Cameron W.

CEO

Austin, Texas, United States9 yrs 7 mos experience
AI Enabled

Key Highlights

  • Built and scaled global AppSec teams across multiple countries.
  • Developed AI Security governance for responsible AI use.
  • Co-led OWASP project to enhance software delivery security.
Stackforce AI infers this person is a Cybersecurity expert specializing in Application Security and DevSecOps for cloud-native environments.

Contact

Skills

Core Skills

Application SecurityProduct SecurityAi SecuritySoftware Supply Chain SecurityEngineering

Other Skills

Application Security StrategyStrategic LeadershipDevSecOpsSecurity GovernanceCloud SecurityLeadershipOWASPSupply Chain SecuritySecure Software Development Lifecycle (SDLC)C#Software IndustrySecurity Culture & Awareness EnablementSecure Pipeline VerificationAI-Assisted Code ReviewSecurity Program Management

About

Cameron Walters Director of Application Security & Security Engineering, building toward VP of Product Security. Building product security that scales with modern software delivery. Slowing developers down isn't security. It's bad design. Security should move as fast as the product, not fight it. I build and scale Product Security programs for cloud-native, DevSecOps-driven environments where release velocity and risk both matter. My work centers on embedding security throughout the software development lifecycle, not bolting it on at the end. Over the last seven years, I've led global AppSec and Security Engineering teams across the US, India, and Prague, helping organizations modernize how they build and ship software. My work lives in the pipeline. Automated guardrails, early design signals, and risk metrics leaders can actually use. The goal is simple: reduce product risk while keeping engineers moving, including thoughtful use of AI to shorten feedback loops and speed remediation. I sit between developers and risk. I help teams secure what they build, adopt AI responsibly, and scale security without adding drag. I also co-lead the OWASP Secure Pipeline Verification Standard, focused on improving how teams secure software from commit to production. Security is about building systems that don't fall apart when something slips through. The truth can be found in the code.

Experience

Teradata

4 roles

Director of Application Security & Security Engineering

Sep 2025Present · 7 mos · Remote

  • Tech Stack: Snyk (SAST, SCA, IaC, Container), ArmorCode (ASPM), Invicti (DAST), Secure Code Warrior, GitGuardian, Prisma Cloud, Coalfire
  • ● Built and executed the multi-year security strategy for Application Security and Security Engineering, keeping security work aligned with how products actually get built, what the business needs, and real threats.
  • ● Led and scaled global security engineering and AppSec teams across the US, India, and Prague, managing three team leads, one manager, and senior ICs. Built leadership depth and kept engineering quality consistent across regions.
  • ● Modernized Application Security tooling and processes—including SAST, DAST, SCA, IaC, container security, and ASPM—cutting vulnerabilities by 90% across critical cloud-native products.
  • ● Partnered with engineering and product leadership to secure AI-generated code, integrating automated guardrails and code review that kept developers moving while meeting compliance goals.
  • ● Pushed security earlier into CI/CD pipelines with automated controls and developer-friendly feedback loops that sped up vulnerability remediation and improved deployment velocity.
  • ● Partnered cross-functionally with GRC, Product, IT, and Engineering to embed security throughout the SDLC, ensuring compliance with ISO 27001/27017, PCI-DSS, SOC 1 & 2, HITRUST, HIPAA, IRAP, FedRAMP (Moderate), and GDPR.
  • ● Built enterprise AI Security governance with policies, standards, and risk models that let teams use AI-assisted coding and generative AI safely while following responsible AI principles.
  • ● Created secure AI enablement pathways with pre-approved models, safe prompting guidelines, and integrated toolchains that balanced developer agility with enterprise risk management.
Application SecurityApplication Security StrategyProduct SecurityStrategic LeadershipDevSecOpsAI Security

Director of Application Security

Promoted

Oct 2024Sep 2025 · 11 mos · Remote

Sr. Manager of Application Security

Promoted

Aug 2022Oct 2024 · 2 yrs 2 mos · Remote

Senior Staff Application Security Engineer

Apr 2022Aug 2022 · 4 mos · Remote

Coffee, chaos and prodsec

Co-Host & Co-Founder — "Coffee, Chaos & ProdSec" Podcast

Jul 2025Present · 9 mos · https://linktr.ee/coffeechaosprodsec · Remote

  • 🎙️ Coffee, Chaos & ProdSec is a weekly cybersecurity podcast where caffeine meets controlled chaos. Together with my co-host Kurt, I explore the wild intersections of Product Security, AppSec, and DevSecOps — from leaked keys and broken pipelines to the frameworks and people fixing them.
  • Each episode blends technical depth with honest, conversational insight. We interview security leaders, discuss real incidents, and break down complex topics like supply-chain integrity, AI in security, and secure-by-design practices in a way that’s accessible, informative, and occasionally caffeinated-to-the-max.
  • Highlights & Impact
  • ● Produce and host weekly episodes exploring the evolving world of Product Security — from building secure products and pipelines to navigating the challenges of modern AppSec and DevSecOps.
  • ● Built and scaled brand identity, content calendar, and community engagement strategy across LinkedIn, Spotify, and YouTube.
  • ● Partnered with industry experts and OWASP project leads to bring credible, practical insights to thousands of listeners.
  • ● Established the show as a learning resource for professionals seeking real-world ProdSec experience and career guidance.
  • ☕ “Where cybersecurity meets caffeine-fueled chaos — and strong coffee leads to even stronger opinions.”
Product SecurityApplication SecurityDevSecOpsCloud SecurityLeadership

Https://www.meetup.com/cyberlunch

Co-Leader of Austin CYBERLUNCH Meetup

Jan 2025Present · 1 yr 3 mos · Austin, Texas, United States · On-site

  • 🚨 Calling All Cyber Enthusiasts! 🚨
  • 🍕 Welcome to CYBERLUNCH! 🍕
  • 🎉 One special Friday a month, we come together to:
  • ✅ Munch on delicious pizza
  • ✅ Sip on your favorite drink
  • ✅ Geek out over all things cybersecurity
  • Whether you're a seasoned pro, a curious learner, or just love pizza 🍕, there's a spot for YOU at our table!
  • 💻 Let's share ideas, swap stories, and build a stronger cyber community together.
  • Don’t miss out on the fun—join us and let’s make Fridays the highlight of your week
  • ➡️ Check it out at ➡️ https://www.meetup.com/cyberlunch/ ⬅️

Owasp® foundation

Co-Leader & Co-Founder of OWASP Project SPVS

Feb 2024Present · 2 yrs 2 mos · https://github.com/OWASP/www-project-spvs

  • Co-Leader of OWASP Project SPVS (Secure Pipeline Verification Standard).
  • The Secure Pipeline Verification Standard (SPVS) is a comprehensive, security-focused framework designed to assess, enhance, and standardize the security maturity of software delivery pipelines across the full lifecycle: Plan, Develop, Integrate, Release, and Operate.
  • SPVS delivers structured, actionable controls to help manage and mitigate risks tied to code, artifacts, and operational environments, embedding security from inception through continuous operations. It promotes a proactive, security-first culture that aligns with compliance requirements, ensures artifact integrity, and reinforces operational resilience within modern DevSecOps ecosystems.
  • Built on a multi-tiered maturity model, SPVS allows teams to start with baseline security practices and progress toward advanced, secure-by-design pipelines. It is both scalable and adaptable, supporting diverse cloud, hybrid, and on-premises environments and aligning with methodologies like Agile, DevOps, and Engineering.
  • By embedding security at every phase and continuously validating controls, SPVS transforms traditional software pipelines into secure, resilient, and compliant systems. It provides a standardized, measurable approach for organizations to design, implement, and sustain secure pipelines, serving as a critical enabler of long-term DevSecOps success.
OWASPSoftware Supply Chain SecuritySupply Chain Security

Alteryx

2 roles

Team Lead of Application Security

Mar 2022Apr 2022 · 1 mo · Remote

  • Tech Stack: Veracode (SAST & DAST), WhiteSource (SCA), Snyk (IaC & Container), BurpSuite, GitLab
  • Language Stack: C++, C#, JavaScript, Python, Go, Java
  • ● Built the Application Security program from the ground up, integrating SAST, DAST, SCA, developer education, and policies to strengthen security across the organization.
  • ● Led integration and management of Veracode (SAST, DAST) and WhiteSource (SCA) across all production CI/CD pipelines, improving security automation.
  • ● Integrated Snyk's IaC and Container Security into CI/CD pipelines in under a month, strengthening infrastructure security across the board.
  • ● Streamlined Application Security tooling integration, cutting setup time from hours to 20 minutes through centralized template scanning.
  • ● Led a project to analyze and fix root causes of slow application scan times, identifying key bottlenecks and inefficiencies.
  • ● Cut scan times for a large monolithic application by 97%, significantly improving security operations efficiency.
  • ● Reduced security vulnerabilities in a monolithic repository by 95% in one quarter through focused vulnerability management.
  • ● Provided Application Security expertise during multiple M&A processes, assessing security risks and helping leadership make informed decisions.
  • ● Worked directly with developer teams on security tooling findings, making it easier to fix issues quickly and effectively.
  • ● Helped replicate and fix vulnerabilities found by customers and pentests, improving product security and customer trust.

Application Security Engineer

Jun 2021Mar 2022 · 9 mos · Remote

Product SecurityApplication SecurityApplication Security StrategyDevSecOpsSecure Software Development Lifecycle (SDLC)

Iherb, llc

2 roles

Application Security Engineer

Sep 2020May 2021 · 8 mos

  • Tech Stack: Tines.io (SOAR), Synopsys Polaris (SAST), OWASP Dependency Track (SCA), Acunetix (DAST), Jenkins, Groovy, AWS, EDR/EPP, Splunk (SIEM), Tenable.io, Secure Code Warrior
  • ● Built the Application Security pipeline using Synopsys Polaris, Jenkins CI/CD Groovy Pipeline Library, and OWASP Dependency Track in AWS, improving security automation and compliance.
  • ● Used SOAR to automate AppSec processes, triggering Jenkins automation on Bitbucket repository commits and pushes to streamline security checks.
  • ● Onboarded Bitbucket repositories into the AppSec Jenkins CI/CD Groovy Pipeline Library, improving integration and security scanning processes.
  • ● Partnered on a pentest audit of the authorization process, focusing on user account login via OAuth and OIDC, and identifying critical security improvements.
  • ● Conducted a pentest on a mobile application using Android Studio and BurpSuite, assessing OAuth and OIDC flows to strengthen mobile application security.
  • ● Worked with developer teams to fix AppSec detections, making sure vulnerabilities were addressed quickly and effectively.
  • ● Helped run developer security awareness training with Secure Code Warrior, improving security knowledge and practices across the development team.

Information Security Engineer

Nov 2019Sep 2020 · 10 mos

Enmotus inc.

Software Engineer

Oct 2017Nov 2019 · 2 yrs 1 mo · Orange County, California, United States · Hybrid

  • Tech Stack: PowerShell, Python, Backlog, Jira, Windows Client/Server, Visual Studio Code
  • ● Developed test plans and procedures to validate software requirements against customer specs, making sure everything aligned with what clients actually needed.
  • ● Built a testing lab and unit farm using desktops and laptops for regression testing, significantly improving testing capabilities.
  • ● Created automated test scripts that cut the test cycle from 1 month to 5 days, drastically improving efficiency.
  • ● Integrated data analytics into automation to create a trackable history for better test analysis and reliability.
  • ● Ran manual test cases and handled ongoing maintenance and bug fixes to keep software quality high.
  • ● Analyzed and reported test results, documenting bugs with clear replication steps to help teams fix issues faster.
  • ● Worked directly with developers to verify results, troubleshoot, and fix bugs found through automation testing.
  • ● Replicated customer-reported bugs and debugged issues in the testing lab with developers to improve product reliability.
  • ● Tracked bugs reported by partner companies using JIRA, keeping communication clear and organized.
  • ● Set up and managed the company's bug tracking system with Backlog, streamlining how we tracked and resolved issues.
  • ● Managed the company's software penetration test with a third-party vendor to ensure product security and compliance.

Vyaire medical

Software Engineer

Jul 2016Oct 2017 · 1 yr 3 mos · Yorba Linda, California · On-site

  • Tech Stack: C/C++, CSS, HTML, JavaScript, Jenkins, Git, JIRA, Eclipse IDE, Visual Studio Code
  • ● Worked on the Tools & Infrastructure and Operating System teams, focusing on developing quality embedded software and improving core system functionality.
  • ● Overhauled nightly regression testing into web-based reports with Jenkins, making it easier for the development team to access and understand results.
  • ● Developed a plugin to integrate a third-party requirements management tool into JIRA, improving project management and requirement tracking.
  • ● Built a dynamic manual page system in the ventilator's operating system that generated real-time manuals for each command using pointers and templates in C/C++, significantly improving system documentation and user support.
C#EngineeringSoftware Industry

Education

University of San Diego

Master of Science in Cyber Security Operations and Leadership — Cyber Security

Jan 2018Jan 2020

California State University, Fullerton

Bachelor of Science (B.S.) — Computer Science

Jan 2014Jan 2017

Stackforce found 100+ more professionals with Application Security & Product Security

Explore similar profiles based on matching skills and experience