Security Engineer Visa Sponsorship Jobs in Kansas
Security engineer visa sponsorship jobs in Kansas are concentrated in Wichita, Overland Park, and the Kansas City metro, where aerospace firms like Spirit AeroSystems, defense contractors, and financial services companies such as INTRUST Bank actively hire for cybersecurity roles. Federal facilities and university research programs at Kansas State University also support steady demand.
See All Security Engineer JobsOverview
Showing 5 of 27+ Security Engineer Jobs in Kansas with Visa Sponsorship jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 27+ Security Engineer Jobs in Kansas with Visa Sponsorship
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Engineer Jobs in Kansas with Visa Sponsorship.
Get Access To All Jobs
INTRODUCTION
We are seeking a full-time Senior Cyber Security Engineer at Garmin's U.S. headquarters in the Greater Kansas City area. In this role, you will be responsible for the analysis of digital evidence and investigation of computers in support of system and network vulnerability mitigation. This individual is responsible for conducting sensitive, complex investigations into cyber incidents, systems compromise, data loss, insider threats and other cyber incidents. This member of the Cyber Defense Forensics Security Team (CSIRT) will provide recommendations on security posture and architecture of systems or networks and ensure adherence to Garmin's information security strategy, policies, programs, and best practices. This individual will lead and organize collection, processing, preservation, analysis, and presentation of evidence in support of a wide array of investigations.
Responsibilities
Essential Functions:
- Serve as a trusted advisor to other cybersecurity teams and to Garmin business segments on multiple domains in cybersecurity
- Mentor and develop a team of highly skilled security professionals, promoting knowledge transfer, skill development, and a culture of continuous learning and improvement
- Proactively evaluate and design improvements to tool integrations and workflows, developing advanced automation and scripts and optimizing the use of security tool APIs
- Lead planning for project components, provide reliable progress reporting, and ensure cross-team alignment on schedules, risks, and deliverables
- Design and develop complex, integrated solutions to meet business requirements and enhance the performance of Garmin’s security systems
- Contribute to the team roadmap and priorities
- Collaborate with cross-functional teams to identify automation opportunities that increase efficiency and reduce manual processes
- Participate in the evaluation and adoption of emerging security technologies to improve threat detection, prevention, and response
- Advise leadership on strategic technology investments to advance cybersecurity engineering capabilities
- Create opportunities to share knowledge, skills, and abilities with other team members to further their professional development through training, mentoring, and hands-on assistance as appropriate
- Apply experience of investigative techniques in responding to host and network-based anomalies
- Evaluate system log files, acquired evidence, and other information to determine best methods for identifying and responding to the source of the incident or possible threats to security
- Coordinate closely with security operations center to determine scope, urgency, and potential impact, identifying possible specific vulnerabilities and making recommendations to expedite remediation
- Conduct host and network forensic analyses in and for both Windows, Linux, and MacOS environments and examine the recovered data for information of relevance to the investigation at hand
- Collect and analyze intrusion artifacts to include portable executables, malware, and system configuration and use the discovered data to enable mitigation of cyber defense incidents within the enterprise
- Develop malware analysis procedures using static and dynamic approaches to identify characteristics, capabilities, and an understanding of its functions so defensive actions can be taken
- Extract from memory and storage media files, malicious software, and forensics artifacts for analysis and provide detailed technical data as appropriate
- Conduct code analysis and possess a working background in programming languages and ASM
- Possess the ability to build and maintain malware analysis environments using cloud, virtual, and bare metal systems architectures that give insight into system and network behaviors
- Conduct and document cyber threat research using OSINT, incident response engagement data, and proprietary tool telemetry to produce intelligence threat assessments and threat actor summary products
- Evaluate and organize threat actor tools, tactics, and procedures (TTPs) according to MITRE ATT&CK and adjust collection, detection, or visibility within the enterprise once coverage gaps have been identified
- Function in a collaborative environment, providing continuous consultation with other analysts and experts—both internal and external to the organization—leveraging your analytical and technical expertise
BASIC QUALIFICATIONS
- Bachelor's Degree in Computer Science, Information Technology, Management Information Systems, Business or another relevant field AND a minimum of 5 years of relevant experience OR an equivalent combination of education and relevant experience
- Leads clear, concise, and influential communication across teams and stakeholders
- Fosters collaboration, demonstrating leadership in team dynamics and maintaining a positive, solution-oriented approach
- Serves as a go-to problem solver for complex or ambiguous challenges, consistently delivering effective solutions and guiding others through problem-solving approaches
- Effectively prioritizes complex workloads and ensures timely follow-up on commitments
- Produces comprehensive, high-quality documentation and promotes best practices for organization and clarity
- Experience leading complex security engineering initiatives and mentoring team members on best practices in security operations and automation
- Strong understanding of core information technology services such as networking, storage, databases, and web-based services
- Possesses solid experience and working knowledge in cybersecurity, including threat modeling, adversary attack methodologies, incident handling, and triage
- Skilled in using common forensics tools such as EnCase, FTK, SleuthKit/Autopsy, Volatility, or similar solutions
- Proficient in conducting network, host, and memory forensics (including live response) across Windows, Mac, and Linux systems
- Demonstrates working proficiency with scripting or programming in Bash, Python, PowerShell, or Ruby
- Familiar with malware analysis procedures, using static and dynamic techniques to identify characteristics, capabilities, and potential impact
- Capable of extracting malicious software and forensic artifacts from memory or storage media and performing basic to intermediate analysis of the collected material
- Able to review and interpret code, with a foundational understanding of common programming languages and assembly concepts
- Experience setting up and maintaining malware analysis environments using cloud, virtual, or bare-metal systems to observe system and network behaviors
- Skilled in conducting cyber threat research using OSINT, incident data, and tool telemetry to develop threat summaries or assessment reports
- Experience organizing threat actor tools, tactics, and procedures (TTPs) in alignment with frameworks such as MITRE ATT&CK, and supporting improvements to detection and visibility
PREFERRED QUALIFICATIONS
- Cybersecurity certifications such as CISSP, CCSP, ISSEP, etc.
- Experience with Azure or AWS public cloud services
- Certifications such as SSCP (Systems Security Certified Practitioner), SANS - GREM (GIAC Reverse Engineering), GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC Network Forensic Analyst), GCIH (GIAC Certified Incident Handler), FTK ACE (AccessData Certified Examiner), EnCase EnCE (Certified Examiner), or similar are highly desirable
Garmin International is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, veteran's status, age or disability.
This position is eligible for Garmin's benefit program. Details can be found here: Garmin Benefits

INTRODUCTION
We are seeking a full-time Senior Cyber Security Engineer at Garmin's U.S. headquarters in the Greater Kansas City area. In this role, you will be responsible for the analysis of digital evidence and investigation of computers in support of system and network vulnerability mitigation. This individual is responsible for conducting sensitive, complex investigations into cyber incidents, systems compromise, data loss, insider threats and other cyber incidents. This member of the Cyber Defense Forensics Security Team (CSIRT) will provide recommendations on security posture and architecture of systems or networks and ensure adherence to Garmin's information security strategy, policies, programs, and best practices. This individual will lead and organize collection, processing, preservation, analysis, and presentation of evidence in support of a wide array of investigations.
Responsibilities
Essential Functions:
- Serve as a trusted advisor to other cybersecurity teams and to Garmin business segments on multiple domains in cybersecurity
- Mentor and develop a team of highly skilled security professionals, promoting knowledge transfer, skill development, and a culture of continuous learning and improvement
- Proactively evaluate and design improvements to tool integrations and workflows, developing advanced automation and scripts and optimizing the use of security tool APIs
- Lead planning for project components, provide reliable progress reporting, and ensure cross-team alignment on schedules, risks, and deliverables
- Design and develop complex, integrated solutions to meet business requirements and enhance the performance of Garmin’s security systems
- Contribute to the team roadmap and priorities
- Collaborate with cross-functional teams to identify automation opportunities that increase efficiency and reduce manual processes
- Participate in the evaluation and adoption of emerging security technologies to improve threat detection, prevention, and response
- Advise leadership on strategic technology investments to advance cybersecurity engineering capabilities
- Create opportunities to share knowledge, skills, and abilities with other team members to further their professional development through training, mentoring, and hands-on assistance as appropriate
- Apply experience of investigative techniques in responding to host and network-based anomalies
- Evaluate system log files, acquired evidence, and other information to determine best methods for identifying and responding to the source of the incident or possible threats to security
- Coordinate closely with security operations center to determine scope, urgency, and potential impact, identifying possible specific vulnerabilities and making recommendations to expedite remediation
- Conduct host and network forensic analyses in and for both Windows, Linux, and MacOS environments and examine the recovered data for information of relevance to the investigation at hand
- Collect and analyze intrusion artifacts to include portable executables, malware, and system configuration and use the discovered data to enable mitigation of cyber defense incidents within the enterprise
- Develop malware analysis procedures using static and dynamic approaches to identify characteristics, capabilities, and an understanding of its functions so defensive actions can be taken
- Extract from memory and storage media files, malicious software, and forensics artifacts for analysis and provide detailed technical data as appropriate
- Conduct code analysis and possess a working background in programming languages and ASM
- Possess the ability to build and maintain malware analysis environments using cloud, virtual, and bare metal systems architectures that give insight into system and network behaviors
- Conduct and document cyber threat research using OSINT, incident response engagement data, and proprietary tool telemetry to produce intelligence threat assessments and threat actor summary products
- Evaluate and organize threat actor tools, tactics, and procedures (TTPs) according to MITRE ATT&CK and adjust collection, detection, or visibility within the enterprise once coverage gaps have been identified
- Function in a collaborative environment, providing continuous consultation with other analysts and experts—both internal and external to the organization—leveraging your analytical and technical expertise
BASIC QUALIFICATIONS
- Bachelor's Degree in Computer Science, Information Technology, Management Information Systems, Business or another relevant field AND a minimum of 5 years of relevant experience OR an equivalent combination of education and relevant experience
- Leads clear, concise, and influential communication across teams and stakeholders
- Fosters collaboration, demonstrating leadership in team dynamics and maintaining a positive, solution-oriented approach
- Serves as a go-to problem solver for complex or ambiguous challenges, consistently delivering effective solutions and guiding others through problem-solving approaches
- Effectively prioritizes complex workloads and ensures timely follow-up on commitments
- Produces comprehensive, high-quality documentation and promotes best practices for organization and clarity
- Experience leading complex security engineering initiatives and mentoring team members on best practices in security operations and automation
- Strong understanding of core information technology services such as networking, storage, databases, and web-based services
- Possesses solid experience and working knowledge in cybersecurity, including threat modeling, adversary attack methodologies, incident handling, and triage
- Skilled in using common forensics tools such as EnCase, FTK, SleuthKit/Autopsy, Volatility, or similar solutions
- Proficient in conducting network, host, and memory forensics (including live response) across Windows, Mac, and Linux systems
- Demonstrates working proficiency with scripting or programming in Bash, Python, PowerShell, or Ruby
- Familiar with malware analysis procedures, using static and dynamic techniques to identify characteristics, capabilities, and potential impact
- Capable of extracting malicious software and forensic artifacts from memory or storage media and performing basic to intermediate analysis of the collected material
- Able to review and interpret code, with a foundational understanding of common programming languages and assembly concepts
- Experience setting up and maintaining malware analysis environments using cloud, virtual, or bare-metal systems to observe system and network behaviors
- Skilled in conducting cyber threat research using OSINT, incident data, and tool telemetry to develop threat summaries or assessment reports
- Experience organizing threat actor tools, tactics, and procedures (TTPs) in alignment with frameworks such as MITRE ATT&CK, and supporting improvements to detection and visibility
PREFERRED QUALIFICATIONS
- Cybersecurity certifications such as CISSP, CCSP, ISSEP, etc.
- Experience with Azure or AWS public cloud services
- Certifications such as SSCP (Systems Security Certified Practitioner), SANS - GREM (GIAC Reverse Engineering), GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC Network Forensic Analyst), GCIH (GIAC Certified Incident Handler), FTK ACE (AccessData Certified Examiner), EnCase EnCE (Certified Examiner), or similar are highly desirable
Garmin International is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, veteran's status, age or disability.
This position is eligible for Garmin's benefit program. Details can be found here: Garmin Benefits
Security Engineer Job Roles in Kansas
See all 27+ Security Engineer Jobs in Kansas
Sign up for free to filter by visa type, set job alerts, and find employers with verified sponsorship history.
Search Security Engineer Jobs in KansasSecurity Engineer Jobs in Kansas: Frequently Asked Questions
Which companies sponsor visas for security engineers in Kansas?
Employers with a history of sponsoring security engineers in Kansas include Spirit AeroSystems and other aerospace and defense contractors in Wichita, as well as financial services firms and IT consultancies in Overland Park and the greater Kansas City area. Large federal contractors operating near Fort Leavenworth and other government facilities also file sponsorship petitions for security-focused roles with any regularity.
Which visa types are most common for security engineer roles in Kansas?
The H-1B is the most common visa category for security engineers in Kansas, as the role typically qualifies as a specialty occupation requiring at least a bachelor's degree in computer science, information security, or a related field. Candidates with advanced credentials may also see L-1B petitions used for intracompany transfers, and those with extraordinary ability sometimes pursue the O-1. TN status is available to Canadian and Mexican nationals in qualifying engineering roles.
Which cities in Kansas have the most security engineer sponsorship jobs?
Overland Park, as part of the Kansas City metro, sees the highest concentration of security engineer sponsorship activity in Kansas, driven by technology firms, financial institutions, and IT service providers. Wichita follows, supported by aerospace manufacturing and defense contractors. Lawrence and Manhattan have smaller but growing markets tied to the University of Kansas and Kansas State University research ecosystems.
How to find security engineer visa sponsorship jobs in Kansas?
Migrate Mate filters job listings specifically for roles that include visa sponsorship, so you can search security engineer positions in Kansas without sifting through employers who do not sponsor. The platform surfaces openings from aerospace, defense, financial services, and tech employers across Wichita and the Kansas City metro, which are the two primary hiring hubs for this role in the state.
Are there state-specific factors that affect security engineer sponsorship hiring in Kansas?
Kansas has a notable defense and aerospace industry concentration, meaning many security engineer roles involve access to sensitive systems or facilities that require security clearances. Employers may prefer candidates who already hold or are eligible for a clearance, which can affect how they structure sponsorship decisions. Kansas State University and the University of Kansas also supply a pipeline of domestic and international cybersecurity graduates that shapes local hiring patterns.
What is the prevailing wage for sponsored security engineer jobs in Kansas?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which security engineer employers are hiring and sponsoring visas in Kansas right now.
Search Security Engineer Jobs in Kansas