Cybersecurity Engineer Visa Sponsorship Jobs in North Carolina
North Carolina's cybersecurity engineer job market is anchored by Research Triangle Park, home to employers like Cisco, IBM, and Lenovo, alongside a growing financial technology sector in Charlotte. State and federal contractor roles around Raleigh, and university-affiliated research positions, make North Carolina one of the more active states for cybersecurity engineer visa sponsorship.
See All Cybersecurity Engineer JobsOverview
Showing 5 of 138+ Cybersecurity Engineer Jobs in North Carolina with Visa Sponsorship jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 138+ Cybersecurity Engineer Jobs in North Carolina with Visa Sponsorship
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Engineer Jobs in North Carolina with Visa Sponsorship.
Get Access To All Jobs
INTRODUCTION
Immediate need for a talented Cybersecurity Engineer. This is a 09 Months contract opportunity with long-term potential and is located in Charlotte, NC(Remote). Please review the job description below and contact me ASAP if you are interested. Job Diva ID: 26-10832.
COMPENSATION
Pay Range: $85-$89/hr. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
KEY RESPONSIBILITIES:
- Analyze Simulation Results: Evaluate the outcomes of Client, identifying weaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities.
- Provide Actionable Recommendations: Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings.
- Document and Communicate: Maintain documentation of Client methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders.
- Collaborate with Security Teams: Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results.
- Advanced Threat Hunting and Intelligence: Utilize threat intelligence to inform attack scenarios and identify emerging threats.
- Vulnerability Management: Identify, prioritize, and recommend remediation of high-risk vulnerabilities.
- Red Teaming and Blue Teaming: May also participate in red, purple, and blue team exercises to further evaluate security posture.
KEY REQUIREMENTS AND TECHNOLOGY EXPERIENCE:
- Key skills: BAS / Continuous Security Validation (CSV)
- Attack Surface Management (EASM)
- Security Testing & Automation
- Experience with Breach and Attack (Client) or Continuous Security Validation (CSV) tool(s).
- Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle.
- Experience with penetration testing, vulnerability management, and security tools.
- Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
- Experience with Breach and Attack (Client) or Continuous Security Validation (CSV) tool(s).
- Bachelor’s degree and twelve years of experience or an equivalent combination of education and work experience.
- Banking or financial services experience.
- Experience in designing and executing Attack Scenarios: Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs).
- Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls.
- Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle.
- Experience with penetration testing, vulnerability management, and security tools.
- Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
- Knowledge of common threat intelligence sources and frameworks.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and as part of a team.
- Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE Client&CK and D3FEND).
- Experience with GRC engineering.
- Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture.
- Hands-on experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse, CyCognito, etc.) and strong understanding of internet-scale asset discovery.
- Hands-on experience with vulnerability engineering or external attack surface security, with proven leadership in complex environments.
- Experience with commercial Client tools: AttackIQ, SafeBreach, Cymulate, etc.
- Experience with detection engineering and SOAR.
Our client is a leading Banking Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
By applying to our jobs, you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.

INTRODUCTION
Immediate need for a talented Cybersecurity Engineer. This is a 09 Months contract opportunity with long-term potential and is located in Charlotte, NC(Remote). Please review the job description below and contact me ASAP if you are interested. Job Diva ID: 26-10832.
COMPENSATION
Pay Range: $85-$89/hr. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
KEY RESPONSIBILITIES:
- Analyze Simulation Results: Evaluate the outcomes of Client, identifying weaknesses in security controls, vulnerabilities, and gaps in detection and response capabilities.
- Provide Actionable Recommendations: Develop and present recommendations to improve security policies, procedures, and technologies based on simulation findings.
- Document and Communicate: Maintain documentation of Client methodologies, procedures, and results, and communicate findings to technical and non-technical stakeholders.
- Collaborate with Security Teams: Work with security analysts and engineers to adjust alerts, rules, and controls based on simulation results.
- Advanced Threat Hunting and Intelligence: Utilize threat intelligence to inform attack scenarios and identify emerging threats.
- Vulnerability Management: Identify, prioritize, and recommend remediation of high-risk vulnerabilities.
- Red Teaming and Blue Teaming: May also participate in red, purple, and blue team exercises to further evaluate security posture.
KEY REQUIREMENTS AND TECHNOLOGY EXPERIENCE:
- Key skills: BAS / Continuous Security Validation (CSV)
- Attack Surface Management (EASM)
- Security Testing & Automation
- Experience with Breach and Attack (Client) or Continuous Security Validation (CSV) tool(s).
- Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle.
- Experience with penetration testing, vulnerability management, and security tools.
- Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
- Experience with Breach and Attack (Client) or Continuous Security Validation (CSV) tool(s).
- Bachelor’s degree and twelve years of experience or an equivalent combination of education and work experience.
- Banking or financial services experience.
- Experience in designing and executing Attack Scenarios: Plan and conduct realistic cyberattack simulations that mimic real-world threat actor tactics, techniques, and procedures (TTPs).
- Strong understanding of cybersecurity concepts, including attack vectors, TTPs, and security controls.
- Hands-on experience with architecting, maturing, and automation - CI/CD pipeline end to end lifecycle.
- Experience with penetration testing, vulnerability management, and security tools.
- Proficiency in scripting for automation, data wrangling and enrichment (e.g., Python, PowerShell).
- Knowledge of common threat intelligence sources and frameworks.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and as part of a team.
- Experience with cybersecurity frameworks and standards (e.g., NIST, MITRE Client&CK and D3FEND).
- Experience with GRC engineering.
- Strong knowledge of cloud security (AWS/Azure), PKI/TLS hygiene, DNS hardening, and external service posture.
- Hands-on experience with EASM platforms (e.g., Defender EASM, Cortex Xpanse, CyCognito, etc.) and strong understanding of internet-scale asset discovery.
- Hands-on experience with vulnerability engineering or external attack surface security, with proven leadership in complex environments.
- Experience with commercial Client tools: AttackIQ, SafeBreach, Cymulate, etc.
- Experience with detection engineering and SOAR.
Our client is a leading Banking Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
By applying to our jobs, you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Cybersecurity Engineer Job Roles in North Carolina
See all 138+ Cybersecurity Engineer Jobs in North Carolina
Sign up for free to filter by visa type, set job alerts, and find employers with verified sponsorship history.
Search Cybersecurity Engineer Jobs in North CarolinaCybersecurity Engineer Jobs in North Carolina: Frequently Asked Questions
Which companies sponsor visas for cybersecurity engineers in North Carolina?
Cisco, IBM, Lenovo, Red Hat, and SAS Institute have historically filed H-1B petitions for cybersecurity roles in North Carolina, primarily in Research Triangle Park. Charlotte-based financial institutions including Bank of America and Truist also sponsor cybersecurity engineers. Federal contractors operating near Raleigh and Fort Liberty frequently hire for cleared and clearable positions, though active security clearances complicate sponsorship for non-citizens.
Which visa types are most common for cybersecurity engineer roles in North Carolina?
The H-1B is the most common visa for cybersecurity engineers in North Carolina. Cybersecurity engineering roles generally qualify as specialty occupations requiring at least a bachelor's degree in computer science, information security, or a closely related field. Some employers also sponsor TN visas for Canadian and Mexican nationals, and the O-1A is an option for engineers with documented exceptional achievements in the field.
Which cities in North Carolina have the most cybersecurity engineer sponsorship jobs?
Research Triangle Park and the surrounding Raleigh-Durham-Chapel Hill metro account for the largest share of cybersecurity engineer sponsorship activity in the state, driven by a dense concentration of technology firms, federal contractors, and university research institutions. Charlotte is the second-most active market, largely through its financial services sector. Smaller clusters exist in Greensboro and Fayetteville near defense-related employers.
How to find cybersecurity engineer visa sponsorship jobs in North Carolina?
Migrate Mate filters job listings specifically by visa sponsorship availability, so you can search cybersecurity engineer roles in North Carolina without sifting through positions that don't offer sponsorship. The platform surfaces openings from employers in Research Triangle Park, Charlotte, and beyond who have a documented history of sponsoring work visas, which is especially useful given how inconsistently individual job postings disclose sponsorship willingness.
Are there state-specific factors cybersecurity engineers should know when pursuing sponsorship in North Carolina?
North Carolina's Research Triangle Park draws heavily from NC State, Duke, and UNC Chapel Hill, meaning employers in the area are experienced with international hiring pipelines. However, roles tied to federal contracts or defense work often require U.S. citizenship or a security clearance, which can limit sponsorship eligibility. Cybersecurity engineers should verify clearance requirements before applying, as these restrictions are role-specific and not always stated prominently in job postings.
What is the prevailing wage for sponsored cybersecurity engineer jobs in North Carolina?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which cybersecurity engineer employers are hiring and sponsoring visas in North Carolina right now.
Search Cybersecurity Engineer Jobs in North Carolina