Assuming the following:
- Work Computer is a black box ... has Corp VPN and needs an inet connection nothing can be reconfigured short of the DHCP handed to its NIC
- "Home" is not in the US
- Money < $1k is not a huge issue because if you get to keep your job and not have to collocate you would save a TON.
First, you need a proxy ... not a web proxy but a fixed point in the US in which to bounce your connection off of. There are many ways to accomplish this, but the most reliable is going to be a VPS (Virtual Private Server). For my setup i have used AWS, Digital Ocean, and RamNode for this. They differ in uptime/price/support you will have to do some research.
Once you have your fixed point, you need to create a secure tunnel to it ... in the past I have used TINC but OpenVPN would work as well. Your fixed point VPS would act as the server, and then you would need to get a client device for your corp computer to connect to locally. Client device could be a router with Tomato or DDWRT or you could get a low powered computer such as a raspberry pi or a cheap laptop. I personally would go with a rPi but again you will have to do some research. This client device would have to act as both a Local Gateway as well as a VPN Client to your Fixed Point Server.
So, once it is all set up your network diagram should look like:
[Comp] <-- comp_vpn --> [VPS] <== personal_vpn ==> [rPI] <-- comp_vpn --> [comp computer]
This means that after all the connections where established
- your company computer would connect to the rPI thinking its the internet
- your company would see the IP if your Fixed Point VPS
- connection between Fixed Point VPS and rPI would be a VPN within a VPN
- no configuration would be required on your company computer
This answer is to give you an overview of what needs to be setup, the configuration of each part will need to be researched / asked on there respective SE sites (not all of this configuration is security related).
It should also be noted that your company may have a VERY good reason for only allowing access to there VPN from within the US. There are admin on security.se that have asked for ways of preventing exactly what was described above due to the fact that a company network access in places like China could be a HUGE security risk. By setting this up, you may be opening your company up to corporate espionage as well as opening yourself up to litigation for knowingly circumventing company policy.
On the one hand I would be a hypocrite telling you that this is bad and you should never do it (being as how I am typing this message over a very similar connection) but on the other, you should be aware that this could get you in to quite a bit of trouble. With great power comes great responsibility ... choose wisely.