CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of mahdiyar anari.
Avatar of mahdiyar anari.
fullstack web developer @Iran artemia
2022 ~ Present
Frontend Developer
Within three months
mahdiyar anari Web developer Web Developer with 10 years of experience in web technologies, Linux and computer networks my personal portfolio : https://netdom.ir my Codepen profile : https://codepen.io/mahd1ar Tehran, Tehran Province, Iran https://netdom.ir Skills Tech Stack Node.js Typescript Vue.js Tailwind Nuxtjs Design Tools Illustrator Photoshop Figma Projects nikan-alumni website nikan-alumni.com tech stack: nuxt 2, tailwindcss, nginx, ubuntu, wordpress (headless) -> see screenshots here Carizanin.com - produces all kinds of bolts and nuts https://carizanin.
Server Infrastructure
Software Development
Windows Server 2012
Full-time
10-15 years
MikroTik
MTCNA
Avatar of the user.
Avatar of the user.
Senior software test engineer @資拓宏宇國際股份有限公司(International Integrated Systems, Inc.)
2022 ~ Present
Software Test Engineer, Software QA Engineer
Within one month
LTE
PTCRB
GCF
Employed
Ready to interview
Full-time / Interested in working remotely
10-15 years
Chung Hua University (CHU)
Transportation and Logistics Management
Avatar of the user.
Avatar of the user.
Past
Back End | Smart Contract Developer @Decent Reviews
2023 ~ 2023
Front-End / Back-End / Full Stack Web Developer
Within two months
Node.js / Express.js
MySQL Database
MongoDB / mongoose
Unemployed
Ready to interview
Full-time / Remote Only
6-10 years
Victoria University
Computer Science
Avatar of PoHung Chen.
Avatar of PoHung Chen.
Past
Software developer @Freelance Software Development
2019 ~ Present
Within one month
PoHung Chen Computer Software Professional Taipei City, Taiwan I am Mio, an iOS software engineer, proficient in developing native applications using Swift and Objective-C. Ability to develop applications with performance, reliability and maintainability Also I have App publish on AppStore https://apps.apple.com/tw/app/%E5%92%96%E5%95%A1%E7%99%BB%E8%A8%98%E7%B0%BF/idWORK EXPERIANCE Software Developer • Freelance Software DevelopmentPresent Software development for outsourcing case Complete 15+ projects of apps 1.Technology assessment • Difficult breakthrough • Architecture design • Choosing and integrating
Objective-C
Swift
Android Studio
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Cheng Kung University (NCKU), Taiwan 國立成功大學
Computer Science and Information Engineering
Avatar of Chun Liu (Phoe).
Software Engineer
Within one month
帳號管理系統以整合不同作業環境之使用者帳號,以及架設了網域名稱伺服器提供同學域名服務。另外,我積極參與了 Juniper Networks 與敝實驗室的產學合作計畫,作為 PI 帶領團隊完成了專案系統開發,並取得了顯著的成就。 我的碩士論文以「The Capacity Improvement of Forward
C
C++
Python
Studying
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立暨南國際大學(National Chi Nan University)
Computer Science and Information Engineering
Avatar of the user.
Avatar of the user.
Application Security Engineer @WOO Network
2022 ~ Present
information security engineer
Within three months
Security Operations
CISSP-Certified Information System Security Professional
Certified Information Security Manager
Employed
Open to opportunities
Full-time / Interested in working remotely
10-15 years
National Quemoy University
Computer Science and Information Engineering
Avatar of SUNAJUL NIZAM.
Avatar of SUNAJUL NIZAM.
SENIOR NETWORK ENGINEER @EXPRESS NETWORK
2021 ~ Present
IT support engineer,network enginner,system engineer
Within six months
identified potential issues. 4) Provided technical support to customers via phone or email. 5) Performed system maintenance to ensure optimal network performance. NETWORK ENGINEER • EXPRESS NETWORK DecemberNovember 2020 Installed, tested and configured CCTV systems in a variety of settings. Configured and maintained routers, switches, firewalls, wireless networks and other network devices. Installed, configured, upgraded and troubleshot hardware components such as servers, PCs and printers. Responded quickly to user requests for assistance with computer or network problems. Troubleshooted and resolved technical issues related to internet access. Configured, maintained and updated routers, switches and
Communication
Linux
Switches and Routers
Employed
Full-time / Not interested in working remotely
6-10 years
SITD
DIPLOMA IN ELECTRONICS AND COMMUNICATION
Avatar of Rogerio falcone.
Avatar of Rogerio falcone.
Senior Solidity Developer @Freelancer.com
2022 ~ Present
Senior Solidity Developer
Within two months
Demonstrated success developing and seamlessly executing smart contracts in complex DeFi and DEX structures. Recognized for maximizing performance by implementing appropriate project management through analysis of details to ensure quality control and an understanding of emerging technology. Expertise includes developing and auditing blockchain smart contracts with various Blockchain networks including Ethereum, Binance Smart Chain, Polygon, And Solana . Ethereum blockchain and Solidity programming. Solana and Rust programming. Work Experience Senior Smart Contract Developer • Freelancer.com (Full-time) FebruaryPresent - Development of vault smart contracts and unit tests, deployment scripts using Hardhat, Solidity, Ethers.js, Web3
Full-time / Remote Only
4-6 years
University of Ita
Bachelor's degree Computer Programming

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.