×
Register Here to Apply for Jobs or Post Jobs. X

Senior Information Security Analyst

Job in Tustin, Orange County, California, 92681, USA
Listing for: Vesync
Full Time position
Listed on 2025-12-25
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Job Description & How to Apply Below

The Company:

VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn’t be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.

We’re a young and energetic company, we’ve had tremendous success, and we are constantly growing our team. As we garner more industry attention – just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot – we also need driven and talented people to join our team.

That brings us to you, and what you’ll be joining. Our teams are smart and diligent and take ownership of their work – they’re confident in their work but know how to collaborate with open ears and a spirit of learning. If you’re down-to‑earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.

Check

out our brands:

|  |

The Opportunity Information Security Planning
  • Develop and implement comprehensive information security plans to safeguard the security of company data and assets, including on‑premise and cloud environments.
  • Thoroughly analyze the company's business processes and data characteristics, and combine industry best practices and frameworks such as NIST Cybersecurity Framework (CSF) to create customized security plans, ensuring the confidentiality, integrity, and availability of information assets in various scenarios.
Policy Development and Compliance
  • Create security policies and ensure that the company's operations are in strict compliance with industry standards (e.g., ISO 27001, NIST, GDPR) and regulatory requirements.
  • Continuously monitor industry trends and regulatory changes, and adjust security policies in a timely manner to provide a solid security and compliance framework for the company's business operations.
  • Experience with One Trust, Drata or similar tools.
System, Network and Cloud Security
  • Maintain and enhance security measures for systems, networks, and public cloud platforms (e.g., AWS, Azure, GCP) to prevent potential threats.
  • Utilize advanced technical means and tools to conduct real‑time monitoring and risk early warning of systems, networks, and cloud environments, promptly detect and block various attack behaviors, and ensure the stable and secure operation of IT infrastructure.
  • Familiar with AWS security suites.
  • Familiar with security scorecards, SIEM tools and dashboards (Splunk, QRadar, Rapid7, Wazhu).
Security Monitoring and Incident Response
  • Monitor security events in real‑time, respond promptly to emergencies, and effectively mitigate risks.
  • Build an efficient security monitoring platform, use intelligent analysis technology to promptly capture abnormal behaviors, activate emergency response plans, and minimize the impact of security incidents.
  • Conduct re/blue team exercises.
Security Awareness and Training
  • Develop and deliver security training programs to enhance employees' security awareness and encourage their adherence to best practices.
  • Design targeted training courses according to the needs of different positions and use diverse training methods to ensure that employees have a deep understanding of and implement security requirements.
Access Control and Identity Management
  • Oversee user access controls, regularly review permissions, and ensure secure identity management.
  • Implement a strict access control mechanism, conduct regular audits of user permissions, and use reliable identity management systems to prevent unauthorized access and ensure the security of company resources.
Risk Assessment and Management
  • Conduct comprehensive risk assessments, identify vulnerabilities, and implement effective mitigation strategies.
  • Use scientific risk assessment methods and frameworks such as NIST CSF to evaluate potential threats and vulnerabilities, formulate corresponding mitigation measures based on the assessment results, and continuously improve the company's security defense capabilities.
  • Develop KPIs and metrics.
Documentation and Mentorship
  • Document Cyber Security controls, detection rules and playbooks.
  • Mentor team members.
What you bring to the role
  • Bachelor’s…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary