TN Visa Cybersecurity Manager Jobs
Cybersecurity Manager roles qualify for TN visa sponsorship under the USMCA's Computer Systems Analyst category when the position requires a bachelor's degree in a computer-related field. Canadian citizens can apply at the border or a pre-clearance port; Mexican citizens apply at a U.S. consulate. No lottery, no cap for Canadians.
See All Cybersecurity Manager JobsOverview
Showing 5 of 352+ Cybersecurity Manager jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 352+ Cybersecurity Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Manager roles.
Get Access To All Jobs
INTRODUCTION
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
This talent will serve as a hands-on leader responsible for overseeing the implementation, maintenance, and reporting of container vulnerability identification and management. The ideal candidate will combine strong technical knowledge with prior people-management experience. An established team is currently in place. As the organization transitions to Wiz, prior experience with this platform is highly desirable.
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Lead, implement, and maintain scanning tools to identify vulnerabilities in Container images and running containers
- Lead and analyze vulnerabilities and assist development teams to understand and address vulnerability remediation
- Assist in automation of business requirements
- Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack
- Lead and contribute to the design, planning, evaluation, and implementation of enterprise cybersecurity technologies, including baseline analysis, trend and capacity planning, and preparation for future system requirements.
- Analyze and recommend new or enhanced security technologies, overseeing configuration, integration, change management, and operational handoff to ensure efficient, scalable, and effective use of resources.
- Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
- Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
- Previous experience in leading complex IT projects
OTHER JOB REQUIREMENTS / WORKING CONDITIONS
Sitting
Constantly (More than 50% of the time)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Availability
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.
Travel
Minimal and up to 10%
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law E-Verify IER Right to Work

INTRODUCTION
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
Need Help?
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or Temporary:
Regular
Language Fluency: English (Required)
Work Shift:
1st shift (United States of America)
Please review the following job description:
This talent will serve as a hands-on leader responsible for overseeing the implementation, maintenance, and reporting of container vulnerability identification and management. The ideal candidate will combine strong technical knowledge with prior people-management experience. An established team is currently in place. As the organization transitions to Wiz, prior experience with this platform is highly desirable.
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
- Lead, implement, and maintain scanning tools to identify vulnerabilities in Container images and running containers
- Lead and analyze vulnerabilities and assist development teams to understand and address vulnerability remediation
- Assist in automation of business requirements
- Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack
- Lead and contribute to the design, planning, evaluation, and implementation of enterprise cybersecurity technologies, including baseline analysis, trend and capacity planning, and preparation for future system requirements.
- Analyze and recommend new or enhanced security technologies, overseeing configuration, integration, change management, and operational handoff to ensure efficient, scalable, and effective use of resources.
- Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
- Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
- Bachelor’s degree and six to eight years of experience in systems engineering or administration or an equivalent combination of education and work experience.
- Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security.
- Previous experience in leading complex IT projects
OTHER JOB REQUIREMENTS / WORKING CONDITIONS
Sitting
Constantly (More than 50% of the time)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Availability
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.
Travel
Minimal and up to 10%
General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.
Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace.
EEO is the Law E-Verify IER Right to Work
See all 352+ Cybersecurity Manager jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Manager roles.
Get Access To All JobsTips for Finding TN Visa Sponsorship as a Cybersecurity Manager
Align your credentials to the Computer Systems Analyst category
TN visa eligibility for Cybersecurity Manager roles depends on fitting the Computer Systems Analyst occupation. Your degree must be in a computer-related field, and your job offer letter must describe duties that match that classification, not a generic management role.
Document your Canadian or Mexican engineering designations early
If your cybersecurity credentials include designations like CISSP or CISM, gather official transcripts and employer letters that tie those credentials back to your bachelor's degree field. Officers evaluate the full credential chain, not just the certification alone.
Target employers with existing TN or H-1B filing histories
Employers who have sponsored technical workers before understand prevailing wage requirements and can issue a compliant offer letter quickly. Use Migrate Mate to filter Cybersecurity Manager roles by employers with active visa sponsorship histories, cutting prospecting time significantly.
Request a detailed offer letter before crossing the border
Canadian professionals applying at a port of entry need an offer letter that explicitly states job title, duties referencing computer systems analysis, required degree, and employment start date. A vague letter is the most common reason CBP officers issue a TN denial on the spot.
Understand how Mexican TN processing differs from Canadian
Mexican citizens cannot apply at the border; you must schedule a consular interview in Mexico and receive a TN visa stamp before entering the U.S. Build at least four to six weeks of lead time into your start date negotiations with any prospective employer.
Correct misclassified job titles before your employer files
Some employers list the role as IT Director or Security Operations Manager rather than Cybersecurity Manager. Ask your employer to align the offer letter title and duty description to the USMCA Appendix 2 occupation list before submitting any documentation to USCIS or CBP.
Cybersecurity Manager jobs are hiring across the US. Find yours.
Find Cybersecurity Manager JobsCybersecurity Manager TN Visa: Frequently Asked Questions
Does a Cybersecurity Manager role actually qualify for a TN visa?
Yes, but the role must fit the Computer Systems Analyst category listed in the USMCA Appendix 2 schedule. The job duties need to center on analyzing, designing, or overseeing computer-based security systems, not purely administrative management. Your offer letter language controls whether CBP or a consular officer accepts the classification, so the duty description matters as much as the job title.
How does the TN visa compare to H-1B for Cybersecurity Manager positions?
The TN visa has no annual cap and no lottery for Canadian citizens, meaning you can apply year-round and start as soon as approval is granted. H-1B registration opens once a year and selection is random, so many qualified candidates wait years. For Cybersecurity Manager roles where the degree and duty requirements already align with the USMCA schedule, TN is a faster and more predictable path.
Can I search for Cybersecurity Manager jobs that already offer TN visa sponsorship?
Yes. Migrate Mate lets you filter Cybersecurity Manager roles specifically by TN visa sponsorship, so you're only seeing employers who have confirmed willingness to support the visa process. That filters out the back-and-forth with HR teams unfamiliar with TN requirements and gets you to qualified leads faster.
What happens to my TN status if my Cybersecurity Manager role changes significantly after I start?
A material change in job duties, employer, or work location can invalidate your existing TN status. If your responsibilities shift substantially, such as moving from hands-on security systems work into a purely executive or budget-management role, your employer should file an amended TN before the change takes effect. CBP and USCIS both treat unapproved material changes as a status violation.
Do Mexican Cybersecurity Manager candidates face additional hurdles beyond the consular interview?
Mexican citizens are subject to a TN annual allocation under USMCA, and the consular interview adds processing time that Canadian border applicants don't face. You'll also need to submit the DS-160 and pay the MRV fee. Consular officers apply the same Computer Systems Analyst duty test, but appointment availability at high-volume posts like Mexico City can push your timeline by several weeks.
See which Cybersecurity Manager employers are hiring and sponsoring visas right now.
Search Cybersecurity Manager Jobs