Information Security Specialist Jobs in USA with Visa Sponsorship
Information Security Specialists are in high demand from U.S. employers willing to sponsor H-1B visa and E-3 visas. The role qualifies as a specialty occupation, and USCIS has a strong track record of approving petitions for cybersecurity positions requiring a bachelor's degree in computer science, information systems, or a related field. For detailed occupation requirements, see the O*NET profile.
See All Information Security Specialist JobsOverview
Showing 5 of 13+ Information Security Specialist jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 13+ Information Security Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Specialist roles.
Get Access To All Jobs
Position Description:
Base pay is influenced by several factors including a candidate’s qualifications, relevant experience, and anticipated contributions to meet the needs of the business, along with internal pay equity and external market driven rates. The salary range displayed has not been adjusted for geographical location. This range has been created in good faith based on information known to Capital Blue Cross at the time of posting and may be modified in the future. Capital Blue Cross offers a comprehensive benefits packaging including Medical, Dental & Vision coverage, a Retirement Plan, generous time off including Paid Time Off, Holidays, and Volunteer time off, an Incentive Plan, Tuition Reimbursement, and more.
At Capital Blue Cross, we promise to go the extra mile for our team and our community. This promise is at the heart of our culture, and it’s why our employees consistently vote us one of the “Best Places to Work in PA.”
ROLE AND RESPONSIBILITIES:
The Information Security Specialist will be responsible for protecting systems, network, and data from cyber threats. Monitors security events, investigates incidents, and leads vulnerability management efforts. Works closely with IT and business teams to reduce risk, improve security posture, and support compliance with industry standards.
- Monitor and analyze security events using SIEM tools to detect and respond to threats in real-time.
- Investigate security incidents, perform root cause analysis, and document findings for remediation and reporting.
- Manages the full vulnerability lifecycle across enterprise systems, including identifying security weaknesses, assessing and prioritizing risk, coordinating remediation efforts, and validating that issues are resolved. Works closely with IT and business teams to ensure vulnerabilities are addressed in a timely manner based on risk, impact, and relevant threat intelligence.
- Analyze logs from endpoints, servers, network devices, and cloud platforms to identify suspicious activity.
- Support incident response activities including containment, eradication, and recovery.
- Manage vendor security assessment reviews to enable informed decision-making related to third party engagements.
- Participate in threat hunting activities to proactively identify hidden threats in the environment.
- Perform other functions as assigned by Information Security management.
BASIC QUALIFICATIONS:
Skills:
- Results oriented, with demonstrated problem-solving and decision-making skills.
- Ability to effectively listen and communicate in order to present technical concepts to audiences of all levels both verbally and in writing. Communication may include oral presentations and/or written documents.
- Ability to prioritize and complete assignments independently in a rapidly changing and dynamic work environment along with good organizational skills.
Knowledge:
- Strong understanding of cybersecurity principles, threat detection, risk management, and industry security frameworks.
Experience:
- 3-5 years of experience in information security, cybersecurity, or a related IT role.
- Hands-on experience monitoring and responding to security events using a SIEM platform such as Splunk or similar.
- Experience with incident response, including investigation, containment, and recovery.
- Proven experience with vulnerability management tools such as Tenable, or Nessus.
- Experience analyzing logs from endpoints, servers, network devices and cloud services.
- Familiarity with endpoint detection and response (EDR) tools and network security technologies (firewalls, IDS/IPS).
Education and Certifications:
- A Bachelor’s degree in Computer Science, Business Administration or related field; or a minimum of five years of practical related experience; or an equivalent combination of experience and education.
- Preferred security certifications including, CISSP, CISM, CRISC or equivalent.
Physical Demands:
While performing the duties of the job, the employee is frequently required to sit, use hands and fingers, talk, hear, and see. The employee must be able to work over 40 hours per week. The employee must occasionally lift and/or move up to 5 pounds.
About us:
We recognize that work is a part of life, not separate from it, and foster a flexible environment where your health and wellbeing are prioritized. At Capital you will work alongside a caring team of supportive colleagues, and be encouraged to volunteer in your community. We value your professional and personal growth by investing heavily in training and continuing education, so you have the tools to do your best as you develop your career. And by doing your best, you’ll help us live our mission of improving the health and well-being of our members and the communities in which they live.
See all 13+ Information Security Specialist jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Information Security Specialist roles.
Get Access To All JobsTips for Finding Visa Sponsorship as an Information Security Specialist
Target employers with active security clearance programs
Defense contractors, federal agencies, and financial institutions run large security teams and sponsor visas regularly. These employers have established immigration infrastructure, making the sponsorship process faster and less uncertain than with smaller companies.
Highlight certifications alongside your degree
CISSP, CISM, CompTIA Security+, and CEH credentials signal technical depth to employers and strengthen your H-1B petition. USCIS scrutinizes specialty occupation claims for security roles, and certifications help demonstrate the position requires specialized expertise.
Frame your role around a specific security domain
Generalist titles face more USCIS scrutiny than domain-specific ones. Positioning yourself as a penetration tester, SOC analyst, or cloud security engineer ties your degree directly to the role and makes the specialty occupation argument significantly cleaner.
Verify the employer has filed security-role LCAs before
Employers who have sponsored information security specialists previously understand the process and prevailing wage obligations. Prior LCA filings for your role type are a strong signal the company is prepared to move quickly and accurately.
Request a specialty occupation opinion letter if your degree is adjacent
If your degree is in mathematics, electrical engineering, or a non-CS field, an immigration attorney can draft a legal opinion connecting your background to the security role. This proactively addresses the most common RFE trigger for this occupation.
Information Security Specialist jobs are hiring across the US. Find yours.
Find Information Security Specialist JobsFrequently Asked Questions
Does Information Security Specialist qualify as a specialty occupation for H-1B purposes?
Yes, in the vast majority of cases. USCIS consistently recognizes information security roles as specialty occupations when the position requires a bachelor's degree or higher in computer science, information systems, cybersecurity, or a closely related field. Roles tied to a specific domain, such as threat analysis, incident response, or cloud security, have the strongest petitions. Generic titles with loosely defined duties face a higher risk of a Request for Evidence.
What degree do I need for an employer to sponsor my visa in this field?
Most employers require a bachelor's degree in computer science, information systems, cybersecurity, or a related STEM discipline. Some accept degrees in mathematics or electrical engineering when paired with relevant experience. Australian three-year bachelor's degrees are generally accepted as equivalent to U.S. four-year degrees for E-3 purposes. If your degree is in an adjacent field, three years of specialized security experience can substitute for one year of education in certain visa frameworks.
How do I find employers who actively sponsor visas for security roles?
Browse Migrate Mate to filter information security positions by visa sponsorship availability. Employers who list roles there have already indicated willingness to sponsor, which cuts out the guesswork of cold applications. Defense contractors, large financial institutions, and cloud infrastructure companies are the most active sponsors, but mid-sized managed security service providers also file LCAs for this role regularly.
Are H-1B approval rates high for information security roles?
Approval rates for well-documented security petitions are strong. The primary risk factor is specialty occupation challenges, which occur when a job description is vague or the employer fails to show the role requires a specific degree. Petitions that clearly tie the position to a technical security domain, include a detailed duties description, and show the degree requirement in the job posting consistently clear USCIS review without issue.
Can I change employers mid-visa if I find a better security role?
Yes. For H-1B holders, portability rules allow you to start working for a new employer as soon as they file a transfer petition, without waiting for approval, provided your original petition was approved and you've maintained valid status. For E-3 holders, the process restarts with the new employer filing a fresh LCA and you obtaining a new visa stamp, which typically takes a few weeks from an Australian consulate.
What is the prevailing wage requirement for sponsored Information Security Specialist jobs?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which Information Security Specialist employers are hiring and sponsoring visas right now.
Search Information Security Specialist Jobs