TN Visa Security Operations Analyst Jobs
Security Operations Analyst roles qualify for TN visa sponsorship under the USMCA's Computer Systems Analyst category. Canadian citizens can enter at the port of entry or apply at a U.S. consulate; Mexican citizens go through consular processing. Your degree in computer science, information systems, or a related field is the credential that anchors the petition.
See All Security Operations Analyst JobsOverview
Showing 5 of 45+ Security Operations Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 45+ Security Operations Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Operations Analyst roles.
Get Access To All Jobs
At Zotec Partners, our People make it happen. Transforming the healthcare industry isn’t easy. But when you build a team like the one we have, that goal can become a reality. Our accomplishments can’t happen without our extraordinary people – the men and women across the country who make up our diverse Zotec family and help make this company a best place to work. Over 25 years ago, we started Zotec with a clear vision, to partner with physicians to simplify the business of healthcare. Today we are more than 900 employees strong and we continue to use our incredible talent and energy to bring that vision to life. We are a team of Innovators, Collaborators and Doers. We’re seeking a Security Operations Analyst I to join us.
The Security Operations Analyst I serves as an entry-level member of the Security Operations Center (SOC), responsible for performing initial investigations of detections surfaced by Splunk Enterprise Security, CrowdStrike, and Abnormal AI. This role focuses on developing foundational monitoring, triage, and documentation skills under the guidance of senior analysts. The Analyst I plays a critical role in ensuring detections are accurately categorized, documented, and escalated in accordance with established runbooks and SOC procedures. Shift handoff dashboards produced by the Analyst I are reviewed by the Analyst II prior to escalation or distribution.
What you'll do:
Security Monitoring & Investigation:
- Monitor and triage detections from Splunk Enterprise Security, CrowdStrike, and Abnormal AI
- Execute basic Splunk SPL searches to investigate alerts and retrieve relevant log data
- Read and interpret existing Splunk dashboards to support monitoring and shift situational awareness
- Perform initial investigation of alerts to determine whether a detection represents a Security Event requiring escalation
- Document investigation findings accurately and completely in ClickUp per established case management procedures
- Follow established runbooks for standard detection types and escalation criteria
- Escalate confirmed or suspected Security Events to the Analyst II per defined procedures
- Enrich indicators of compromise (IOCs) using tools such as VirusTotal and AbuseIPDB to support investigation context
- Maintain awareness of current threats and indicators of compromise relevant to the organization’s environment
Phishing Investigation:
- Perform initial triage of phishing submissions and Abnormal AI-surfaced email threats
- Review reported emails in the Abnormal console and Splunk to assess malicious indicators
- Document phishing investigation findings in ClickUp and escalate confirmed threats to the Analyst II
- Follow established phishing response runbooks including initial containment actions within authorized scope
Endpoint & Access Monitoring:
- Monitor CrowdStrike detections and alerts for endpoint threats; document findings and escalate per runbook
- Review Netskope alerts for anomalous web or cloud access activity and escalate as appropriate
- Review CyberArk PAM-sourced events in Splunk for basic privileged account anomalies per defined criteria
SOAR & Automation:
- Execute existing Splunk SOAR playbooks as directed to support investigation and response workflows (in implementation)
- Document playbook execution results in ClickUp and flag any unexpected outputs to the Analyst II
Reporting & Shift Handoff:
- Produce accurate shift handoff notes and alert summary dashboards in Splunk for Analyst II review
- Contribute to daily SOC reporting by ensuring case notes and investigation status are current in ClickUp
- Identify and communicate false positive patterns to senior analysts to support detection quality improvement
Process & Documentation:
- Follow all SOC runbooks, standard operating procedures, and escalation workflows
- Contribute to the knowledge base by documenting novel investigation findings or patterns
- Participate in team meetings, training sessions, and incident response drills
- Note: File integrity monitoring and data loss prevention alerting will be onboarded as monitoring sources in a future phase; SOC Analyst I responsibilities will be updated accordingly
What you'll bring to Zotec:
- 0–2 years of experience in information security, IT operations, or a related field
- Knowledge of:
- Foundational security concepts including common attack types and threat categories
- Network protocols and basic infrastructure concepts
- Windows and Linux operating system fundamentals
- Log analysis and basic security event correlation
- Familiarity with:
- SIEM platforms and security monitoring tools
- EDR/XDR solutions
- IDS/IPS systems
- Standard incident response procedures
Preferred:
- Security certifications such as:
- CompTIA Security+
- HTB CJCA — Certified Junior Cybersecurity Analyst (entry-level SOC, SIEM monitoring, network traffic analysis, log review, intrusion detection)
- SSCP or GCIA
- Hands-on exposure to Splunk (basic searches, alert review, dashboard navigation)
- Familiarity with CrowdStrike Falcon console
- Basic scripting exposure (Python, PowerShell, or Bash)
- Bachelor’s degree in Computer Science, Cybersecurity, or related field, or equivalent experience

At Zotec Partners, our People make it happen. Transforming the healthcare industry isn’t easy. But when you build a team like the one we have, that goal can become a reality. Our accomplishments can’t happen without our extraordinary people – the men and women across the country who make up our diverse Zotec family and help make this company a best place to work. Over 25 years ago, we started Zotec with a clear vision, to partner with physicians to simplify the business of healthcare. Today we are more than 900 employees strong and we continue to use our incredible talent and energy to bring that vision to life. We are a team of Innovators, Collaborators and Doers. We’re seeking a Security Operations Analyst I to join us.
The Security Operations Analyst I serves as an entry-level member of the Security Operations Center (SOC), responsible for performing initial investigations of detections surfaced by Splunk Enterprise Security, CrowdStrike, and Abnormal AI. This role focuses on developing foundational monitoring, triage, and documentation skills under the guidance of senior analysts. The Analyst I plays a critical role in ensuring detections are accurately categorized, documented, and escalated in accordance with established runbooks and SOC procedures. Shift handoff dashboards produced by the Analyst I are reviewed by the Analyst II prior to escalation or distribution.
What you'll do:
Security Monitoring & Investigation:
- Monitor and triage detections from Splunk Enterprise Security, CrowdStrike, and Abnormal AI
- Execute basic Splunk SPL searches to investigate alerts and retrieve relevant log data
- Read and interpret existing Splunk dashboards to support monitoring and shift situational awareness
- Perform initial investigation of alerts to determine whether a detection represents a Security Event requiring escalation
- Document investigation findings accurately and completely in ClickUp per established case management procedures
- Follow established runbooks for standard detection types and escalation criteria
- Escalate confirmed or suspected Security Events to the Analyst II per defined procedures
- Enrich indicators of compromise (IOCs) using tools such as VirusTotal and AbuseIPDB to support investigation context
- Maintain awareness of current threats and indicators of compromise relevant to the organization’s environment
Phishing Investigation:
- Perform initial triage of phishing submissions and Abnormal AI-surfaced email threats
- Review reported emails in the Abnormal console and Splunk to assess malicious indicators
- Document phishing investigation findings in ClickUp and escalate confirmed threats to the Analyst II
- Follow established phishing response runbooks including initial containment actions within authorized scope
Endpoint & Access Monitoring:
- Monitor CrowdStrike detections and alerts for endpoint threats; document findings and escalate per runbook
- Review Netskope alerts for anomalous web or cloud access activity and escalate as appropriate
- Review CyberArk PAM-sourced events in Splunk for basic privileged account anomalies per defined criteria
SOAR & Automation:
- Execute existing Splunk SOAR playbooks as directed to support investigation and response workflows (in implementation)
- Document playbook execution results in ClickUp and flag any unexpected outputs to the Analyst II
Reporting & Shift Handoff:
- Produce accurate shift handoff notes and alert summary dashboards in Splunk for Analyst II review
- Contribute to daily SOC reporting by ensuring case notes and investigation status are current in ClickUp
- Identify and communicate false positive patterns to senior analysts to support detection quality improvement
Process & Documentation:
- Follow all SOC runbooks, standard operating procedures, and escalation workflows
- Contribute to the knowledge base by documenting novel investigation findings or patterns
- Participate in team meetings, training sessions, and incident response drills
- Note: File integrity monitoring and data loss prevention alerting will be onboarded as monitoring sources in a future phase; SOC Analyst I responsibilities will be updated accordingly
What you'll bring to Zotec:
- 0–2 years of experience in information security, IT operations, or a related field
- Knowledge of:
- Foundational security concepts including common attack types and threat categories
- Network protocols and basic infrastructure concepts
- Windows and Linux operating system fundamentals
- Log analysis and basic security event correlation
- Familiarity with:
- SIEM platforms and security monitoring tools
- EDR/XDR solutions
- IDS/IPS systems
- Standard incident response procedures
Preferred:
- Security certifications such as:
- CompTIA Security+
- HTB CJCA — Certified Junior Cybersecurity Analyst (entry-level SOC, SIEM monitoring, network traffic analysis, log review, intrusion detection)
- SSCP or GCIA
- Hands-on exposure to Splunk (basic searches, alert review, dashboard navigation)
- Familiarity with CrowdStrike Falcon console
- Basic scripting exposure (Python, PowerShell, or Bash)
- Bachelor’s degree in Computer Science, Cybersecurity, or related field, or equivalent experience
See all 45+ Security Operations Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Operations Analyst roles.
Get Access To All JobsTips for Finding TN Visa Sponsorship as a Security Operations Analyst
Align your credentials to the SOC definition
CBP adjudicates TN eligibility on the spot for Canadians. Your degree must map to computer science, information technology, or a directly related field. A general business or management degree without a technical concentration is a common denial trigger.
Target employers experienced with visa sponsorship
Large financial institutions, managed security service providers, and federal contractors with recent visa filings often hire for security operations roles. Identifying employers experienced with visa sponsorship can help you target companies more likely to support your TN application.
Request a support letter that names USMCA explicitly
Your employer's offer letter must reference the USMCA treaty, describe the role as a Computer Systems Analyst position, and confirm the specialty occupation requirement. Vague offer letters are a leading cause of port-of-entry delays for Canadian applicants.
Prepare documentation for certification and tooling overlap
CBP officers sometimes question whether SOC analyst duties are sufficiently specialized. Listing certifications like CISSP, CEH, or CompTIA Security Plus alongside your degree in your support package strengthens the specialty occupation argument for this role.
Use Migrate Mate to surface active TN sponsorship openings
Filtering job listings by TN eligibility manually takes hours. Migrate Mate lets you search Security Operations Analyst roles by TN visa sponsorship status so you reach employers already prepared to file before you apply.
Understand Mexican nationals need consular processing
Unlike Canadians, Mexican citizens cannot self-petition at the border. Your employer files the TN petition through a U.S. consulate in Mexico, and USCIS processing adds time to your timeline. Build at least 60 to 90 days into your start date negotiation.
Security Operations Analyst jobs are hiring across the US. Find yours.
Find Security Operations Analyst JobsSecurity Operations Analyst TN Visa: Frequently Asked Questions
Does a Security Operations Analyst role qualify for a TN visa?
Yes, Security Operations Analyst roles typically qualify under the USMCA's Computer Systems Analyst category, provided your employer's offer letter frames the duties as systems analysis work requiring a specialized degree. The key requirement is that the position demands at least a bachelor's degree in computer science, information technology, or a directly related field. Roles focused solely on physical security operations without an IT component do not qualify.
How does TN compare to H-1B for Security Operations Analyst positions?
TN has no annual lottery, no cap for Canadian citizens, and no multi-month USCIS adjudication queue. Canadian applicants can be approved at the port of entry the same day, while H-1B requires filing months in advance and entering a random lottery. Mexican nationals face consular processing under TN, which adds time, but still avoid the H-1B lottery entirely. TN is renewable indefinitely in three-year increments.
What documents does my employer need to prepare for my TN petition?
Your employer needs to provide a support letter on company letterhead that identifies the position as a Computer Systems Analyst role under USMCA, describes your specific duties, confirms your professional qualifications, and states the expected duration of employment. You also need your original academic credentials or official transcripts. Canadian applicants present these documents at the port of entry; Mexican applicants submit them through consular processing.
Where can I find Security Operations Analyst jobs that offer TN visa sponsorship?
Most general job boards don't filter by visa type, which means you spend time applying to roles where the employer has no TN filing experience. Migrate Mate is built specifically for this search, letting you find Security Operations Analyst openings filtered by TN visa sponsorship so you connect with employers who are already prepared to support your petition.
Can I switch employers while on a TN visa as a Security Operations Analyst?
Yes, but you cannot start working for the new employer until a new TN is approved. Canadian citizens can go to a port of entry to get a new TN on the same day with a new offer letter. Mexican nationals must go through consular processing again, so plan your transition window accordingly and avoid any gap where you'd be working without valid status.
See which Security Operations Analyst employers are hiring and sponsoring visas right now.
Search Security Operations Analyst Jobs