Threat Detection and Response Analyst
Apply for the Threat Detection and Response Analyst role at Wavelo
.
Wavelo is a SaaS company on a mission to modernize telecoms. We provide flexible software that helps communication service providers (CSPs) drive value, focus on customer experience, and scale operations faster.
As part of Tucows, a leading internet services company, Wavelo is backed by outstanding resources and talent. We embrace a people‑first culture rooted in respect, trust, and flexibility. Our roles are remote‑first, allowing you to work from anywhere with internet access.
About the OpportunityAs a Threat Detection and Response Analyst
, you will proactively identify, investigate, and mitigate advanced threats within Tucows’ environment. You will be part of the Information Security team, playing a key role in detecting and responding to sophisticated adversaries that evade traditional controls.
You will collaborate with cross‑functional teams to strengthen defenses, enhance detection capabilities, and ensure compliance with established security frameworks and policies. This role requires participation in a 24/7 on‑call rotation for incident response.
You will thrive if you enjoy deep technical investigation, pattern recognition, and staying ahead of evolving cyber threats.
This is a remote position for applicants based in Canada or the USA.
Job Duties- Perform cybersecurity threat detection, analysis, and mitigation as part of a global, around‑the‑clock security team.
- Perform proactive threat hunting across Tucows’ systems, networks, and cloud environments to detect hidden or emerging adversarial activity.
- Investigate potential security incidents using a wide range of tools, logs, and techniques across cloud and on‑premise environments.
- Collaborate with other Security Analysts and Security Engineering personnel to triage, contain, and remediate identified threats.
- Develop and tune custom detection rules, scripts, and playbooks to improve threat visibility and response effectiveness.
- Design, build, and maintain scalable detection logic across SIEM and EDR platforms.
- Conduct proactive threat hunting to detect potential adversary activity within the environment.
- Design, test, and improve security detections, playbooks, and automation workflows to enhance response capabilities and reduce detection gaps.
- Review and triage alerts and logs, escalating significant incidents.
- Monitor external service providers for suspicious activity or potential security events.
- Perform continuous analysis of threat intelligence, tactics, techniques, and procedures (TTPs) to anticipate attacker behavior.
- Utilize Cyber Threat Intelligence sources and workflows to augment detection and response.
- Document and communicate findings with clear technical and business context, recommending long‑term preventive actions.
- Contribute to purple‑team exercises, attack simulations, and post‑incident reviews to enhance defense‑in‑depth capabilities.
- Mentor junior analysts and foster a culture of curiosity, learning, and shared security ownership.
- Deep understanding of adversary tradecraft, the MITRE ATT&CK framework, and modern threat landscapes.
- Experience with SIEM, EDR, and cloud‑native detection tools (e.g., Crowd Strike, Alienvault, AWS Guard Duty, Azure Defender, Elastic).
- Strong analytical and investigative mindset with the ability to connect technical indicators to strategic insights.
- Familiarity with scripting languages (Python, Power Shell) for automating hunts and data analysis.
- Knowledge of network protocols, operating system internals, and log analysis.
- Excellent written and verbal communication skills with the ability to translate complex findings into clear risk narratives.
- Demonstrated ability to work both independently and collaboratively in a fast‑moving environment.
- Bachelor’s degree in Cybersecurity, Computer Science, or a related field (or equivalent experience).
- 5–8 years of experience in cybersecurity, including 3+ years focused on threat hunting, detection engineering, or incident response.
- Relevant certifications are a plus (e.g., GCFA, GCTI, GNFA, OSCP).
The base salary range for this position is $114,300–$127,000 USD for US residents or $118,260–$131,240 CAD for Canadian residents. Tucows offers a comprehensive total rewards package that includes competitive compensation and generous benefits.
Wavelo and Tucows are committed to inclusion. We celebrate diversity and are dedicated to supporting fairness and equality across all backgrounds. We also provide reasonable accommodation to individuals with disabilities for the application and interview process.
Tucows participates in the E‑Verify program for all US employees.
Learn more about Tucows, our businesses, culture, and employee benefits on our site.
#J-18808-LjbffrTo Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: