CLPS Global
Senior Security Officer
CLPS GlobalQatar1 day ago
Full-timeInformation Technology

Skill – Senior Officer Security Operation Center

Location – Qatar

Virtusa

Perm Role


Position Summary:

We are seeking a Senior Offensive Security Consultant with a strong knowledge of offensive security practices and a proven ability to work independently. This role focuses on managing and integrating security tools across the software development lifecycle, particularly within CI/CD environments and containerized infrastructures. While hands-on offensive testing experience is not mandatory, the candidate must demonstrate a deep understanding of offensive security methodologies and tooling.

The ideal candidate will possess an awareness of the latest AI-driven security tooling and use cases for the software development lifecycle for the purpose of implementing scalable technical solutions. In addition, the candidate will be a self-starter who can operate autonomously, communicate effectively across technical and business teams, and drive security initiatives with minimal oversight.

Key Responsibilities:

Security Tool Management & Integration

  • Own the deployment, configuration, and maintenance of:
  • Static Application Security Testing (SAST) tools
  • Dynamic Application Security Testing (DAST) tools
  • Breach and Attack Simulation (BAS) tools
  • Container Security Solutions (e.g., image scanning, runtime protection)
  • Integrate security tools into CI/CD pipelines to enable automated and continuous security validation.
  • Monitor tool performance, ensure scalability, and optimize configurations for accuracy and efficiency.

Security Strategy & Enablement

  • Provide strategic guidance on offensive security practices including:
  • Vulnerability identification
  • Exploitation techniques
  • Support red team and penetration testing efforts by enabling tooling and providing technical insights.
  • Collaborate with development, DevOps, and cloud teams to embed security early in the SDLC.

Container & Cloud Security

  • Evaluate and enhance the security posture of containerized environments (e.g., Docker, Kubernetes).
  • Implement container image scanning, runtime protection, and orchestration security best practices.
  • Work with cloud-native security tools and configurations across AWS, Azure, or GCP.

Autonomous Execution & Ownership

  • Take full ownership of assigned projects and deliverables with minimal supervision.
  • Proactively identify gaps in security tooling, processes, or coverage and propose solutions.
  • Maintain documentation, dashboards, and reporting mechanisms for tool usage and effectiveness.

Communication & Collaboration

  • Translate technical findings into clear, actionable insights for both technical and non-technical stakeholders.
  • Present risk assessments, tool evaluations, and remediation strategies to leadership.
  • Mentor junior team members and contribute to internal knowledge sharing and training initiatives.


Required Qualifications and Experience:

  • University graduate in Computer Science subject
  • Strong understanding of offensive security concepts and frameworks, including MITRE ATT&CK, vulnerability exploitation, DevSecOps and OWASP top ten projects.
  • Experience managing or integrating SAST, DAST, attack simulation, and container security tools into CI/CD platforms (e.g., Jenkins, GitLab CI, Azure DevOps)
  • Awareness of current breach and attack simulation platforms and AI-driven CI/CD pen testing solutions and their use cases (e.g., Cytix, SafeBreach, AttackIQ, Cymulate).
  • Strong knowledge of container and kubernetes security
  • Ability to work independently and manage multiple priorities in a fast-paced environment.
  • Excellent verbal and written communication skills.


Preferred Qualifications and Experience:

  • Certifications such as OSCP, CRTO, OSCE, or equivalent.
  • Experience of streamlining SDLC processes and workflows using AI techniques and approaches
  • Experience with cloud platforms (AWS, Azure, GCP) and their native security services.


Framework & Boundaries:

  • Group’s overall strategic plan.
  • Applicable policies and procedures.
  • Delegated authorities as per the delegation of authority structure.
  • Instructions of the Head of Cyber Risk Assessments and Group Chief Information Security Officer

Key Skills

Ranked by relevance