Matthew Goodrich

CTO

Seattle, WA, USA14 yrs 8 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Built product security program from the ground up at Alteryx.
  • Achieved over 60% improvement in security issue closure rates.
  • Serves as Chief Security Architect with strategic influence.
Stackforce AI infers this person is a SaaS security architect with extensive experience in product security and compliance.

Contact

Skills

Core Skills

Information SecurityGovernance, Risk Management, And Compliance (grc)Product SecurityApplication SecurityProduct ManagementCloud SecuritySecurity Architecture DesignIdentity And Access Management (iam)LeadershipSoftware ArchitectureDevopsNetwork Security

Other Skills

Vulnerability ManagementStrategic PlanningAI GovernanceThreat ModelingSecure Software Development (SSDLC)Enterprise SecurityStakeholder ManagementSOC 2ISO 27001DevSecOpsStatic AnalysisSoftware Composition AnalysisPayment Card Industry Data Security Standard (PCI DSS)Amazon Web Services (AWS)Single Sign-On (SSO)

About

I've spent my career at the intersection of engineering, product, and security — often literally, having worked all three functions at the same company. That experience has shaped everything about how I approach security: I understand why engineering teams deprioritize security work, because I was one of them. I understand why product teams resist slowing down for security reviews, because I ran one. At Alteryx, I built the product security program from the ground up — starting as one of the first product security hires embedded in the engineering organization, and growing it into a mature function with full SSDLC coverage, OWASP ASVS adoption across the product portfolio, a production PSIRT, threat modeling standards, and a custom remediation tracking tool that improved security issue closure rates by more than 60%. Along the way I've led teams and programs across security architecture, DevSecOps, product security strategy, and GRC — moving deliberately across engineering, product management, and information security organizations based on where security leverage was highest. Today I serve as Chief Security Architect — the only individual contributor on the CISO's direct staff. No direct reports; full strategic scope. My job is making sure security moves at the speed of the business, not the other way around. My conviction is that security is an engineering discipline, not a compliance function. That means writing Python to automate evidence collection, building unified control frameworks that satisfy multiple compliance standards simultaneously, and designing AI governance policies that extend existing security controls rather than creating a parallel bureaucracy. I write about security leadership, product security, GRC engineering, and AI governance at mattgoodrich.com, and have appeared on the CISO Series podcast.

Experience

14 yrs 8 mos
Total Experience
2 yrs 5 mos
Average Tenure
6 yrs 4 mos
Current Experience

Alteryx

7 roles

Senior Director, Information Security - Chief Security Architect

Promoted

Mar 2025Present · 1 yr 2 mos

  • This role is the culmination of six years operating across engineering, product management, and information security at Alteryx — moving deliberately to wherever security leverage was highest at each stage of the company's growth. I built the product security program from its first line of policy to a mature cross-functional function, drove cloud product security through two major acquisitions, embedded security into the enterprise product roadmap, and now serve as the only leader-level individual contributor on the CISO's direct staff.
  • Serve as the only IC-level leader on the CISO's direct staff — no direct reports, full strategic scope — leading by influence across all InfoSec domains
  • Developed the InfoSec department's 2026 strategic pillars — GRC engineering, data security, IAM maturity, and AI security foundations — and secured buy-in across the full InfoSec leadership team
  • Drive tool rationalization, cross-functional efficiency, and roadblock removal across security verticals; serve as a forcing function for PCI compliance including controls documentation, audit tooling, and direct auditor engagement
  • Built vulnerability management automation: ticket ingestion, backlog prioritization, and SLA tracking integrated with engineering team workflows
  • Identify and surface program gaps across security domains; plug into individual teams as a hands-on technical contributor when and where needed
Information SecurityGovernance, Risk Management, and Compliance (GRC)Vulnerability ManagementStrategic PlanningAI Governance

Director, Product Security & Architecture

Promoted

Sep 2022Mar 2025 · 2 yrs 6 mos

  • Consolidated product security strategy, DevSecOps, and architecture functions back into the InfoSec organization under a single program — bringing together the full scope of security work built across prior roles
  • Continued enterprise customer-facing security conversations — translating security posture into commercial terms to unblock cloud product adoption at strategic and high-value accounts
  • Refined and expanded SSDLC coverage and tooling; deepened threat modeling standards and ensured continuous security review coverage across cloud and hybrid product lines
  • Iterated the product security roadmap and served as the primary security voice in product planning and architecture reviews across 50+ engineering teams
Product SecurityApplication SecurityThreat ModelingSecurity Architecture DesignSecure Software Development (SSDLC)

Director, Product Security Strategy

Jun 2022Sep 2022 · 3 mos

  • Embedded within the Product Management organization — a deliberate move made in partnership with the Chief Product Officer — to drive the enterprise security roadmap from inside the business rather than alongside it
  • Built and drove the security roadmap enabling enterprise customers to adopt Alteryx cloud products with minimal security friction; led customer conversations, responded to security questionnaires, and translated technical risk into adoption-blockers the business could act on
  • Returned to InfoSec following a CISO transition that consolidated security functions; brought the DevSecOps team and product security strategy back under the information security organization
Product ManagementStrategic PlanningProduct SecurityEnterprise SecurityStakeholder Management

Director, DevSecOps

Aug 2021Jun 2022 · 10 mos

  • Embedded security within the engineering organization to build a security presence during a critical growth period post-Trifacta acquisition
  • Controls-focused engagement to achieve SOC 2 Type 2 and ISO 27001 certification for Alteryx's new cloud product — documentation, tooling, scripting, and direct auditor engagement
Cloud SecuritySOC 2ISO 27001Governance, Risk Management, and Compliance (GRC)DevSecOps

Director, Security Architecture & Engineering

Jan 2021Aug 2021 · 7 mos

  • Promoted from Principal Security Architect following consolidation of security functions into the InfoSec organization after Alteryx's first CISO hire
  • Led foundational program-building: secure SDLC design, vulnerability management program, threat modeling standards, and security architecture review processes
  • Conducted threat modeling and security design reviews for major product features including the Alteryx Data Connection Manager
  • Built the operational processes to translate security tooling findings into actual risk reduction — making engineering teams effective partners in remediation rather than recipients of findings
Security Architecture DesignThreat ModelingProduct SecurityCloud SecurityApplication Security

Principal Security Architect

Promoted

Aug 2020Jan 2021 · 5 mos

  • Moved from the engineering organization to the InfoSec team as part of the company's first formal security consolidation
  • Focused on security design and threat modeling for product features; led architecture reviews for cloud and on-premises product capabilities
  • Continued to function as the primary product security resource while the broader security organization scaled
Security Architecture DesignThreat ModelingProduct SecurityApplication SecurityCloud Security

Staff Product Security Engineer

Jan 2020Aug 2020 · 7 mos

  • Joined Alteryx as one of the first product security hires, embedded within the engineering organization
  • Established the product security function from scratch — building credibility with engineering peers, positioning the security team as consultants and subject matter experts rather than gatekeepers
  • Owned security tooling and drove early adoption of application security scanning across the engineering organization
  • Laid the cultural and operational groundwork for the formal product security program that followed
Application SecurityProduct SecurityStatic AnalysisSoftware Composition AnalysisDevSecOps

Slalom consulting

Solutions Architect - Cloud, DevOps, and Security

Feb 2018Jan 2020 · 1 yr 11 mos · Denver Metropolitan Area · On-site

  • Founded and built the Security and Risk Services sub-practice in the Denver market — establishing service offerings, delivery methodology, and go-to-market approach that became a model for Slalom offices nationally
  • Served as the AWS Security specialist across client engagements spanning telecommunications, software, government, and higher education — including designing PCI-compliant AWS Fargate environments and building cloud security foundations from scratch
  • Spoke on security topics at BSides Denver, Denver Modern Web, and the local OWASP chapter; created and delivered internal training curriculum covering OWASP Top 10, container security, IAM standards, and AWS security automation
Cloud SecurityApplication SecurityPayment Card Industry Data Security Standard (PCI DSS)Security Architecture DesignAmazon Web Services (AWS)

Proofid ltd

Principal Security Architect, Professional Services

Nov 2015Feb 2018 · 2 yrs 3 mos · Denver Metropolitan Area · Remote

  • Developed a Password Recovery Module Plugin for PingFederate that was later acquired by Ping Identity and integrated into the core product — serving as the foundation for what became a standard platform capability
  • Lead technical consultant for IAM architecture and implementation across 5–10 Fortune 2000 clients weekly; delivered end-to-end design, implementation, and training for complex enterprise IAM systems including PingFederate, PingAccess, PingID, and PingDirectory
  • Specialized in authentication and authorization standards including SAML, OAuth, OpenID Connect (OIDC), and SCIM; owned risk assessment activities — source code scanning, vulnerability scanning, and penetration testing — for all customer deliverables
Identity and Access Management (IAM)Single Sign-On (SSO)OAuthOpenID Connect (OIDC)Application SecuritySAML

K2

Software Engineering Manager

Sep 2014Nov 2015 · 1 yr 2 mos · Greater Seattle Area · On-site

  • Managed and developed a high-performing software engineering team — responsible for hiring, performance management, and delivery across the full product lifecycle from roadmap through release
  • Partnered with global product and business units to drive cross-functional delivery; served concurrently as engineering manager, product manager, and scrum master to ensure alignment between technical execution and business outcomes
Product ManagementLeadershipAgile MethodologiesSoftware DevelopmentSoftware Development Life Cycle (SDLC)

Hosting

Engineering Technical Lead

Oct 2012Jun 2014 · 1 yr 8 mos · Denver Metropolitan Area · On-site

  • Led architecture and development of core business applications; drove the company's DevOps initiative including continuous build and deployment pipelines for web services and databases
  • Designed and implemented Windows PCI compliance scripts for server operating systems — an early intersection of engineering and security that foreshadowed the career direction that followed
Software ArchitecturePayment Card Industry Data Security Standard (PCI DSS).NETDevOpsContinuous Integration and Continuous Delivery (CI/CD)

Seros inc

Security Engineer

Jun 2011Oct 2012 · 1 yr 4 mos · Greater Colorado Springs Area · Hybrid

  • Early-career security role focused on Identity and Access Management — delivering PingFederate-based Single Sign-On implementations and federated identity integrations for enterprise clients across the United States
  • Extended PingFederate with a custom data source implementation enabling chained LDAP-based data sources — a capability that predated the official product feature and demonstrated hands-on platform depth that carried forward throughout the career
Identity and Access Management (IAM)PingFederateNetwork SecuritySingle Sign-On (SSO)Federated Identity Management

Education

Colorado State University

Bachelor of Science — Applied Computing Technology

Jan 2006Jan 2011

Stackforce found 100+ more professionals with Information Security & Governance, Risk Management, And Compliance (grc)

Explore similar profiles based on matching skills and experience