🏴‍☠️ Chad F.

Co-Founder

Fort Wayne, Indiana, United States7 yrs 5 mos experience

Key Highlights

  • Led GRC initiatives at Docker to enhance compliance.
  • Developed GigaChad GRC platform for enterprise-level governance.
  • Transformed security policies achieving near 100% compliance.
Stackforce AI infers this person is a Cybersecurity professional with a strong focus on Governance, Risk, and Compliance in SaaS environments.

Contact

Skills

Core Skills

CybersecurityRegulatory ComplianceProject ManagementSecurity AnalysisComplianceTechnical Support

Other Skills

Threat AssessmentInformation SecurityVulnerability AssessmentCommunicationFacilitationRisk ManagementCustomer EngagementThreat HuntingSIEM AdministrationVulnerability AnalysisDocumentationCompliance AuditsDevice ManagementMarketingSocial Media Marketing

About

All comments, thoughts, beliefs, expletives, antagonism and posts are my own and not my employer. Head of GRC at Docker and Himothy of GigaChad GRC. Experienced cyber security professional with a demonstrated history of thinking big and building even bigger. I aim to be a force multiplier by bringing skills and an unconventional thought process honed through a background working in various different fields.

Experience

7 yrs 5 mos
Total Experience
1 yr 3 mos
Average Tenure
11 mos
Current Experience

Docker, inc

2 roles

Security Engineering Manager - GRC-P

Promoted

Nov 2025Present · 6 mos

  • Define and drive Docker's 2026 GRC objectives, consolidating initiatives across compliance certifications, operational improvements, privacy program maturity and technical implementations
  • Lead cross-functional security, compliance, and privacy collaboration with Legal, IT, Customer Support, and Operations teams
  • Overseeing integration of privacy engineering function into GRC team, expanding team capabilities and aligning privacy technical implementation with compliance strategy
  • Audited GRC tool stack to identify opportunities to dogfood Docker's technology, building custom tooling better aligned to team needs and is able to scale at the rate we need
  • Spearheaded creation of GigaChad GRC, a holistic enterprise level GRC platform - https://github.com/grcengineering/gigachad-grc
Threat AssessmentCybersecurityProject ManagementRegulatory ComplianceInformation Security

Senior Security Engineer - GRC

Jun 2025Nov 2025 · 5 mos

  • Built program management framework delivering transparency, metrics, and repeatable workflows for high-performing GRC team; became go-to resource for complex decisions and program strategy while providing leadership real-time visibility into value delivery
  • Overhauled Docker's security policy framework, closing 50+ critical gaps identified through multi-framework gap analysis against ISO 27001/27018/27701 and SOC 2; rewrote policies to achieve near 100% compliance coverage, updated self-service portals, and implemented auditable exception workflow
  • Transformed GRC tool from 35% to 84% evidence accuracy by auditing all 53 integrations, eliminating redundancies, rebuilding evidence mappings, and creating unified control matrix enabling real-time multi-framework compliance visibility
  • Converted DataGrail from unmaintained black box into documented, compliant privacy platform; audited integrations, partnered with Support to document DSR processes, and created prioritized roadmap shifting from reactive firefighting to proactive compliance management
  • Addressed SOC 2 findings related to change management deficiencies, implementing GitHub branch protection enforcement
  • Co-developed third-party risk management framework, workflow, and exception process including vendor assessment questionnaires and scoring methodologies
  • Co-developed our entire Security Awareness Training from the ground up at the code level with a teammate - https://github.com/grcengineering/open-security-training
CybersecurityProject ManagementRegulatory ComplianceInformation SecurityVulnerability Assessment

Mindbody

GRC Engineer III

Oct 2023Jun 2025 · 1 yr 8 mos · Remote · Remote

Twilio

3 roles

Staff Technical Program Manager, InfoSec PMO

Jan 2023Dec 2023 · 11 mos

  • Same work as below, just a more generic title.

Embedded Security Program Manager, Security PMO

Feb 2022Feb 2023 · 1 yr

  • Do things that enable the Chief of Staff to best support the Office of the CISO:
  • Facilitate communications between teams within R&D, embedded security team members and Trust & Security leadership
  • Proxy for the Chief of Staff
  • Extra set of hands to help with presentation development or ghost writing communications
  • Orchestrate description of capabilities
  • Do things that enable the leadership team to operate at a higher level of performance:
  • Design and manage a method for reporting project status through various levels of hierarchy
  • within the Trust & Security Organization
  • Facilitate consolidated linkage between individual projects, BPMs, LROs and capabilities
  • Augment teams with project and program management support where needed
  • Do things that enable the organization to produce better results and achieve strategic objectives:
  • Support vision for how individual contributors’ work facilitates the BPMs & LROs of the Trust & Security Organization
  • Ensure project prioritization is followed so that efforts are dedicated to the right actions
  • Keep team pulse and foster sense of community and belonging
  • Do things that enable the BISO Team to focus on strategic goals, while handling tactical
  • measures to allow the Embedded Security teams to burn down security debt:
  • Create standardized processes to enable security team members to onboard to the embedded
  • security model with ease
  • Facilitate communications between teams within R&D, embedded security team members and
  • Trust & Security leadership
  • Enable project tracking through internal tools for the Embedded Security teams and BISOs
  • Facilitate best practices across the PMs:
  • Create a golden standard for program management to best facilitate work
  • Ensure communication tools are enabled and used
  • Facilitate a center of excellence to enable skills development and to learn from one another

Senior Security Analyst, Security Customer Trust

Apr 2021Feb 2022 · 10 mos

  • Collaborate with product and engineering teams to validate security controls regularly and ensure the information provided to customers is accurate, up to date and useful
  • Partner with Go to Market, Legal/Privacy and Trust & Security to identify opportunities to design and align scalable processes that improve customer experience and decrease customer touch points during security engagements
  • Design, Plan, and execute the Customer Security Enablement team processes, policies, operational playbooks and best practice guides/documentation for internal team to increase consistency
  • Take steps to ensure processes participation and accountability
  • Lead and support planning & development of strategic security initiatives that support organizational goals and Twilio customers
  • Oversee and track of Customer Security Enablement projects and support efforts
  • Analyze and evaluate risks, and produce program reports for management and stakeholders
  • Plan and implement driven feedback loop to incorporate into security planning
  • Reporting on team metrics
  • Partner cross-organizationally to develop an enterprise wide tool to find, measure, mitigate and remove risk at the enterprise level by integrating business intelligence to surface relational datasets to correlate data in new ways
  • Manage a knowledge base for the security organization that can be used to aid Go to Market for security related questions coming from customers
  • Partner with Legal and Third Party Risk as the Security SME to review and redline customer and vendor contracts to minimize our security risks in the deals we make
  • Engage with customers on calls as a Security SME to explain the various Twilio platforms and how we architect our infrastructure and APIs to allow customers to configure their application to securely utilize our platform
Project ManagementCommunicationFacilitation

Bsidesfortwayne

Co-Founder

May 2021Present · 5 yrs · Fort Wayne, IN

Corsica technologies

Cyber Security Technician II

Jan 2021Apr 2021 · 3 mos · Fort Wayne, Indiana, United States

  • Perform threat hunts in client environments looking for indicators of compromise and vulnerabilities. Take knowledge learned and use to it add/tune/remove existing detections
  • Respond to alerts generated by SIEM, EDR, Anti-Virus, Dark Web Monitoring
  • Stay up to date with cyber security news including reading threat intelligence reports (from hundreds of sources including Twitter accounts, RSS feeds, podcasts and email newsletters) and acting on the data by conducting related threat hunts as well as testing and if needed improving the detection program
  • Administer SIEM, EDR, Secure Internet Gateway, Email Filtering and other security platforms
  • Analyze email messages submitted by clients as potential phishing messages. Through this process I have discovered and stopped active scam campaigns that users were actively engaging with before being notified. I have also uncovered countless credential harvester websites that I subsequently blocked with our secure internet gateway
Security AnalysisRisk ManagementCustomer Engagement

Tricore logic, llc

Service Support Representative / Compliance Officer

Jun 2020Jan 2021 · 7 mos · Fort Wayne, Indiana, United States

  • Create and maintain comprehensive documentation as it relates to server and network topology, equipment, and configurations
  • Create project plans, design, and implement solutions
  • Level 2 and Level 3 support for problems identified with systems and network, acting as an escalation for Level 1 and Level 2 managed services support technicians
  • Create, request, and present technical specifications and requirements for purchasing of new servers and networking equipment via quote procedure
  • Standard system administration duties including server install, system / application install and patch management, Windows problem determination and resolution, log analysis
  • Configure, test, and maintain LAN equipment including switches, routers, firewalls, and VPN. Identify, diagnose, and resolve network problems including network connectivity and traffic utilization using available network tools in a timely fashion
  • Provide Infrastructure services in all areas needed including storage networking, operating system, network security, directory services, server virtualization using system backup and restore, system and network monitoring, and application installation and configuration
  • Complete compliance audits on customers to help them reach compliance for HIPAA, PCI DSS and GLBA
Threat HuntingSIEM AdministrationVulnerability AnalysisCybersecurity

Southwest allen county schools

Computer Specialist

Sep 2019Jun 2020 · 9 mos · Fort Wayne, Indiana

  • Re-imaging of student and faculty devices.
  • Apply and manage permissions per group policy
  • Manage 1300+ devices on the domain
  • Tier 1 and Tier 2 support for over 1100 students, faculty and support staff
  • An ambassador trying to make computers and networking accessible to passionate kids who want to become more versed in technology
  • Tear down, repair and replace laptop hardware
  • Develop technology training material for staff
DocumentationCompliance AuditsTechnical SupportCompliance

Springer construction, inc.

Project Manager

Jun 2018Jun 2019 · 1 yr · Fort Wayne, Indiana Area

  • Supervision duties of more than 60 employees across 12 different crews were part of the daily routine. Maintaining open lines of communication between the office, full-time workers in the field, homeowners, and city/state officials was necessary depending on the project.
  • Databases, email programs, web-based applications, Microsoft Office and customer relationship management software were all used for this position. Occasionally, it was necessary to troubleshoot software and hardware for office computers and mobile devices.
Device ManagementTechnical Support

Education

Ohio Northern University

Computer Science

Ivy Tech Community College

Associate of Applied Science - AAS — Cyber Security

Stackforce found 100+ more professionals with Cybersecurity & Regulatory Compliance

Explore similar profiles based on matching skills and experience