CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of 沈南俠.
SRE /DevOp engineer/ Cloud Technical Engineer
Within one month
/AWS 3>Troubleshooting 語言 中/英 ●AWS Certified Cloud Practitioner certificate ●AWS Certified Solutions Architect - Associate certificate 工作/經歷 ●先豐通訊(BoardTek)(2013//05) 職稱:設計工程師 -工作技能:AutoCAD,CAM(only view gerber),Understand the circuit board generator process -工作內容: 依照vendor提供的藍圖及製程需求,參照PCB 及廠內製程 1.與vendor澄清製程 2.與CAM確認製程分藍
JAVA
Spring Boot
Spring MVC
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立台東大學
資訊工程
Avatar of the user.
Avatar of the user.
Engineer (Process Engineering) @PT Sat Nusapersada Tbk
2010 ~ Present
Within one month
Word
Excel
Canva
Employed
Open to opportunities
Full-time / Not interested in working remotely
10-15 years
SMK Cendana Padang Panjang
Elektronika Komunikasi, Komputer
Avatar of 許婉琪.
Avatar of 許婉琪.
開發設計 @渤揚股份有限公司
2021 ~ Present
服裝開發設計
Within one month
許婉琪 我叫許婉琪2006年台灣高雄樹德科技大學室內設計系畢業,畢業後從事服裝設計相關的領域,在職場也有7年以上的經驗,從在印花廠擔任美工,但喜愛服裝設計與時尚,繼而轉往能多元學習的服裝公司擔任設計助理,期間無論是協助設
Word
Photoshop
Illustrator
Employed
Full-time / Interested in working remotely
6-10 years
樹德科技大學
室內設計
Avatar of Dr David Gerber.
Avatar of Dr David Gerber.
Labia Reduction Surgeon @Meridia Medical Group
2017 ~ Present
Labia Reduction Surgeon
More than one year
Dr David Gerber Dr. David Gerber, MD, MHSc, FRCS (C), is a Toronto, Canada based gynecologist. He specializes in labiaplasty (labia reduction surgery). Previously, he worked as a family doctor in rural Manitoba and Alberta for four years. He graduated from the University of Stellenbosch in South Africa with a degree in medicine. Following his internship in Cape Town, he spent a year practicing Internal Medicine, Obstetrics, and Gynecology in Ciskei, South Africa (an underprivileged area). He completed his training in Obstetrics and Gynecology at the University of British Columbia in Vancouver. He
Internal Medicine
Health Sciences
Plastic Surgery
Part-time / Interested in working remotely
More than 15 years
University of Toronto
Master's degree , Health Sciences in Bioethics
Avatar of the user.
Avatar of the user.
Past
Group Head @MGCC上海眾引傳播廣告公司
2017 ~ 2018
Community Management / Social Media Marketing / Senior Copywriter
More than one year
Word
PowerPoint
Excel
Unemployed
Full-time / Interested in working remotely
6-10 years
中国四川省傳媒學院
廣播電視編導專業:網絡傳媒方向
Avatar of the user.
Avatar of the user.
Engineer @Palomar Scientific Instruments
Hardware Engineer
More than one year
VHDL
Altium Designer
Xilinx
Full-time / Interested in working remotely
4-6 years
CSUSM
Applied Physics

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Within one month
Cyber Security Analyst | Penetration Tester
Logo of iTop Digital Technology Co., Ltd..
iTop Digital Technology Co., Ltd.
2021 ~ Present
Taipei Metropolitan Area, Taiwan
Professional Background
Current status
Employed
Job Search Progress
Open to opportunities
Professions
Security Engineer
Fields of Employment
Cyber Security
Work experience
6-10 years work experience (4-6 years relevant)
Management
I've had experience in managing 5-10 people
Skills
Penetration Test
Threat Hunting
Azure Sentinel
SIEM
Microsoft defender for endpont
Microsoft defender for Cloud
Microsoft defender for o365
Detection And Analysis Of Cyber Attacks
Reverse Engineering
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
資安威脅分析師、滲透測試工程師
Job types
Full-time
Locations
台灣台北
Remote
Interested in working remotely
Freelance
Educations
School
國防大學中正理工學院
Major
資訊工程學系
Print

林煌錡

Cyber Security Analyst | Penetration Tester

  Taipei Metropolitan Area, Taiwan

[email protected]

  • 在資訊安全領域累積了7年的實務經驗,並在程式撰寫、滲透測試及資安事件調查等領域持續提升自身能力
  • 針對網站、內部網路、IOT及零信任產品等滲透測試方面具有經驗
  • 熟悉微軟安全產品,擅長部署、維護、威脅狩獵與防護規則撰寫,以確保企業防禦機制完備
  • 在Tibame教育平台擔任滲透測試課程講師

學歷

2012 - 2016

國防大學中正理工學院

資訊工程學系

資格認證

Offensive Security


  • Offensive Security Certified Professional (OSCP)

EC-Council


  • Certified Incident Handler(ECIH)
  • Certified Threat Intelligence Analyst(CTIA)
  • Certified Ethical Hacker(CEH)

Microsoft


  • Microsoft Certified: Security Operations Analyst Associate
  • Microsoft 365 Certified: Security Administrator Associate
  • Microsoft Certified: Azure Security Engineer Associate
  • Microsoft Certified: Azure Administrator Associate
  • Microsoft Certified: Azure Solutions Architect Expert

技能

Penetration test


  • 網頁滲透測試
  • 內網滲透測試
  • 產品測試
  • 漏洞環境重現


Blue Team


  • 監控工具整合與開發
  • 資安事件肇因調查

Programming


  • Golang
  • Python
  • C++
  • 具有物件導向大型專案開發經驗

工作經歷


Cyber Security Analyst

iTop Digital Technology Co., Ltd.

十二月 2021 - Present
Taipei, Taiwan

Cloud&Security

  1. 協助客戶執行微軟安全產品解決方案部署與整合,包括 Azure Sentinel、Microsoft Defender for Endpoint、Microsoft Defender for Identity及Azure Waf等產品,具體成果如下:
    • 協助金融、半導體、電商等大型跨國企業及大型國營企業等數十個單位微軟安全產品部署
  2. 執行MDR服務,根據 Azure 安全產品為客戶進行事件調查,項目包括為誤報告警提供緩解計劃、提供風險諮詢及協助調查,具體成果如下:
    • 完整分析多個Magniber勒索軟體類型執行流程及肇因
    • 為大型跨國企業進行資安事件調查,利用AD防護軟體及EDR軟體釐清內部橫向攻擊來源
    • 釐清多次雙因子認證釣魚攻擊肇因,包含利用外部短網址、Web漏洞及C2等多項手法,並協助通報知名國外網域遭跳板利用情況
  3. 協助多個企業部署並導入Azure WAF安全產品,具體成果如下
    • 利用Azure Sentinel SOAR功能整合Alien Vault等威脅情資平台,自動阻擋惡意IP來源訪問。
    • 撰寫完整Azure Waf導入流程與教學,包含部署、流量監控、Log分析與誤報除錯及規則調整等
    • 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑

Penetration Testing

  1. 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下:
    • 模擬易受攻擊的企業網路環境,包含企業常見DMZ及Intranet網路架構建置。
      建置以Windows環境為主的漏洞模擬環境,包含以下漏洞項目Kentico 12(CVE-2019-10068)、Sharepoint(CVE-2021-34520)、本機提權漏洞(PrintSpoofer)、AD攻擊(pass-the-hash、pass-the-ticket、kerberos delegation)、Exchange Server(Mail enumeration)
  2. 執行多個滲透測試專案,客戶包含產品測試(虛擬貨幣、零信任)、電商品牌及公部門等單位,執行成果如下:
    • 獨立撰寫多份英文滲透測試報告(包含產品測試)
      - 發掘已知或未知弱點包含遠端代碼執行、越權存取(IDOR)、任意檔案上傳等多項漏洞






Lecture Experience

  1. 滲透測試教育訓練
  • 在知名的線上平台 "Tibame" 擔任滲透測試講師。
  • 台灣學術網路中心網路安全中心(TACCST)擔任滲透測試講師,獨立建置未有公開漏洞腳本靶機
    • Wordpress:CVE-2023-23488(SQL injection)、CVE-2023-3460(Privesc)
    • PyroCMS:CVE-2023-29689(SSTI)

2. 紅藍隊訓練

  • 國網中心APT攻擊偵測與防護課程,獨立建置紅藍隊偵測模擬環境
    • 模擬真實MFA釣魚攻擊場警,運用Wordpress近期漏洞包裝自建釣魚網址
    • 利用GitLab docker與Owasp modsecurity Waf模擬CVE攻擊偵測

資訊網路官

資通電軍網路戰聯隊

七月 2016 - 十二月 2022
Taipei, Taiwan

1. 領導紅隊組織並組織對多個政府部門的紅隊評估項目
2. 收集威脅情報,包括可行的PoCs、相關工具和網路攻擊趨勢
3. 建立實驗室環境以模擬易受攻擊的系統,並在後期利用階段進行進一步攻擊的研究
4. 設計軍事演習與比賽的系統
5. 參與針對政府單位的多個滲透測試項目

專案


MCDX Competition System

針對Kill of Hill類型的資安競賽所設計的計分系統,可針對紅隊取得機器權限及藍隊修補漏洞動態計分


Gitlab with Waf

針對Gitlab的漏洞CVE-2021-22205的攻擊情境,整合開源網頁式防火牆ModSecurity

Resume
Profile

林煌錡

Cyber Security Analyst | Penetration Tester

  Taipei Metropolitan Area, Taiwan

[email protected]

  • 在資訊安全領域累積了7年的實務經驗,並在程式撰寫、滲透測試及資安事件調查等領域持續提升自身能力
  • 針對網站、內部網路、IOT及零信任產品等滲透測試方面具有經驗
  • 熟悉微軟安全產品,擅長部署、維護、威脅狩獵與防護規則撰寫,以確保企業防禦機制完備
  • 在Tibame教育平台擔任滲透測試課程講師

學歷

2012 - 2016

國防大學中正理工學院

資訊工程學系

資格認證

Offensive Security


  • Offensive Security Certified Professional (OSCP)

EC-Council


  • Certified Incident Handler(ECIH)
  • Certified Threat Intelligence Analyst(CTIA)
  • Certified Ethical Hacker(CEH)

Microsoft


  • Microsoft Certified: Security Operations Analyst Associate
  • Microsoft 365 Certified: Security Administrator Associate
  • Microsoft Certified: Azure Security Engineer Associate
  • Microsoft Certified: Azure Administrator Associate
  • Microsoft Certified: Azure Solutions Architect Expert

技能

Penetration test


  • 網頁滲透測試
  • 內網滲透測試
  • 產品測試
  • 漏洞環境重現


Blue Team


  • 監控工具整合與開發
  • 資安事件肇因調查

Programming


  • Golang
  • Python
  • C++
  • 具有物件導向大型專案開發經驗

工作經歷


Cyber Security Analyst

iTop Digital Technology Co., Ltd.

十二月 2021 - Present
Taipei, Taiwan

Cloud&Security

  1. 協助客戶執行微軟安全產品解決方案部署與整合,包括 Azure Sentinel、Microsoft Defender for Endpoint、Microsoft Defender for Identity及Azure Waf等產品,具體成果如下:
    • 協助金融、半導體、電商等大型跨國企業及大型國營企業等數十個單位微軟安全產品部署
  2. 執行MDR服務,根據 Azure 安全產品為客戶進行事件調查,項目包括為誤報告警提供緩解計劃、提供風險諮詢及協助調查,具體成果如下:
    • 完整分析多個Magniber勒索軟體類型執行流程及肇因
    • 為大型跨國企業進行資安事件調查,利用AD防護軟體及EDR軟體釐清內部橫向攻擊來源
    • 釐清多次雙因子認證釣魚攻擊肇因,包含利用外部短網址、Web漏洞及C2等多項手法,並協助通報知名國外網域遭跳板利用情況
  3. 協助多個企業部署並導入Azure WAF安全產品,具體成果如下
    • 利用Azure Sentinel SOAR功能整合Alien Vault等威脅情資平台,自動阻擋惡意IP來源訪問。
    • 撰寫完整Azure Waf導入流程與教學,包含部署、流量監控、Log分析與誤報除錯及規則調整等
    • 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑

Penetration Testing

  1. 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下:
    • 模擬易受攻擊的企業網路環境,包含企業常見DMZ及Intranet網路架構建置。
      建置以Windows環境為主的漏洞模擬環境,包含以下漏洞項目Kentico 12(CVE-2019-10068)、Sharepoint(CVE-2021-34520)、本機提權漏洞(PrintSpoofer)、AD攻擊(pass-the-hash、pass-the-ticket、kerberos delegation)、Exchange Server(Mail enumeration)
  2. 執行多個滲透測試專案,客戶包含產品測試(虛擬貨幣、零信任)、電商品牌及公部門等單位,執行成果如下:
    • 獨立撰寫多份英文滲透測試報告(包含產品測試)
      - 發掘已知或未知弱點包含遠端代碼執行、越權存取(IDOR)、任意檔案上傳等多項漏洞






Lecture Experience

  1. 滲透測試教育訓練
  • 在知名的線上平台 "Tibame" 擔任滲透測試講師。
  • 台灣學術網路中心網路安全中心(TACCST)擔任滲透測試講師,獨立建置未有公開漏洞腳本靶機
    • Wordpress:CVE-2023-23488(SQL injection)、CVE-2023-3460(Privesc)
    • PyroCMS:CVE-2023-29689(SSTI)

2. 紅藍隊訓練

  • 國網中心APT攻擊偵測與防護課程,獨立建置紅藍隊偵測模擬環境
    • 模擬真實MFA釣魚攻擊場警,運用Wordpress近期漏洞包裝自建釣魚網址
    • 利用GitLab docker與Owasp modsecurity Waf模擬CVE攻擊偵測

資訊網路官

資通電軍網路戰聯隊

七月 2016 - 十二月 2022
Taipei, Taiwan

1. 領導紅隊組織並組織對多個政府部門的紅隊評估項目
2. 收集威脅情報,包括可行的PoCs、相關工具和網路攻擊趨勢
3. 建立實驗室環境以模擬易受攻擊的系統,並在後期利用階段進行進一步攻擊的研究
4. 設計軍事演習與比賽的系統
5. 參與針對政府單位的多個滲透測試項目

專案


MCDX Competition System

針對Kill of Hill類型的資安競賽所設計的計分系統,可針對紅隊取得機器權限及藍隊修補漏洞動態計分


Gitlab with Waf

針對Gitlab的漏洞CVE-2021-22205的攻擊情境,整合開源網頁式防火牆ModSecurity