Cybersecurity Engineer Visa Sponsorship Jobs in New Jersey
New Jersey's cybersecurity engineering market is anchored by financial services firms in Jersey City, pharma and life sciences companies along the Route 1 corridor, and defense contractors near Fort Dix. Major employers including JPMorgan Chase, Johnson & Johnson, and Lockheed Martin regularly sponsor visas for cybersecurity engineers across the state.
See All Cybersecurity Engineer JobsOverview
Showing 5 of 143+ Cybersecurity Engineer Jobs in New Jersey with Visa Sponsorship jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 143+ Cybersecurity Engineer Jobs in New Jersey with Visa Sponsorship
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Engineer Jobs in New Jersey with Visa Sponsorship.
Get Access To All Jobs
INTRODUCTION
When you join Verizon you want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.
ROLE AND RESPONSIBILITIES
The GN&T Network Security team is looking for a highly motivated and experienced Cybersecurity Engineer to join the Network Security Defense team. The Defense teams are responsible for owning the security lifecycle and effectiveness across the Core, Edge, and Access networks, as well as all systems and network functions within GN&T. In this role, you will be critical in advancing our security posture through real-time Threat Monitoring & Detection using SIEM tools like Splunk, leading Incident Response efforts during a breach, and managing the continuous Vulnerability Management lifecycle across networks and applications. The position also requires expertise in defining and implementing robust Security Architecture, including firewalls, encryption, centralized Identity and Access Management, and Multi-Factor Authentication (MFA). A strong candidate will also possess advanced Threat Hunting skills, including Advanced Networking & Protocol Analysis, Endpoint & Memory Forensics, Data Science & Querying, and demonstrable experience in Automation & Scripting to enhance our Cybersecurity tooling.
Key Responsibilities
- Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
- Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
- Driving and leading relevant, strategic solutions in a highly scalable environment, and leading the implementation of said solutions.
- Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes.
- Working independently on strategic technical challenges.
- Identifying opportunities to mentor, guide, and delegate technical documentation/tasks to support the team and broader organization.
- Communicating clearly and effectively, articulating complex technical concepts to diverse internal and external audiences.
- Lead network security incident response activities, including triage, containment, eradication, and recovery for disruptive threats.
- Build and refine incident playbooks and response runbooks, ensuring repeatable workflows for high-impact scenarios (ransomware, phishing, insider threat, DDoS, etc.).
- Serve as escalation support for security-related investigations, providing expert-level analysis and guidance during active incidents.
- Execute root cause analysis and produce clear incident reports outlining timeline, impact, evidence, and remediation recommendations.
- Conduct proactive threat hunting across the identity, endpoint, network telemetry to uncover adversary behavior and reduce dwell time.
- Create and tune threat detections using SIEM (Security Information and Event Management) to improve alert fidelity and reduce false positives.
- Drive continuous improvement of network visibility and telemetry collection to strengthen detection and response capabilities.
- Perform regular security control assessments validating configuration effectiveness and closing gaps discovered during incidents or hunts.
LOCATION
In this hybrid role, you'll have a defined work location that includes work from home and assigned office days in one of the offices listed for this position. In order to be eligible to apply for this position, you must be within commuting distance of one of those locations.
BASIC QUALIFICATIONS
- Bachelor’s degree or four or more years of work experience.
- Six or more years of relevant experience required, demonstrated through one or a combination of work and/or military experience, or specialized training.
- Expert-level ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
- Strong foundational knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
- In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
- Expert in conflict resolution and negotiation to ensure that design, strategy, and decisions consistently support security requirements.
- Strong analytical skills and attention to detail with a proven track record of managing and delivering results.
- Leadership experience as a subject matter expert with effective written, interpersonal, and verbal communication skills.
PREFERRED QUALIFICATIONS
- Security certifications such as CompTIA Security+, CISSP, CCIP, CISM, CCSP, OSCP (Offensive Security Certified Professional), Ethical Hacking (CEH, OSCP).
- Experience with Identity and Access Management (IAM) solutions.
- Ability to build consensus and a common understanding of security objectives, goals, and execution steps.
- Experience with network protocols and information security with networking certifications such as PCNSE, CCNP or CCNA.
- Experience with networks, 4G/5G wireless network functions or virtualization technologies like OpenStack and Kubernetes.
- Experience with scripting languages like Python and/or automation tools like Ansible.
- Experience in UNIX or Linux systems engineering expertise with a variety of variants.
- Experience with encryption for data in transit (e.g., IPsec, or TLS) and at rest.
SCHEDULED WEEKLY HOURS
40
EQUAL EMPLOYMENT OPPORTUNITY
Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to veteran status, disability or other legally protected characteristics.
BENEFITS AND COMPENSATION
Our benefits are designed to help you move forward in your career, and in areas of your life outside of Verizon. From health and wellness benefit options including: medical, dental, vision, short and long term disability, basic life insurance, supplemental life insurance, AD&D insurance, identity theft protection, pet insurance and group home & auto insurance. We also offer a matched 401(k) savings plan, up to 8 company paid holidays per year and up to 6 personal days per year, paid parental leave, adoption assistance and tuition assistance, plus other incentives, we’ve got you covered with our award-winning total rewards package. Depending on the role, employees have the opportunity to receive compensation in the form of premium pay such as overtime, shift differential, holiday pay, allowances, etc. Newly hired employees receive up to 15 days of vacation per year, which grows with additional service. For part-timers, your coverage will vary as you may be eligible for some of these benefits depending on your individual circumstances. The salary will vary depending on your location and confirmed job-related skills and experience. This is an incentive based position with the potential to earn more. For part-time roles, your compensation will be adjusted to reflect your hours. The annual salary range for the location(s) listed on this job requisition based on a full-time schedule is: $120,500.00 - $231,000.00.

INTRODUCTION
When you join Verizon you want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.
ROLE AND RESPONSIBILITIES
The GN&T Network Security team is looking for a highly motivated and experienced Cybersecurity Engineer to join the Network Security Defense team. The Defense teams are responsible for owning the security lifecycle and effectiveness across the Core, Edge, and Access networks, as well as all systems and network functions within GN&T. In this role, you will be critical in advancing our security posture through real-time Threat Monitoring & Detection using SIEM tools like Splunk, leading Incident Response efforts during a breach, and managing the continuous Vulnerability Management lifecycle across networks and applications. The position also requires expertise in defining and implementing robust Security Architecture, including firewalls, encryption, centralized Identity and Access Management, and Multi-Factor Authentication (MFA). A strong candidate will also possess advanced Threat Hunting skills, including Advanced Networking & Protocol Analysis, Endpoint & Memory Forensics, Data Science & Querying, and demonstrable experience in Automation & Scripting to enhance our Cybersecurity tooling.
Key Responsibilities
- Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
- Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
- Driving and leading relevant, strategic solutions in a highly scalable environment, and leading the implementation of said solutions.
- Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes.
- Working independently on strategic technical challenges.
- Identifying opportunities to mentor, guide, and delegate technical documentation/tasks to support the team and broader organization.
- Communicating clearly and effectively, articulating complex technical concepts to diverse internal and external audiences.
- Lead network security incident response activities, including triage, containment, eradication, and recovery for disruptive threats.
- Build and refine incident playbooks and response runbooks, ensuring repeatable workflows for high-impact scenarios (ransomware, phishing, insider threat, DDoS, etc.).
- Serve as escalation support for security-related investigations, providing expert-level analysis and guidance during active incidents.
- Execute root cause analysis and produce clear incident reports outlining timeline, impact, evidence, and remediation recommendations.
- Conduct proactive threat hunting across the identity, endpoint, network telemetry to uncover adversary behavior and reduce dwell time.
- Create and tune threat detections using SIEM (Security Information and Event Management) to improve alert fidelity and reduce false positives.
- Drive continuous improvement of network visibility and telemetry collection to strengthen detection and response capabilities.
- Perform regular security control assessments validating configuration effectiveness and closing gaps discovered during incidents or hunts.
LOCATION
In this hybrid role, you'll have a defined work location that includes work from home and assigned office days in one of the offices listed for this position. In order to be eligible to apply for this position, you must be within commuting distance of one of those locations.
BASIC QUALIFICATIONS
- Bachelor’s degree or four or more years of work experience.
- Six or more years of relevant experience required, demonstrated through one or a combination of work and/or military experience, or specialized training.
- Expert-level ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
- Strong foundational knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
- In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
- Expert in conflict resolution and negotiation to ensure that design, strategy, and decisions consistently support security requirements.
- Strong analytical skills and attention to detail with a proven track record of managing and delivering results.
- Leadership experience as a subject matter expert with effective written, interpersonal, and verbal communication skills.
PREFERRED QUALIFICATIONS
- Security certifications such as CompTIA Security+, CISSP, CCIP, CISM, CCSP, OSCP (Offensive Security Certified Professional), Ethical Hacking (CEH, OSCP).
- Experience with Identity and Access Management (IAM) solutions.
- Ability to build consensus and a common understanding of security objectives, goals, and execution steps.
- Experience with network protocols and information security with networking certifications such as PCNSE, CCNP or CCNA.
- Experience with networks, 4G/5G wireless network functions or virtualization technologies like OpenStack and Kubernetes.
- Experience with scripting languages like Python and/or automation tools like Ansible.
- Experience in UNIX or Linux systems engineering expertise with a variety of variants.
- Experience with encryption for data in transit (e.g., IPsec, or TLS) and at rest.
SCHEDULED WEEKLY HOURS
40
EQUAL EMPLOYMENT OPPORTUNITY
Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to veteran status, disability or other legally protected characteristics.
BENEFITS AND COMPENSATION
Our benefits are designed to help you move forward in your career, and in areas of your life outside of Verizon. From health and wellness benefit options including: medical, dental, vision, short and long term disability, basic life insurance, supplemental life insurance, AD&D insurance, identity theft protection, pet insurance and group home & auto insurance. We also offer a matched 401(k) savings plan, up to 8 company paid holidays per year and up to 6 personal days per year, paid parental leave, adoption assistance and tuition assistance, plus other incentives, we’ve got you covered with our award-winning total rewards package. Depending on the role, employees have the opportunity to receive compensation in the form of premium pay such as overtime, shift differential, holiday pay, allowances, etc. Newly hired employees receive up to 15 days of vacation per year, which grows with additional service. For part-timers, your coverage will vary as you may be eligible for some of these benefits depending on your individual circumstances. The salary will vary depending on your location and confirmed job-related skills and experience. This is an incentive based position with the potential to earn more. For part-time roles, your compensation will be adjusted to reflect your hours. The annual salary range for the location(s) listed on this job requisition based on a full-time schedule is: $120,500.00 - $231,000.00.
Cybersecurity Engineer Job Roles in New Jersey
See all 143+ Cybersecurity Engineer Jobs in New Jersey
Sign up for free to filter by visa type, set job alerts, and find employers with verified sponsorship history.
Search Cybersecurity Engineer Jobs in New JerseyCybersecurity Engineer Jobs in New Jersey: Frequently Asked Questions
Which companies sponsor visas for cybersecurity engineers in New Jersey?
Financial institutions with large New Jersey operations, including JPMorgan Chase, Citi, and Goldman Sachs, are among the most active H-1B sponsors for cybersecurity engineers in the state. Large pharma employers like Johnson & Johnson, Merck, and Bristol Myers Squibb also sponsor regularly. Defense and government contractors near the McGuire-Dix-Lakehurst area, along with major consulting firms like Deloitte and Cognizant, round out the sponsorship activity.
Which visa types are most common for cybersecurity engineer roles in New Jersey?
The H-1B is the most common visa for cybersecurity engineers in New Jersey, as the role typically qualifies as a specialty occupation requiring a bachelor's degree or higher in computer science, information security, or a related field. F-1 students completing OPT or STEM OPT extensions are also well represented, particularly graduates from Rutgers, NJIT, and Stevens Institute of Technology. Some multinational employers use L-1B visas for transferring specialized security professionals from overseas offices.
Which cities in New Jersey have the most cybersecurity engineer sponsorship jobs?
Jersey City and Newark generate the highest concentration of cybersecurity engineer sponsorship activity, driven by their proximity to New York City's financial sector and large corporate campuses. The Route 1 corridor, spanning New Brunswick, Princeton, and Iselin, is dense with pharma, biotech, and tech employers that sponsor regularly. Parsippany and Florham Park also have active hiring through consulting and insurance firm headquarters based in Morris County.
How to find cybersecurity engineer visa sponsorship jobs in New Jersey?
Migrate Mate filters cybersecurity engineer jobs specifically by visa sponsorship willingness, so you can browse New Jersey openings without sifting through roles that won't support international candidates. The platform surfaces positions from financial services, pharma, defense, and tech employers across the state. Because New Jersey's sponsoring employers span multiple industries and cities, using a sponsorship-focused search tool like Migrate Mate saves significant time compared to general job searching.
Are there state-specific factors that affect cybersecurity engineer sponsorship in New Jersey?
New Jersey's concentration of financial services and pharmaceutical employers means cybersecurity engineers often work within heavily regulated environments requiring security clearances or industry-specific compliance knowledge, such as HIPAA for healthcare and PCI-DSS for finance. Employers filing Labor Condition Applications must meet Department of Labor prevailing wage requirements specific to New Jersey's wage levels, which are generally set at a higher tier than many other states, reflecting the region's cost of living and competitive market.
What is the prevailing wage for sponsored cybersecurity engineer jobs in New Jersey?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which cybersecurity engineer employers are hiring and sponsoring visas in New Jersey right now.
Search Cybersecurity Engineer Jobs in New Jersey