CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of Chung David.
Avatar of Chung David.
Past
IoT software engineer @Upwork as a Freelancer
2022 ~ Present
CTO、Sr.Software Manager、Sr.Software Engineer
Within one month
Chung David 鍾昌興 CELL :SW RD PM軟體開發及專案經理 Taipei City, Taiwan 工作經歷 八月十月 2022 IoT software engineer Upwork as a Freelancer 負責台灣高鐵全省網關控制即時監控系統(基於Web VUE ReactJS & Springboot Java GUI的嵌入式系統設備)的更新。 熟悉的技術: a. 嵌入式Linux、Yocto專案、QT、Cmake、Docker b. MCU、Cortex M、Modbus、OPCUA c.
C programming Language
c++ and c#
Java software development
Unemployed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
國立中興大學
物理
Avatar of the user.
Avatar of the user.
工程師 @義隆電子
2016 ~ Present
工程師、副理
Within two months
C
python
Verilog
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
國立臺灣科技大學
電機系
Avatar of chen chopper.
Avatar of chen chopper.
助理工程師 @行政法人國家資通安全研究院
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
美國參訪Defcon國際資安研討會。 技能 Skills Programming C語言 / C++ Python VB Powershell Cyber Security 滲透測試 (KALI) Metasploit Burp Suite Nmap Hydra 惡意程式逆向分析 IDA pro Ghidra GDB x64-Debugger Dnspy 事件處理 威脅情資 封包分析 WiresharK Android APP逆向工程 Jadx 模糊測試 AFL++ Language Chinese English TOEIC 635 AI Scikit-learn Tensorflow Keras CNN RNN Attention Office Word PowerPoint Excel Other Photoshop PowerDirector
python語言
C
Assembly Language
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立臺北科技大學NTUT
自動化工程研究所
Avatar of Hsiang-Hua Liu.
Avatar of Hsiang-Hua Liu.
馬達設計工程師 @鑫元鴻實業股份有限公司
2022 ~ Present
工程師
Within one month
劉祥樺 (Hsiang-Hua Liu) Taichung City, Taiwan I am Hsiang-Hua Liu, born in 23 marchI graduated Master's degree at Feng Chia University. Have five years experience in Electric motor design job and software experience with Ansys Maxwell , MotorCad and AutoCad for simple 2D drawing. At master's degree class learn about AI implementation with Python, and some a lgorithm at optimization . At university, I learned about RF antenna Design, program language such as C and assembly language. And learned to use some software such as MATLAB , LabVIEW and HFSS. Experience Associate
ANSYS MAXWELL
AutoCad 2D
word
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
逢甲大學(Feng Chia University)
資訊電機工程碩士學位學程
Avatar of 呂學炘.
Avatar of 呂學炘.
Data Science @Alfred Labs.
2017 ~ Present
Within two months
System. Auto-alarm system. EDUCATION University of Taipei, BS, Computer Science, 2012 ~ 2017 Transferred from the Mathematics department to the Computer Science department. The graduation thesis focused on analyzing user preference for phrases on the message board PTT. Mathematics Number theory, Calculus, Linear algebra, Abstract algebra, Probability theory, and Statistics. Computer Science Database Systems, Introduction to Machine Learning, Introduction to Image Processing , Introduction to Data Mining , Discrete Mathematics, Java, Data Structures, Digital System Design, Operating Systems, Algorithms, Digital Circuit Laboratory, Computer Network, System Programming, Assembly Language, Computer Architecture, Formal Languages and Autom...
Python
R
SQL
4-6 years
University of Taipei
Computer Science
Avatar of Mason 林宥綱 (Yu-Kang, Lin).
Avatar of Mason 林宥綱 (Yu-Kang, Lin).
Test Development Team Leader and Scrum Master @Envotions (on-site Hewlett-Packard International)
2021 ~ Present
Software Engineer / Backend Engineer
Within three months
Mason 林宥綱 (Yu-Kang, Lin) I am a highly proactive test engineer and a fast learner. I always use my free time to enhance my abilities and share my knowledge with colleagues . I take personal responsibility for code quality and design automated test and release pipelines for my projects. I maintain a positive attitude and possess strong cross-team cooperation and communication skills, enabling me to complete tasks in a rapidly iterative work environment. I have demonstrated leadership skills, inspiring and motivating team members to create a positive and collaborative work environment. I
Python
Robot Framework
CICD
Employed
Not open to opportunities
Full-time / Interested in working remotely
6-10 years
Yuan Ze University
Electrical Engineering
Avatar of the user.
Avatar of the user.
CEO/Co-Founder @YouLink Holdings Inc
2019 ~ Present
engineer
Within six months
word
google drive
excel
Employed
Full-time / Interested in working remotely
10-15 years
University, BS in Electrical Engineering
Electrical Engineering, Computer Scinece
Avatar of 鄭裕豐.
Avatar of 鄭裕豐.
Past
Firmware Engineer @安勤科技股份有限公司
2017 ~ Present
Firmware Engineer, Firmware Developer, Embedded Software Engineer
Within one year
Skills Hardware Circuit Design / Layout Familiar with OrCAD / Allegro / Oscilloscope / Digital Multimeter Firmware Firmware Development Embedded Linux Development Familiar with STM / Atmel / Nordic / ESP32 / Linkit / Arduino / Holtek Familiar with Logic Analysis Software Software Development Familiar with C / C# Assembly / C++ / VB / Node.js / Python / Android Radio Frequency Design / Matching / Certification Familiar with VNA / SA /SG Familiar with Wi-Fi / Bluetooth / UWB Other RESTful API 3D Printer Agile / DevOps / Git Language Chinese English
RF Design
UWB
Bluetooth
Unemployed
Full-time / Interested in working remotely
4-6 years
明志科技大學
電子工程
Avatar of the user.
Avatar of the user.
演算法開發工程師 @亞迪電子
2020 ~ Present
AI 深度學習 軟體開發
More than one year
C++ and C
Assembly Language
Python
Employed
Not open to opportunities
Full-time / Interested in working remotely
6-10 years
國立台灣大學
物理研究所
Avatar of Ma Sheng Hao.
Offline
Avatar of Ma Sheng Hao.
Offline
Senior Researcher @TXOne Networks, inc.
2021 ~ Present
Security Researcher
More than one year
Ma Sheng Hao Cyber Security Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware
C++
C
Assembly Language
Employed
Full-time / Interested in working remotely
6-10 years
National Taiwan University of Science and Technology
Computer Science

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.