CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ Present
資深程式設計師
Within one month
Android
Windows
Linux
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of the user.
Avatar of the user.
Cyber Security Analyst @iTop Digital Technology Co., Ltd.
2021 ~ Present
資安威脅分析師、滲透測試工程師
Within one month
Penetration Test
Threat Hunting
Azure Sentinel
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國防大學中正理工學院
資訊工程學系
Avatar of 羅大偉.
Avatar of 羅大偉.
Product Developer @群暉科技 Synology Inc.
2023 ~ Present
Senior Android Engineer
Within one month
such as AdMob, Max, MV...) to implement app monetization. * Familiar with using Firebase for analysis, A/B testing, and remote configuration. * Skilled in using Retrofit to create a type-safe HTTP client. * Experienced with making Python scripts and writing Smali code for APK reverse engineering. * Successfully supervised team members to fulfill diverse development needs. * Tracked app data to verify requirements, optimize the app, and achieve my OKR goals.  New Taipei City,TW [email protected] 工作經歷 Synology ,- Now Android BeeDrive : BeeDrive 是一個輕
Android
Java
Smali
Employed
Open to opportunities
Full-time / Interested in working remotely
6-10 years
淡江大學
資訊工程
Avatar of chen chopper.
Avatar of chen chopper.
助理工程師 @行政法人國家資通安全研究院
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
陳燕葶 Chopper Chen 來自台南,個性活潑樂觀富創造力,樂於學習新知及勇於接受新的挑戰。西元2018年畢業於國防大學理工學院資訊工程學系,於國防部服務4年後,目前於財團法人國家實驗研究院服務,主要工作經歷包含程式開發、滲透測試、惡意程式
python語言
C
Assembly Language
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立臺北科技大學NTUT
自動化工程研究所
Avatar of Broccoli Huang 黃世豪.
Avatar of Broccoli Huang 黃世豪.
Sr. Android Developer @GoGoX
2023 ~ Present
Senior Android Engineer
Within one month
@gmail.com Skills Android Language Kotlin / Java Framework Jetpack / MediaBrowser / Leanback Test JUnit / Mockito / MockK / Espresso Platform Mobile / TV / Car / Wear / Chromecast DI Koin / Hilt / Dagger Library Retrofit / Coroutine / RxJava Persistence Room / SQLite Reverse Engineering jadx / repack / resign Android-based ROM Root / Flash ROM / Make AOSP Other Custom View JNI / NFC / IAB Lottie / Floating Window Software Engineering Clean Code / Architecture MVVM / MVP / MVC Design Pattern SOLID Workflow & Tools Aglie: Scrum / Kanban GitHub
Android
JAVA
kotlin
Employed
Full-time / Interested in working remotely
6-10 years
National Formosa University (NFU)
Computer Science and Information Engineering
Avatar of Mohammed Mufti.
Avatar of Mohammed Mufti.
Past
Support Engineer (Developer support core) @ Microsoft India R & D Private Limited
2008 ~ 2011
Senior Member Of Technical Staff
Within three months
compiler intrinsic / openMP (C++) ( Intel architecture) for parallel and multicore programming. Possess strong technical acumen on OS internals. Have fair amount of knowledge on Rootkits and its internals. Well-versed with secure software development life cycle for application development. Have Special Interest in reverse engineering, security and OS instrumentations. Technical Stack : a. Windows File System internals and application programming to deal with File Systems. b. Windows Audio & Video programming (DirectShow, DirectX/Direct3D/DirectSound/Media Foundation). c. Windows Media Player SDK using C++
C
C++
STL
Unemployed
Full-time / Interested in working remotely
More than 15 years
Indira Gandhi National Open University(IGNOU)
Computer Science
Avatar of HazaratAli Kalyal.
Avatar of HazaratAli Kalyal.
Senior Consultant @Capgemini Technology Service India Pvt Ltd
2017 ~ Present
Senior Consultant / CAD/PD Analyst
More than one year
HazaratAli Kalyal I have competent professional experience with around 14+ Years in Project Management, CAD Support, CAD/PDM Implementation, PLM, Engineering Tool Evaluation, Training, MBD, IoT Platform applications, Product Design, Reverse Engineering, Mold Design, Currently working as a Project Manager/Technical Manager and supporting technically as well as people management  Senior Technical Specialist / CAD & PDM Analyst Bangalore, IN [email protected] Profile  Working as a Project Manager and leading CAD and Windchill Team , supporting global user community with 100+ CAD, CAE and multiple PLM application, which involves testing, tool evaluation, application Implementation, and
Product Design
product design and development
Creo Parametric
Employed
Full-time / Interested in working remotely
10-15 years
JRN Rajasthan Vidhyapeeth University University (Distance learning)
Mechanical Engineering
Avatar of Ma Sheng Hao.
Avatar of Ma Sheng Hao.
Senior Researcher @TXOne Networks, inc.
2021 ~ Present
Security Researcher
More than one year
Ma Sheng Hao Cyber Security Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware
C++
C
Assembly Language
Employed
Full-time / Interested in working remotely
6-10 years
National Taiwan University of Science and Technology
Computer Science
Avatar of 陳居億/Chu-I Chen.
Avatar of 陳居億/Chu-I Chen.
資訊網路官 @資通電軍網路戰聯隊
2016 ~ Present
資安工程師
Within one month
國參訪Blackhat的名額。此外利用工作之餘考取多項資安相關證照、參加資安課程、進修人工智慧專長,增加競爭力。 Skill Expertise Penetration Testing Network Security Reverse Engineering Programming Language C C++ Python Golang Assembly PHP Side Project Android Weather App 由kotlin編寫,使用中央氣象局氣象資料開放平台提供之資料,提醒氣溫與濕度狀況
C
C++
Python
Reputation Credits2
Employed
Full-time / Interested in working remotely
4-6 years
University of Michigan(Coursera)
Using Python to Access Web Data
Avatar of the user.
Avatar of the user.
R&D Manager @LIMOTEC
2017 ~ Present
Project/Product Development Manager
More than one year
SolidWorks
Project Management
Patent Analysis
Employed
Full-time / Interested in working remotely
10-15 years
National Cheng Kung University
MEMS

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Within one month
Cyber Security Analyst | Penetration Tester
Logo of iTop Digital Technology Co., Ltd..
iTop Digital Technology Co., Ltd.
2021 ~ Present
Taipei Metropolitan Area, Taiwan
Professional Background
Current status
Employed
Job Search Progress
Open to opportunities
Professions
Security Engineer
Fields of Employment
Cyber Security
Work experience
6-10 years work experience (4-6 years relevant)
Management
I've had experience in managing 5-10 people
Skills
Penetration Test
Threat Hunting
Azure Sentinel
SIEM
Microsoft defender for endpont
Microsoft defender for Cloud
Microsoft defender for o365
Detection And Analysis Of Cyber Attacks
Reverse Engineering
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
資安威脅分析師、滲透測試工程師
Job types
Full-time
Locations
台灣台北
Remote
Interested in working remotely
Freelance
Educations
School
國防大學中正理工學院
Major
資訊工程學系
Print

林煌錡

Cyber Security Analyst | Penetration Tester

  Taipei Metropolitan Area, Taiwan

[email protected]

  • 在資訊安全領域累積了7年的實務經驗,並在程式撰寫、滲透測試及資安事件調查等領域持續提升自身能力
  • 針對網站、內部網路、IOT及零信任產品等滲透測試方面具有經驗
  • 熟悉微軟安全產品,擅長部署、維護、威脅狩獵與防護規則撰寫,以確保企業防禦機制完備
  • 在Tibame教育平台擔任滲透測試課程講師

學歷

2012 - 2016

國防大學中正理工學院

資訊工程學系

資格認證

Offensive Security


  • Offensive Security Certified Professional (OSCP)

EC-Council


  • Certified Incident Handler(ECIH)
  • Certified Threat Intelligence Analyst(CTIA)
  • Certified Ethical Hacker(CEH)

Microsoft


  • Microsoft Certified: Security Operations Analyst Associate
  • Microsoft 365 Certified: Security Administrator Associate
  • Microsoft Certified: Azure Security Engineer Associate
  • Microsoft Certified: Azure Administrator Associate
  • Microsoft Certified: Azure Solutions Architect Expert

技能

Penetration test


  • 網頁滲透測試
  • 內網滲透測試
  • 產品測試
  • 漏洞環境重現


Blue Team


  • 監控工具整合與開發
  • 資安事件肇因調查

Programming


  • Golang
  • Python
  • C++
  • 具有物件導向大型專案開發經驗

工作經歷


Cyber Security Analyst

iTop Digital Technology Co., Ltd.

十二月 2021 - Present
Taipei, Taiwan

Cloud&Security

  1. 協助客戶執行微軟安全產品解決方案部署與整合,包括 Azure Sentinel、Microsoft Defender for Endpoint、Microsoft Defender for Identity及Azure Waf等產品,具體成果如下:
    • 協助金融、半導體、電商等大型跨國企業及大型國營企業等數十個單位微軟安全產品部署
  2. 執行MDR服務,根據 Azure 安全產品為客戶進行事件調查,項目包括為誤報告警提供緩解計劃、提供風險諮詢及協助調查,具體成果如下:
    • 完整分析多個Magniber勒索軟體類型執行流程及肇因
    • 為大型跨國企業進行資安事件調查,利用AD防護軟體及EDR軟體釐清內部橫向攻擊來源
    • 釐清多次雙因子認證釣魚攻擊肇因,包含利用外部短網址、Web漏洞及C2等多項手法,並協助通報知名國外網域遭跳板利用情況
  3. 協助多個企業部署並導入Azure WAF安全產品,具體成果如下
    • 利用Azure Sentinel SOAR功能整合Alien Vault等威脅情資平台,自動阻擋惡意IP來源訪問。
    • 撰寫完整Azure Waf導入流程與教學,包含部署、流量監控、Log分析與誤報除錯及規則調整等
    • 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑

Penetration Testing

  1. 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下:
    • 模擬易受攻擊的企業網路環境,包含企業常見DMZ及Intranet網路架構建置。
      建置以Windows環境為主的漏洞模擬環境,包含以下漏洞項目Kentico 12(CVE-2019-10068)、Sharepoint(CVE-2021-34520)、本機提權漏洞(PrintSpoofer)、AD攻擊(pass-the-hash、pass-the-ticket、kerberos delegation)、Exchange Server(Mail enumeration)
  2. 執行多個滲透測試專案,客戶包含產品測試(虛擬貨幣、零信任)、電商品牌及公部門等單位,執行成果如下:
    • 獨立撰寫多份英文滲透測試報告(包含產品測試)
      - 發掘已知或未知弱點包含遠端代碼執行、越權存取(IDOR)、任意檔案上傳等多項漏洞






Lecture Experience

  1. 滲透測試教育訓練
  • 在知名的線上平台 "Tibame" 擔任滲透測試講師。
  • 台灣學術網路中心網路安全中心(TACCST)擔任滲透測試講師,獨立建置未有公開漏洞腳本靶機
    • Wordpress:CVE-2023-23488(SQL injection)、CVE-2023-3460(Privesc)
    • PyroCMS:CVE-2023-29689(SSTI)

2. 紅藍隊訓練

  • 國網中心APT攻擊偵測與防護課程,獨立建置紅藍隊偵測模擬環境
    • 模擬真實MFA釣魚攻擊場警,運用Wordpress近期漏洞包裝自建釣魚網址
    • 利用GitLab docker與Owasp modsecurity Waf模擬CVE攻擊偵測

資訊網路官

資通電軍網路戰聯隊

七月 2016 - 十二月 2022
Taipei, Taiwan

1. 領導紅隊組織並組織對多個政府部門的紅隊評估項目
2. 收集威脅情報,包括可行的PoCs、相關工具和網路攻擊趨勢
3. 建立實驗室環境以模擬易受攻擊的系統,並在後期利用階段進行進一步攻擊的研究
4. 設計軍事演習與比賽的系統
5. 參與針對政府單位的多個滲透測試項目

專案


MCDX Competition System

針對Kill of Hill類型的資安競賽所設計的計分系統,可針對紅隊取得機器權限及藍隊修補漏洞動態計分


Gitlab with Waf

針對Gitlab的漏洞CVE-2021-22205的攻擊情境,整合開源網頁式防火牆ModSecurity

Resume
Profile

林煌錡

Cyber Security Analyst | Penetration Tester

  Taipei Metropolitan Area, Taiwan

[email protected]

  • 在資訊安全領域累積了7年的實務經驗,並在程式撰寫、滲透測試及資安事件調查等領域持續提升自身能力
  • 針對網站、內部網路、IOT及零信任產品等滲透測試方面具有經驗
  • 熟悉微軟安全產品,擅長部署、維護、威脅狩獵與防護規則撰寫,以確保企業防禦機制完備
  • 在Tibame教育平台擔任滲透測試課程講師

學歷

2012 - 2016

國防大學中正理工學院

資訊工程學系

資格認證

Offensive Security


  • Offensive Security Certified Professional (OSCP)

EC-Council


  • Certified Incident Handler(ECIH)
  • Certified Threat Intelligence Analyst(CTIA)
  • Certified Ethical Hacker(CEH)

Microsoft


  • Microsoft Certified: Security Operations Analyst Associate
  • Microsoft 365 Certified: Security Administrator Associate
  • Microsoft Certified: Azure Security Engineer Associate
  • Microsoft Certified: Azure Administrator Associate
  • Microsoft Certified: Azure Solutions Architect Expert

技能

Penetration test


  • 網頁滲透測試
  • 內網滲透測試
  • 產品測試
  • 漏洞環境重現


Blue Team


  • 監控工具整合與開發
  • 資安事件肇因調查

Programming


  • Golang
  • Python
  • C++
  • 具有物件導向大型專案開發經驗

工作經歷


Cyber Security Analyst

iTop Digital Technology Co., Ltd.

十二月 2021 - Present
Taipei, Taiwan

Cloud&Security

  1. 協助客戶執行微軟安全產品解決方案部署與整合,包括 Azure Sentinel、Microsoft Defender for Endpoint、Microsoft Defender for Identity及Azure Waf等產品,具體成果如下:
    • 協助金融、半導體、電商等大型跨國企業及大型國營企業等數十個單位微軟安全產品部署
  2. 執行MDR服務,根據 Azure 安全產品為客戶進行事件調查,項目包括為誤報告警提供緩解計劃、提供風險諮詢及協助調查,具體成果如下:
    • 完整分析多個Magniber勒索軟體類型執行流程及肇因
    • 為大型跨國企業進行資安事件調查,利用AD防護軟體及EDR軟體釐清內部橫向攻擊來源
    • 釐清多次雙因子認證釣魚攻擊肇因,包含利用外部短網址、Web漏洞及C2等多項手法,並協助通報知名國外網域遭跳板利用情況
  3. 協助多個企業部署並導入Azure WAF安全產品,具體成果如下
    • 利用Azure Sentinel SOAR功能整合Alien Vault等威脅情資平台,自動阻擋惡意IP來源訪問。
    • 撰寫完整Azure Waf導入流程與教學,包含部署、流量監控、Log分析與誤報除錯及規則調整等
    • 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑

Penetration Testing

  1. 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下:
    • 模擬易受攻擊的企業網路環境,包含企業常見DMZ及Intranet網路架構建置。
      建置以Windows環境為主的漏洞模擬環境,包含以下漏洞項目Kentico 12(CVE-2019-10068)、Sharepoint(CVE-2021-34520)、本機提權漏洞(PrintSpoofer)、AD攻擊(pass-the-hash、pass-the-ticket、kerberos delegation)、Exchange Server(Mail enumeration)
  2. 執行多個滲透測試專案,客戶包含產品測試(虛擬貨幣、零信任)、電商品牌及公部門等單位,執行成果如下:
    • 獨立撰寫多份英文滲透測試報告(包含產品測試)
      - 發掘已知或未知弱點包含遠端代碼執行、越權存取(IDOR)、任意檔案上傳等多項漏洞






Lecture Experience

  1. 滲透測試教育訓練
  • 在知名的線上平台 "Tibame" 擔任滲透測試講師。
  • 台灣學術網路中心網路安全中心(TACCST)擔任滲透測試講師,獨立建置未有公開漏洞腳本靶機
    • Wordpress:CVE-2023-23488(SQL injection)、CVE-2023-3460(Privesc)
    • PyroCMS:CVE-2023-29689(SSTI)

2. 紅藍隊訓練

  • 國網中心APT攻擊偵測與防護課程,獨立建置紅藍隊偵測模擬環境
    • 模擬真實MFA釣魚攻擊場警,運用Wordpress近期漏洞包裝自建釣魚網址
    • 利用GitLab docker與Owasp modsecurity Waf模擬CVE攻擊偵測

資訊網路官

資通電軍網路戰聯隊

七月 2016 - 十二月 2022
Taipei, Taiwan

1. 領導紅隊組織並組織對多個政府部門的紅隊評估項目
2. 收集威脅情報,包括可行的PoCs、相關工具和網路攻擊趨勢
3. 建立實驗室環境以模擬易受攻擊的系統,並在後期利用階段進行進一步攻擊的研究
4. 設計軍事演習與比賽的系統
5. 參與針對政府單位的多個滲透測試項目

專案


MCDX Competition System

針對Kill of Hill類型的資安競賽所設計的計分系統,可針對紅隊取得機器權限及藍隊修補漏洞動態計分


Gitlab with Waf

針對Gitlab的漏洞CVE-2021-22205的攻擊情境,整合開源網頁式防火牆ModSecurity