Senior Information Security Analyst

Tustin, CA February 22, 2026 Full Time Lever
The Company:

VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn’t be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.

We’re a young and energetic company, we’ve had tremendous success, and we are constantly growing our team. As we garner more industry attention – just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot – we also need driven and talented people to join our team.

That brings us to you, and what you’ll be joining. Our teams are smart and diligent and take ownership of their work – they’re confident in their work but know how to collaborate with open ears and a spirit of learning. If you’re down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.

Check out our brands:

The Opportunity:

Information Security Planning
•  Develop and implement comprehensive information security plans to safeguard the security of company data and assets, including on-premise and cloud environments.
•  Thoroughly analyze the company's business processes and data characteristics, and combine industry best practices and frameworks such as NIST Cybersecurity Framework (CSF)to create customized security plans, ensuring the confidentiality, integrity, and availability of information assets in various scenarios. 

Policy Development and Compliance
•  Create security policies and ensure that the company's operations are in strict compliance with industry standards (e.g., ISO 27001, NIST, GDPR) and regulatory requirements.
•  Continuously monitor industry trends and regulatory changes, and adjust security policies in a timely manner to provide a 
solid security and compliance framework for the company's business operations. 
•  Experience with OneTrust, Drata or similiar tools 

System, Network and Cloud Security
•  Maintain and enhance security measures for systems, networks , and public cloud platforms (e.g., AWS, Azure, GCP) to prevent potential threats.
•  Utilize advanced technical means and tools to conduct real - time monitoring and risk early warning of systems, networks, and cloud environments, promptly detect and block various attack behaviors, and ensure the stable and secure operation of IT infrastructure. 
•  Familiar with AWS security suites
•  Familiar with security scorecards, SIEM tools and dashboards (Splunk, QRadar, Rapid7, Wazhu) 

Security Monitoring and Incident Response
•  Monitor security events in real - time, respond promptly to emergencies, and effectively mitigate risks.
•  Build an efficient security monitoring platform, use intelligent analysis technology to promptly capture abnormal behaviors, activate emergency
response plans, and minimize the impact of security incidents. 
•  Conduct re/blue team exercise 

Security Awareness and Training
•  Develop and deliver security training programs to enhance employees' security awareness and encourage their adherence to best practices.
•  Design targeted training courses according to the needs of different positions and use diverse training methods to ensure that employees have a deep understanding of and implement security requirements. 

Access Control and Identity Management
•  Oversee user access controls, regularly review permissions, and ensure secure identity management.
•  Implement a strict access control mechanism, Conduct regular audits of user permissions, and use reliable identity management systems to prevent unauthorized access and ensure the security of company resources. 

Risk Assessment and Management
•  Conduct comprehensive risk assessments, identify vulnerabilities, and implement effective mitigation strategies.
•  Use scientific risk assessment methods and frameworks such as NIST CSF to evaluate potential threats and vulnerabilities, formulate corresponding mitigation measures based on the assessment results, and continuously improve the company's security defense capabilities. 
•  Develop KPIs and metrics 

Documentation and Mentorship
•  Document Cyber Security controls, detection rules and playbooks
•  Mentoring team members 


The Company:

VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn’t be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.

We’re a young and energetic company, we’ve had tremendous success, and we are constantly growing our team. As we garner more industry attention – just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot – we also need driven and talented people to join our team.

That brings us to you, and what you’ll be joining. Our teams are smart and diligent and take ownership of their work – they’re confident in their work but know how to collaborate with open ears and a spirit of learning. If you’re down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.

Check out our brands:

The Opportunity:

Information Security Planning
•  Develop and implement comprehensive information security plans to safeguard the security of company data and assets, including on-premise and cloud environments.
•  Thoroughly analyze the company's business processes and data characteristics, and combine industry best practices and frameworks such as NIST Cybersecurity Framework (CSF)to create customized security plans, ensuring the confidentiality, integrity, and availability of information assets in various scenarios. 

Policy Development and Compliance
•  Create security policies and ensure that the company's operations are in strict compliance with industry standards (e.g., ISO 27001, NIST, GDPR) and regulatory requirements.
•  Continuously monitor industry trends and regulatory changes, and adjust security policies in a timely manner to provide a 
solid security and compliance framework for the company's business operations. 
•  Experience with OneTrust, Drata or similiar tools 

System, Network and Cloud Security
•  Maintain and enhance security measures for systems, networks , and public cloud platforms (e.g., AWS, Azure, GCP) to prevent potential threats.
•  Utilize advanced technical means and tools to conduct real - time monitoring and risk early warning of systems, networks, and cloud environments, promptly detect and block various attack behaviors, and ensure the stable and secure operation of IT infrastructure. 
•  Familiar with AWS security suites
•  Familiar with security scorecards, SIEM tools and dashboards (Splunk, QRadar, Rapid7, Wazhu) 

Security Monitoring and Incident Response
•  Monitor security events in real - time, respond promptly to emergencies, and effectively mitigate risks.
•  Build an efficient security monitoring platform, use intelligent analysis technology to promptly capture abnormal behaviors, activate emergency
response plans, and minimize the impact of security incidents. 
•  Conduct re/blue team exercise 

Security Awareness and Training
•  Develop and deliver security training programs to enhance employees' security awareness and encourage their adherence to best practices.
•  Design targeted training courses according to the needs of different positions and use diverse training methods to ensure that employees have a deep understanding of and implement security requirements. 

Access Control and Identity Management
•  Oversee user access controls, regularly review permissions, and ensure secure identity management.
•  Implement a strict access control mechanism, Conduct regular audits of user permissions, and use reliable identity management systems to prevent unauthorized access and ensure the security of company resources. 

Risk Assessment and Management
•  Conduct comprehensive risk assessments, identify vulnerabilities, and implement effective mitigation strategies.
•  Use scientific risk assessment methods and frameworks such as NIST CSF to evaluate potential threats and vulnerabilities, formulate corresponding mitigation measures based on the assessment results, and continuously improve the company's security defense capabilities. 
•  Develop KPIs and metrics 

Documentation and Mentorship
•  Document Cyber Security controls, detection rules and playbooks
•  Mentoring team members 


Apply on company site

How to Get Hired at Vesync

  • Tailor your resume to each specific Vesync role — Lever applications are evaluated per-position
  • Vesync uses Lever to manage applications; PDF format preserves your formatting through their parser
Read the full guide

How well do you match this role?

Check My Resume