D. Chandler Prince

Cybersecurity Leader & Product Strategist

A cybersecurity leader supporting Business Information Security Officer (BISO) organizations with deep technical expertise. My role is dynamic, adapting to fluctuating business needs, but always focused on solving complex problems. While my work is centered on cloud security, DevSecOps, and AppSec, I frequently provide guidance on secure architectures, assist teams during threat models and audits, and advise on privacy and compliance matters, escalating novel issues to legal and privacy specialists.

GitHub LinkedIn

Core Competencies

Cloud & Application Security

Cloud Armor Akamai Container Security (Docker, J Frog X-Ray) Identity and Access Management (IAM)

DevSecOps

SAST Secret Scanning (Cycode) SCA IaC Security CI/CD Pipelines (Jenkins, Bamboo, Tekton)

Governance & Compliance

ISO 27001 HIPAA GDPR Policy Development OWASP SAMM

Technical & Analytical

Python & Pandas Java Spring React (JS/TS) Go C# Rust Cybersecurity Dashboard Development Data Analysis Threat Modeling

Experience Highlights

Enterprise Security Leadership

Led and mentored multi-disciplinary teams focused on cloud and application security for business units generating multi-billion dollar revenues. Drove enterprise-wide adoption of advanced security tools and best practices, significantly reducing false positives and enhancing threat detection.

ISO 27001 Certification & Business Enablement

Spearheaded the ISO 27001 certification for a core Identity and Access Management product by directing detailed threat models and risk analyses with internal security and control groups. Simultaneously, drove crucial updates to information security policy to enable 3rd party identity federation, directly supporting sales and marketing efforts to onboard large clients requiring single sign-on (SSO) capabilities.

Projects & Demonstrations

Interactive Threat Model

A hands-on walk-through of identifying security threats on a sample E-Commerce API using the STRIDE framework.

View the Case Study
Security Checklist Generator

A tool to generate tailored security checklists for various project types and technologies, helping to standardize security posture.

Use the Generator
JWT Decoder & Verifier

An interactive tool to decode and verify JSON Web Tokens (JWTs) securely in your browser.

Try the JWT Decoder
Browser Fingerprinting Demo

A hands-on demonstration of browser fingerprinting techniques, explaining how they are used for fraud and bot detection.

View the Demo
Vulnerability Comparator

An interactive tool to compare CVSS severity with EPSS exploitability, helping prioritize vulnerabilities.

Try the Comparator
PRS MODCAT Decoder

A tool for decoding the complex model codes (MODCATs) used by Paul Reed Smith Guitars.

Try the Decoder
Threat Intelligence Dashboard

A live dashboard that pulls the latest CVEs from the NVD API to visualize the current threat landscape.

View Dashboard
Guide to SAST False Positives

A practical guide on investigating SAST findings, using statistical analysis and file path context to triage alerts at scale.

Read the Guide
Cloud Misconfiguration Explorer

A hands-on guide to common cloud security pitfalls. Click a component in the diagram to analyze a potential misconfiguration.

Explore the Diagram

Certifications

ISC² CISSP, CCSP
CompTIA Linux+, Security+, PenTest+, CySA+, CASP+, SecurityX
ITIL Foundation v4