Think Security – About

Think Security was formed in 2007 to fill the maturity gap in providing trusted security operations.  When it was founded, virtualization, enterprise security, and integrity in cyber security providers were all in in their infancy,  Think Security has been able to continue to provide trusted services  because of it’s dedication to two core principles: our success is based in our customers success, we will never trade long term success for short terms gains.  Our customers are long term customers that believe in these same principles.

Leadership Team

William Hoffman – CEO

With over 15 years experience as a Senior Cybersecurity leader, Will brings his vast experience and drive to Think Security.  His molding of the company in his own values of accountability. integrity, customer success within best practices are all reflected through Think Security. 

William has Information Technology (IT) experience with Private Industry and corporations supporting government contracts. Acquired extensive experience in designing and developing high tech security products (Firewalls and Intrusion Detection/Protection Systems); Reverse Engineering; Custom Exploit Developing; Conducting Information Security Audits, Assessments, and Network Penetration Testing; Developing Encryption Software and Virtual Private Network, as well as, Network Development and Services.

Aaron Fansler – CTO

Aaron is a recognized pioneer in the Operational Technology (OT) security and threat intelligence community. He gained his start in security working for the Air Force Information Warfare Center (AFIWC) in 2002 and for the past 17 years has been a leader with developing specialized tools and techniques for protecting both national, state, and private infrastructures from adversaries.
Aaron specialties is evaluating and providing secure solutions for critical infrastructures such as the electric power grid, water and POL pipelines for potential vulnerabilities and critical interdependencies. Aaron has worked in the arena of assessing and exploiting potential vulnerabilities with Industrial Control Systems (ICS), Smart Grids, and Microgrids. From 2006 to 2008, while working at the US Department of Energy’s (DOE) Pacific Northwest National Laboratory (PNNL).