline after receiving a job offer to account for appointment availability and document preparation at the nearest U.S. consulate.
Clarify remote work arrangements with your prospective employer upfront
TN status ties your authorization to the sponsoring employer and their work location. If the role is remote or hybrid across multiple states, confirm your employer understands that the support letter should reflect your primary work location to avoid inconsistencies during border inspection.
Prepare for TN renewal before your current status expires
TN status is granted in three-year increments with no limit on renewals. Start the renewal process at least 90 days before expiration. Canadians can renew at a port of entry, while Mexican citizens must return to a U.S. consulate, so account for consular scheduling delays.
Cybersecurity jobs are hiring across the US. Find yours.
Find Cybersecurity JobsCybersecurity TN Visa: Frequently Asked Questions
Does a cybersecurity job title qualify for TN visa sponsorship?
Job titles alone don't determine TN eligibility. What matters is whether your duties fit the Computer Systems Analyst classification under the USMCA. Roles involving security architecture, network defense, vulnerability management, and incident response typically qualify when tied to a bachelor's degree in a relevant field. Titles like Security Analyst, Information Security Analyst, or Cybersecurity Consultant tend to align well. Titles like Security Manager or CISO are harder to fit without careful duty mapping.
How does TN compare to H-1B for cybersecurity professionals?
The TN visa has no annual lottery and no cap for Canadians, while H-1B selection is random and limited to 85,000 slots per year. Canadians can get TN admission at a port of entry the same day with the right documents. H-1B requires employer sponsorship months in advance and a lottery win before any work can begin. For Mexican citizens, TN still requires a consular appointment, but avoids the H-1B lottery entirely.
What documents does my employer need to prepare for my TN application?
Your employer needs to provide a detailed support letter on company letterhead that states your job title, duties, start date, employment duration, and your qualifications. The letter must make a clear connection between your role and the Computer Systems Analyst TN category. You'll also need your degree credentials and any professional certifications. Canadian citizens bring these documents to a U.S. port of entry. Mexican citizens submit them as part of the consular visa application.
Can I use Migrate Mate to find cybersecurity jobs with TN visa sponsorship?
Yes. Migrate Mate is built specifically for Canadian and Mexican professionals seeking TN-eligible roles in the U.S. You can search for cybersecurity positions at employers who are already familiar with TN visa sponsorship, which reduces friction during the offer and filing stage. The platform filters roles by TN eligibility so you're not spending time on positions where sponsorship isn't available.
What happens to my TN status if I switch cybersecurity employers?
TN status is employer-specific. If you change jobs, your new employer must obtain a fresh TN authorization for you before you start working. Canadians can do this at a port of entry with a new support letter. Mexican citizens need a new consular appointment. Unlike H-1B, there is no portability provision allowing you to continue working for a new employer while the new petition is pending.
See which Cybersecurity employers are hiring and sponsoring visas right now.
Search Cybersecurity Jobs