CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
分部資訊主管 @國防部
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
Communication
.Net framework
.NET MVC
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
元智大學
資訊工程學系
Avatar of Wang Jen Ming (王仁明).
Avatar of Wang Jen Ming (王仁明).
Past
Systems Engineer (Maintenance & Security) @Alliance Healthcare Group
2022 ~ 2023
IT Administrator, IT Analyst, Cyber security, System & Network Administrator
Within one month
Myanmar) 二月二月 2018 Design and Implement Network and Hyper-V Replication Servers Implementing Routing, Firewalls, GlusterFS, iSCSI, LVM, DNS, Microsoft Exchange and IIS Setting up Rsync, Rsyslog, Samba, Windows AD, FSRM, DFS services Network security monitoring and setup (firewalls, logs monitoring) Supporting End User, data backup, and restore Project coordination, inventory control, documentation 學歷NCC Education, UK Level 4 Diploma in ComputingMyanmar Maritime University B.Sc (Hons) Nautical Science 專業認證 • eLearnSecurity Web Application Penetration Tester (eWPT) • CompTIA Certified Cybersecurity Analyst (CySA+) • Cisco Certified Network Professional (CCNP – Security) • Qualys...
System Administration
Network Security
Web Security
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
NCC Education, UK
Cyber Security
Avatar of the user.
Avatar of the user.
高級工程師 @不顯示公司名稱
2022 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
Active Directory
IIS
PHP
Employed
Ready to interview
Full-time / Interested in working remotely
10-15 years
立德大學
資訊工程
Avatar of Stephen Hsu.
Avatar of Stephen Hsu.
Past
Senior Test programmer @Robert Bosch GmbH
2022 ~ 2023
測試或資安專責人員
Within one month
headquarters' security quality requirements (based on IEC 62443, ISO 27001, CSF 2.0 standards), data security management/internal audits, localization system implementation, preparation of related materials, and conducting education and training will be carried out. * Based on verification and validation (V&V), I conduct functional and security testing on IP security cameras and their backend support systems and platforms (PCs, AIOs, servers, network environments, Windows/[embedded] Linux). This includes penetration testing, ACL permission control, defense in depth validation, SSO, and ZTNA. * According to customer requirements, conduct system planning analysis and (semi/full) automated
QA Automation
Test Driven Development
Test Management
Unemployed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
Concordia University
Master of Business Administration (M.B.A.)
Avatar of Vlad Volkov.
Avatar of Vlad Volkov.
Past
Senior Quality Analyst @Thoughtworks
2022 ~ 2023
QA automation engineer / Software development engineer in test
Within one month
and i18n testing of Unity application (mobile & web) DecemberMarchPosition eliminated due to COVID impact) Quality Assurance Engineer • EO Finance, Cyprus Full stack testing of cryptocurrency wallet & exchange (mobile, web & desktop apps) Developed & maintained E2E and API tests Reviewed business requirements and design assets Mentored new testing team members Made regression testing twice faster JanuaryNovember 2019 QA Engineer • SPB TV, Russia Functional, interface and backend testing of dozen web and IPTV products Actively participated and offered ideas in meetings and features discussions Described several thousand bugs in Jira DecemberJanuary 2018 Test Engineer • Ficbook, Russia Exploratory, performance and penetration testing of social
Performance Testing
JavaScript
Postman
Unemployed
Ready to interview
Full-time / Not interested in working remotely
4-6 years
慈濟大學 Tzu Chi University
Mandarin Chinese Course
Avatar of 白紋愷.
Avatar of 白紋愷.
Engineer @Trend Micro 趨勢科技
2021 ~ Present
Software Engineer
Within two months
solution to the end user to make sure they would keep using our product and feel satisfied. Product CI/CD: Using GitHub Action to trigger product build and deploying package when the package is output successfully. BlockChain Security Corp, Programmer, May 2020 ~ Oct 2021 Developed Web App Penetration Testing Platform: Developed a website on Internet Information Services (IIS) using .NET Framework. Built databases to store user data, penetrating data, and penetrating syntaxes on a SQL Server. Integrated APIs of third-party penetration testing tools, e.g. ZAP and SQL Map. Solved
C/C++
SQL
Git
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
National Chengchi University
Computer Science
Avatar of Edy Wijaya.
Avatar of Edy Wijaya.
Past
BD Listing & KOL Manager @Coinstore & Pionex Crypto Exchange
2022 ~ 2023
Within two months
Dipl.-ing Edy Wijaya While in college, I worked part-time as IT Support for Philips in Aachen and also at the RWTH Aachen Institute. After returning to Indonesia, I am active in IT solutions, both Hardware and Software, specifically in the field of networking infrastructure and VoIP. After a long time in the technical field, I started in the field of Business Development in Thano for physical security products, and then for the Hospitality Industry I marketed locking and access control products from Salto Systems. In my spare time, I took courses and was self
Troubleshooting Hardware and Software Problems
IT Support
Problem Solving
Unemployed
Open to opportunities
Full-time / Interested in working remotely
10-15 years
FH Aachen university of applied sciences
Electrical Engineering
Avatar of the user.
Avatar of the user.
Professional development @Career Break
2024 ~ Present
IT Infrastructure Manager, IT Support Manager
Within one month
Email Management
IT Support
Management & Leadership
Employed
Open to opportunities
Full-time / Interested in working remotely
10-15 years
BINUS University
Computer Science
Avatar of 林煌錡.
Avatar of 林煌錡.
Cyber Security Analyst @iTop Digital Technology Co., Ltd.
2021 ~ Present
資安威脅分析師、滲透測試工程師
Within one month
監控、Log分析與誤報除錯及規則調整等 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑 Penetration Testing 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下: 模擬易受攻擊的
Penetration Test
Threat Hunting
Azure Sentinel
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國防大學中正理工學院
資訊工程學系
Avatar of BlackSmile.
Avatar of BlackSmile.
Senior Information Security Manager @玉山證券
2024 ~ Present
Cyber Security Engineer
Within one month
BlackSmile Penetration Test Cyber Security Engineer Taoyuan City, Taiwan 大學於資訊管理系畢業,於2018年從軍後開始接觸資安領域。主要在部內負責弱點掃描及滲透測試的工作,並接受專業課程培訓,擔任單位Cyber Kill Chain教官,教授MITER ATT&CK定義之流程。 在工作上除了精進專業技能外,還累積了許多團
liunx
Windows
Kali Linux
Employed
Not open to opportunities
Full-time / Interested in working remotely
4-6 years
國立陽明交通大學(National Yang Ming Chiao Tung University)
國防資安管理

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Within six months
Security Researcher (Freelance) | Cyber Security Enthusiast | CEH | OSCP
104 Corporation
2018 ~ 2020
馬來西亞
Professional Background
Current status
Employed
Job Search Progress
Professions
Security Engineer
Fields of Employment
Cyber Security
Work experience
2-4 years
Management
None
Skills
Burp Suite
Nessus
Splunk
Shell Scripts
Python
JavaScript
Linux
Windows
Active Directory
Open Source
Security Testing
Threat Hunting
Security Operations
Security Monitoring
Cyber Security
Vulnerability Assessment
Firewall Management
Amazon Web Services
Microsoft Office
Languages
Chinese
Fluent
English
Intermediate
Malay
Intermediate
Job search preferences
Positions
Penetration Tester
Job types
Full-time
Locations
馬來西亞
Remote
Interested in working remotely
Freelance
No
Educations
School
Jinwen University of Science and Technology
Major
Computer Science and Information Engineering
Print

Charlie Chew

Security Researcher

Enthusiastic Security Researcher eager to contribute to team success through hard work, attention to detail and excellent organizational skills. Clear understanding of vulnerability assessment and threat analysis, training in penetration testing. Motivated to learn, grow and excel in cyber security.

  Phone: (+886)905363414
  E-mail: [email protected]
  LinkedIn: https://www.linkedin.com/in/charlie-chew-634850153/
  GitHub: https://github.com/thr3athunt3r
  Blog: https://thr3athunt3r.github.io

Work History


Security Engineer

104 Corporation

Aug 2018 - Dec 2020
New Taipei, Taiwan

  • Performed risk and vulnerability assessments and provided results and recommendations to  managements.
  • Performed and reviewed technical security assessments to identify points of vulnerability and non-compliance with established information security standards and recommend mitigation strategies.
  • Developed, implemented, and documented security programs and policies and monitored compliance across departments.
  • Used Splunk to analyze network data and design rules.
  • Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
  • Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
  • Analyzed security policies for usefulness and value to suggest security policy improvements.
  • Recommend improvements in security systems and procedures.
  • Conducted IT audit assessments for systems or applications to recommend solutions to mitigate risks.

Skills

   Penetration Testing       Security Vulnerability Assessment         Firewall Management       Automation Scripting    

   Threat Detection       Threat Analysis Investigations       Security Logging 
   Patching  


Programming Languages & Tools

  JavaScript     Python     Shell   Burp Suite     Splunk     Amazon Web Services   


Certification

Languages

   Chinese — Good      English — Average      Malay — Average

Education

Sep 2015 - Jun 2019

Jinwen University of Science and Technology

Bachelor of Computer Science And Information Engineering

Resume
Profile

Charlie Chew

Security Researcher

Enthusiastic Security Researcher eager to contribute to team success through hard work, attention to detail and excellent organizational skills. Clear understanding of vulnerability assessment and threat analysis, training in penetration testing. Motivated to learn, grow and excel in cyber security.

  Phone: (+886)905363414
  E-mail: [email protected]
  LinkedIn: https://www.linkedin.com/in/charlie-chew-634850153/
  GitHub: https://github.com/thr3athunt3r
  Blog: https://thr3athunt3r.github.io

Work History


Security Engineer

104 Corporation

Aug 2018 - Dec 2020
New Taipei, Taiwan

  • Performed risk and vulnerability assessments and provided results and recommendations to  managements.
  • Performed and reviewed technical security assessments to identify points of vulnerability and non-compliance with established information security standards and recommend mitigation strategies.
  • Developed, implemented, and documented security programs and policies and monitored compliance across departments.
  • Used Splunk to analyze network data and design rules.
  • Assessed threats, risks and vulnerabilities from emerging security issues to advise pertinent stakeholders on appropriate measures.
  • Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities.
  • Analyzed security policies for usefulness and value to suggest security policy improvements.
  • Recommend improvements in security systems and procedures.
  • Conducted IT audit assessments for systems or applications to recommend solutions to mitigate risks.

Skills

   Penetration Testing       Security Vulnerability Assessment         Firewall Management       Automation Scripting    

   Threat Detection       Threat Analysis Investigations       Security Logging 
   Patching  


Programming Languages & Tools

  JavaScript     Python     Shell   Burp Suite     Splunk     Amazon Web Services   


Certification

Languages

   Chinese — Good      English — Average      Malay — Average

Education

Sep 2015 - Jun 2019

Jinwen University of Science and Technology

Bachelor of Computer Science And Information Engineering