TN Visa Senior Information Security Analyst Jobs
Senior Information Security Analyst roles qualify for TN visa sponsorship under the USMCA's Computer Systems Analyst category, covering security architecture, risk assessment, and threat monitoring. Canadian citizens can apply at the border with no cap; Mexican citizens require consular processing. Employers file no separate petition with USCIS for Canadian applicants.
See All Senior Information Security Analyst JobsOverview
Showing 5 of 14+ Senior Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 14+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All Jobs
About Gen:
Gen is a global company dedicated to powering Digital Freedom through its trusted consumer brands including Norton, Avast, LifeLock, MoneyLion and more. Our combined heritage is rooted in financial empowerment and cyber safety for the first digital generations, and today we deliver award-winning cybersecurity, online privacy, identity protection and financial wellness solutions to nearly 500 million users in more than 150 countries.
Together, we share a collective passion and vision to protect consumers and help them grow, manage and secure their digital and financial lives. We’re always looking for smart, fearless and high-impact talent who see AI as a teammate – leveraging it to move faster and deliver meaningful results.
When you’re part of Gen, you’ll have the flexibility, tools and support to do your best work and grow your career – from flexible working options and time off to competitive pay, benefits and well-being programs.
At Gen, we are scrappy and relentlessly customer driven. We create room for healthy debate, experimentation and continuous learning, and we seek out people with different experiences, identities and ideas to join our team. You’ll work with people who back each other, respect each other and understand that our differences are a competitive advantage.
If this sounds like you, we’d love you to be part of Gen.
About the Role:
We’re looking for an independent, driven security professional who thrives at the intersection of security, DevOps, and delivery. In this role, you will translate legal and security framework requirements into clear, actionable vulnerability management and remediation programs that operate across multiple Security and DevOps teams. You’ll help design, operationalize, and continually improve our vulnerability management lifecycle, from identification and triage through prioritization and remediation to validation and reporting. This includes secure development practices within regulatory frameworks guiding vulnerability handling, coordinated disclosure, SBOM transparency, patch management, and post-deployment monitoring. You will track, report, and escalate progress, risks, and dependencies, partnering closely with a Senior Project Manager and reporting to senior leadership. If you enjoy making complex requirements practical, measurable, and delivered—this is for you.
Key Responsibilities:
- Translate requirements action: Break down legal, regulatory (including Cyber Resiliency Act), and security framework obligations into prioritized, testable tasks for engineering and platform teams. Define concrete technical control requirements across vulnerability detection, remediation SLAs, secure configuration baselines, SBOM management, and coordinated disclosure processes.
- Own the vulnerability management lifecycle: Drive end-to-end vulnerability management across infrastructure, cloud, applications, containers, and third-party components—including scanning, triage, risk-based prioritization (CVSS + exploitability + business impact), remediation tracking, validation, and closure.
- Integrate security into CI/CD: Partner closely with the Application Security team to support SAST, DAST, SCA, container, IaC, and cloud configuration scanning into CI/CD pipelines. Ensure findings are automatically ticketed, risk-ranked, and tracked to resolution with measurable SLAs.
- Orchestrate implementation: Coordinate work across multiple security domains (e.g., IAM, vuln mgmt, cloud security, appsec) and DevOps/Platform teams to drive consistent adoption.
- Plan & track delivery: Build delivery plans, track milestones, manage dependencies, and maintain a single source of truth (e.g., Jira/Azure Boards).
- Stakeholder management: Align with product owners, architects, and security SMEs; resolve blockers and facilitate decisions.
- Metrics & reporting: Develop actionable dashboards that show vulnerability aging, SLA compliance, backlog trends, recurring vulnerability patterns, report status, risk exposure, and remediation plans to senior leadership in concise dashboards.
- Control mapping & evidence: Help map vulnerability management practices to regulatory frameworks and collect/curate evidence for audits.
- Continuous improvement: Standardize templates, automate playbooks and evidence collection, and reduce manual triage effort to advance processes and program maturity.
- Partner with PM: Work hand-in-hand with a Senior PM to align scope, timelines, compliance deadlines, and cross-team execution.
About you:
- A degree in Information Technology or a related field, ideally with a focus on cybersecurity, is an advantage.
- 5+ years of experience in vulnerability management, security engineering, or security program delivery in a cloud/software environment.
- Demonstrated ability to work independently and drive outcomes across multiple teams.
- Working understanding of regulatory security requirements and demonstrated experience with common frameworks/regulations implementation (e.g., ISO 27001, NIS2, SOC 2, GDPR, PCI DSS).
- Strong translation skills: turn policy and control language into developer-ready user stories, acceptance criteria, remediation tasks, and runbooks.
- Hands-on experience using work tracking tools (Jira, Azure DevOps, etc.) and crafting status reports/dashboards for leadership.
- Strong communication skills: comfortable analyzing vulnerability trends, including ageing, patch latency, and systemic root causes, supported by concise writing ability, clear meeting facilitation, and demonstrated experience with stakeholder alignment.
- Understanding of modern SDLC/DevOps practices (CI/CD, IaC, pipelines, change management).
- Experience in cloud environments (AWS/Azure/GCP), including shared responsibility and guardrail patterns.
- Wry sense of humor is a plus.
What’s next:
- Recruiter Phone Screen
- Technical Interview
- Hiring Manager Interview
Gen is an equal opportunity employer, and we’re committed to fair, inclusive practices at every stage of the candidate and employee journey. Employment decisions are based on merit, experience and business needs.

About Gen:
Gen is a global company dedicated to powering Digital Freedom through its trusted consumer brands including Norton, Avast, LifeLock, MoneyLion and more. Our combined heritage is rooted in financial empowerment and cyber safety for the first digital generations, and today we deliver award-winning cybersecurity, online privacy, identity protection and financial wellness solutions to nearly 500 million users in more than 150 countries.
Together, we share a collective passion and vision to protect consumers and help them grow, manage and secure their digital and financial lives. We’re always looking for smart, fearless and high-impact talent who see AI as a teammate – leveraging it to move faster and deliver meaningful results.
When you’re part of Gen, you’ll have the flexibility, tools and support to do your best work and grow your career – from flexible working options and time off to competitive pay, benefits and well-being programs.
At Gen, we are scrappy and relentlessly customer driven. We create room for healthy debate, experimentation and continuous learning, and we seek out people with different experiences, identities and ideas to join our team. You’ll work with people who back each other, respect each other and understand that our differences are a competitive advantage.
If this sounds like you, we’d love you to be part of Gen.
About the Role:
We’re looking for an independent, driven security professional who thrives at the intersection of security, DevOps, and delivery. In this role, you will translate legal and security framework requirements into clear, actionable vulnerability management and remediation programs that operate across multiple Security and DevOps teams. You’ll help design, operationalize, and continually improve our vulnerability management lifecycle, from identification and triage through prioritization and remediation to validation and reporting. This includes secure development practices within regulatory frameworks guiding vulnerability handling, coordinated disclosure, SBOM transparency, patch management, and post-deployment monitoring. You will track, report, and escalate progress, risks, and dependencies, partnering closely with a Senior Project Manager and reporting to senior leadership. If you enjoy making complex requirements practical, measurable, and delivered—this is for you.
Key Responsibilities:
- Translate requirements action: Break down legal, regulatory (including Cyber Resiliency Act), and security framework obligations into prioritized, testable tasks for engineering and platform teams. Define concrete technical control requirements across vulnerability detection, remediation SLAs, secure configuration baselines, SBOM management, and coordinated disclosure processes.
- Own the vulnerability management lifecycle: Drive end-to-end vulnerability management across infrastructure, cloud, applications, containers, and third-party components—including scanning, triage, risk-based prioritization (CVSS + exploitability + business impact), remediation tracking, validation, and closure.
- Integrate security into CI/CD: Partner closely with the Application Security team to support SAST, DAST, SCA, container, IaC, and cloud configuration scanning into CI/CD pipelines. Ensure findings are automatically ticketed, risk-ranked, and tracked to resolution with measurable SLAs.
- Orchestrate implementation: Coordinate work across multiple security domains (e.g., IAM, vuln mgmt, cloud security, appsec) and DevOps/Platform teams to drive consistent adoption.
- Plan & track delivery: Build delivery plans, track milestones, manage dependencies, and maintain a single source of truth (e.g., Jira/Azure Boards).
- Stakeholder management: Align with product owners, architects, and security SMEs; resolve blockers and facilitate decisions.
- Metrics & reporting: Develop actionable dashboards that show vulnerability aging, SLA compliance, backlog trends, recurring vulnerability patterns, report status, risk exposure, and remediation plans to senior leadership in concise dashboards.
- Control mapping & evidence: Help map vulnerability management practices to regulatory frameworks and collect/curate evidence for audits.
- Continuous improvement: Standardize templates, automate playbooks and evidence collection, and reduce manual triage effort to advance processes and program maturity.
- Partner with PM: Work hand-in-hand with a Senior PM to align scope, timelines, compliance deadlines, and cross-team execution.
About you:
- A degree in Information Technology or a related field, ideally with a focus on cybersecurity, is an advantage.
- 5+ years of experience in vulnerability management, security engineering, or security program delivery in a cloud/software environment.
- Demonstrated ability to work independently and drive outcomes across multiple teams.
- Working understanding of regulatory security requirements and demonstrated experience with common frameworks/regulations implementation (e.g., ISO 27001, NIS2, SOC 2, GDPR, PCI DSS).
- Strong translation skills: turn policy and control language into developer-ready user stories, acceptance criteria, remediation tasks, and runbooks.
- Hands-on experience using work tracking tools (Jira, Azure DevOps, etc.) and crafting status reports/dashboards for leadership.
- Strong communication skills: comfortable analyzing vulnerability trends, including ageing, patch latency, and systemic root causes, supported by concise writing ability, clear meeting facilitation, and demonstrated experience with stakeholder alignment.
- Understanding of modern SDLC/DevOps practices (CI/CD, IaC, pipelines, change management).
- Experience in cloud environments (AWS/Azure/GCP), including shared responsibility and guardrail patterns.
- Wry sense of humor is a plus.
What’s next:
- Recruiter Phone Screen
- Technical Interview
- Hiring Manager Interview
Gen is an equal opportunity employer, and we’re committed to fair, inclusive practices at every stage of the candidate and employee journey. Employment decisions are based on merit, experience and business needs.
See all 14+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All JobsTips for Finding TN Visa Sponsorship as a Senior Information Security Analyst
Frame your credentials around Computer Systems Analyst
TN visa eligibility for this role depends on matching USMCA's Computer Systems Analyst category. Your resume, degree, and offer letter must all describe systems-focused security work, not a generic cybersecurity or IT management function.
Target employers with recent visa filing experience
Employers experienced with visa sponsorship for computer systems roles understand the credential requirements for TN status. Search Migrate Mate for companies with recent visa filings in information security and systems analysis roles—these employers have demonstrated familiarity with work visa processes and may consider TN sponsorship for qualified candidates.
Confirm your offer letter uses the right occupation language
CBP officers assess TN eligibility at entry based on your offer letter. Get your employer to describe your duties as systems analysis and security architecture, not broadly as cybersecurity management, to avoid a category mismatch at the border.
Use Migrate Mate to find verified sponsoring employers
Searching broadly wastes time on employers unfamiliar with TN sponsorship. Migrate Mate filters Senior Information Security Analyst roles by TN visa sponsorship history, so you apply to employers already equipped to hire you.
Prepare for Canadian border entry with a complete document packet
Canadian citizens can receive TN status directly at a port of entry, but CBP expects a degree credential, a detailed offer letter, and proof of professional experience in security analysis. Incomplete packets result in same-day denial with no appeal option.
Negotiate TN renewal timing before accepting an offer
TN status is granted in three-year increments with unlimited renewals, but your employer must be willing to support each renewal. Confirm renewal commitment in writing before signing, since a lapse in employer support ends your status.
Senior Information Security Analyst jobs are hiring across the US. Find yours.
Find Senior Information Security Analyst JobsSenior Information Security Analyst TN Visa: Frequently Asked Questions
Does Senior Information Security Analyst qualify for TN visa status?
Yes, but the job title itself is not what CBP evaluates. The role must functionally qualify under the USMCA's Computer Systems Analyst category. Your duties need to center on systems-level security analysis, threat architecture, or risk assessment. Roles that tilt toward general IT management or non-technical security oversight may not satisfy the category definition at the border.
How does TN compare to H-1B for Senior Information Security Analyst roles?
TN has no annual lottery, no petition filing for Canadian applicants, and no cap on approvals. H-1B requires USCIS registration, lottery selection, and months of processing. For a Senior Information Security Analyst, TN is typically faster to activate and cheaper to maintain. The tradeoff is that TN does not support immigrant intent, so long-term permanent residency planning requires a separate strategy.
Can Mexican nationals get TN status for this role as easily as Canadians?
Mexican nationals must apply at a U.S. consulate in Mexico rather than at a port of entry, and consular appointment availability adds time to the process. The credential and occupation requirements are identical to those for Canadians, but Mexican nationals also have a sub-cap allocation under USMCA. Processing complexity is higher, and document preparation needs to account for the consular interview stage.
Where can I find Senior Information Security Analyst jobs that offer TN visa sponsorship?
Most general job boards don't filter by employer visa sponsorship experience, which means significant time spent on applications that go nowhere. Migrate Mate is built specifically for this search, letting you browse Senior Information Security Analyst openings filtered by employers with recent visa filings so you're targeting companies experienced with visa sponsorship and more likely to understand the TN process.
What happens to my TN status if I'm laid off from a Senior Information Security Analyst role?
TN status is employer-specific, so a layoff immediately affects your authorized work status. There is no formal grace period codified in regulation for TN holders the way there is for H-1B, though CBP has discretion. You'd need to either depart the U.S., secure a new TN-qualifying offer and reenter, or pursue a change of status before your I-94 expires.
See which Senior Information Security Analyst employers are hiring and sponsoring visas right now.
Search Senior Information Security Analyst Jobs