Senior Information Security Analyst Jobs in USA with Visa Sponsorship
Senior Information Security Analyst roles are among the most consistently sponsored positions in tech. Employers regularly file H-1B visa and E-3 visa petitions for qualified candidates, and the specialty occupation classification is well-established for cybersecurity work requiring a degree in computer science, information systems, or a related field. For detailed occupation requirements, see the O*NET profile.
See All Senior Information Security Analyst JobsOverview
Showing 5 of 23+ Senior Information Security Analyst jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 23+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All Jobs
Number of Vacancies 1
Location Rio Grande Valley, Texas
Department Information Security
FTE 1.0
FLSA Exempt
Scope of Job
Responsible for the implementation, configuration, operation, and ongoing maintenance of the various security solutions and the identification, investigation and resolution of security events detected by those systems. Ensures the university is in compliance with UT System policies as well as state and federal statutes and regulations.
Description of Duties
- Develops, implements, monitors and supports the access control, data confidentiality, system integrity, system reliability, system audit and recovery methods and procedures.
- Ensures the overall university security program is in compliance with UTS 165 and TAC 202.
- Collaborates with information technology network security to resolve complex specific incidents and mitigate vulnerabilities.
- Ensures that all consultation on information security controls related to university information systems are appropriate and operating as intended.
- Coordinates and documents response and recovery of abuse of systems and information resources, violation of policies, privacy issues, and related incidents with proper authorities.
- Oversees risk assessment assistance requests and makes recommendations to management.
- Acts as main point of contact regarding university audits.
- Reviews and analyzes intrusion detection reports provided by UT System for unusual patterns, security breaches, and exploitation of information resources.
- Develops, prepares and recommends improvements for documentation, including security policies and procedures, security notifications and alerts.
- Develops and implements processes to secure the confidentiality, integrity and availability of information resources and technology.
- Observes, monitors, evaluates, and reports security policy compliance.
- Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
- Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
- Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
- Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
- Participates in university committees and meetings with the UT System Security Council.
- Perform other related duties as assigned.
Supervision Received
General supervision from assigned supervisor.
Supervision Given
Direct supervision of assigned staff.
Required Education
Bachelor’s degree in Information Security, Information Technology, Computer Sciences, or closely related field from an accredited university.
Preferred Education
Bachelor’s Degree in Cybersecurity or Information Assurance from an accredited university.
Licenses/Certifications
Preferred: Certified Information Systems Security Professional (CISSP)
Required Experience
- Four (4) years of relevant IT security, IT operations and/or IT audit experience to include the following: deploying, configuring and monitoring security tools and platforms such as IDS/IPS, SIEM, A/V, Firewalls, vulnerability scanning and packet analysis tools, basic networking concepts, protocols (TCP/IP), common ports and knowledge of risk assessment, disaster recovery and business continuity methods and practices, host/network common vulnerabilities and exploits (CVEs) and experience with hacker methodologies, tactics, and the tools used or
- Bachelor’s degree from an accredited university in unrelated field with five (5) years of the required experience.
- Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.
Preferred Experience
- Experience with major operating systems, including command-line proficiency.
- Knowledge and experience with programming and computer languages such as C#, ASP.NET, SQL, PowerShell, Python, or similar.
- Experience in managing, configuring, deploying, and monitoring security infrastructure.
- Experience with standard concepts, practices, and procedures for security operation centers.
- Knowledge of ITIL processes and standards.
- Experience conducting risk assessments and identifying effective risk mitigation strategies.
- Experience installing, configuring and repairing computer hardware and system software.
Equipment
Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.
Working Conditions
Needs to be able to successfully perform all required duties. Exposure to standard office conditions. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Job involves moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Work is performed primarily in a general office environment.
Other
Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP.
To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position.
Physical Capabilities
N/A
Employment Category Full-Time
Minimum Salary Commensurate with Experience
Posted Salary Commensurate with Experience
Position Available Date 04/29/2026
Grant Funded Position No
If Yes, Provide Grant Expiration Date
EEO Statement
It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.
Special Instructions to Applicants
Dear Applicant,
Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:
Date of Birth
Gender
- Ethnicity/Race
Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission. The University of Texas Rio Grande Valley reserves the right to discontinue accepting applications prior to the stated close date of this position, after meeting the posting requirement of three (3) calendar days.
If you have any questions, please visit our Careers site for detailed contact information.
Additional Information
UTRGV is a distributed location institution and working location is subject to change based on need.
All UTRGV employees are required to have a criminal background check (CBC). Incomplete applications will not be considered.
Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development.
See all 23+ Senior Information Security Analyst jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Senior Information Security Analyst roles.
Get Access To All JobsTips for Finding Visa Sponsorship as a Senior Information Security Analyst
Target employers with a proven H-1B filing history
Financial institutions, defense contractors, and large tech firms file H-1B petitions for security analysts at high rates. Focusing your search on organizations with consistent filing histories significantly improves your odds of finding a sponsor.
Align your degree field to the role's technical requirements
USCIS scrutinizes specialty occupation claims for security roles. A degree in computer science, information systems, or cybersecurity strengthens your petition. Business or unrelated degrees require additional documentation to establish the direct field connection.
Certifications strengthen your petition but don't replace your degree
CISSP, CISM, and CompTIA Security+ credentials demonstrate professional credibility and help during interviews, but USCIS bases specialty occupation determinations on degree requirements, not certifications. Both working together make the strongest case.
Security clearance questions require careful handling
Many senior security roles list clearance eligibility as a requirement. Foreign nationals can obtain certain clearances, but it depends on the clearance level and agency. Confirm with the employer whether your immigration status affects eligibility before applying.
Australian citizens should explore the E-3 visa as a faster alternative
The E-3 visa requires no lottery and can be processed in weeks through consular processing. For senior security analyst roles, employers file LCAs with the Department of Labor and you apply directly at an Australian consulate.
Senior Information Security Analyst jobs are hiring across the US. Find yours.
Find Senior Information Security Analyst JobsFrequently Asked Questions
Does a Senior Information Security Analyst role qualify as a specialty occupation for H-1B purposes?
Yes, Senior Information Security Analyst is well-established as a specialty occupation. USCIS consistently recognizes cybersecurity roles requiring a bachelor's degree or higher in computer science, information systems, or a related technical field. Roles that accept any degree or have vague educational requirements can face RFEs, so the job description's degree language matters significantly.
Which employers most commonly sponsor H-1B visas for security analyst roles?
Financial services firms, federal contractors, healthcare systems, and large technology companies are the most consistent sponsors for senior security analyst positions. These industries handle regulated data and face strict compliance requirements, which drives sustained demand for credentialed security professionals regardless of visa status. You can browse open sponsored roles directly on Migrate Mate.
Can I get sponsored for a Senior Information Security Analyst role if my degree is in a non-technical field?
It's harder but not impossible. USCIS may accept a non-technical degree if you can demonstrate relevance through coursework, professional certifications like CISSP or CISM, and substantial hands-on experience in information security. However, adjudicators apply closer scrutiny to these cases, and some employers won't sponsor candidates whose degree doesn't directly align to avoid petition risk.
Do security clearance requirements affect visa sponsorship eligibility for this role?
They can. Active security clearances above the Secret level are generally unavailable to foreign nationals, and some senior security analyst roles in defense or government contracting require them. Commercial sector roles rarely have clearance requirements. If a job posting lists clearance as required rather than preferred, confirm with the employer whether your immigration status creates a practical barrier before investing time in the application.
What is the typical timeline from H-1B approval to starting work as a Senior Information Security Analyst?
For cap-subject H-1B petitions, registration opens in March with a lottery in late March or early April. Approved petitions have an October 1 start date. With premium processing, USCIS adjudicates the petition within 15 business days of receipt. Cap-exempt employers, including universities and nonprofit research organizations, can file year-round with faster start dates.
What is the prevailing wage requirement for sponsored Senior Information Security Analyst jobs?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which Senior Information Security Analyst employers are hiring and sponsoring visas right now.
Search Senior Information Security Analyst Jobs