CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of 張鴻霖.
Avatar of 張鴻霖.
Front-End Developer @Storipress
2022 ~ Present
網頁前端工程師
Within one month
HUNG-LIN CHANG Taipei City, Taiwan Bachelor, Computer Science and Information Engineering, National Chung Cheng UniversityEXPERIENCE Front-End Developer • Storipress MarPresent 1. Contributed to Karbon and vue-advertising for product utilization, enabling users to customize editor components and integrate paid advertisements. 2. Developed editor features (e.g., user mention, gallery, rich media) with Tiptap and ProseMirror, enhancing user engagement rate 3. Enabled real-time article content sync using Tiptap collaboration and IndexedDB eliminating any sync latency 4. Integrated OpenAI for article content generation, empowering users to generate tailored content based on their needs
JavaScript
React.js
Ant Design
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
國立中正大學
資訊工程學系
Avatar of 范思良.
Avatar of 范思良.
資深主任工程師 @長青資訊
2017 ~ Present
資深工程師
Within one month
范思良 Edward / Senior Backend Engineer Over 7 years of experience Email: [email protected] | Phone:| Location: Taiwan National Chin-Yi University of Technology - Department of Electronic Engineering and Computer Science (Information Engineering) Graduated inAbout Me I am a proactive and responsible individual with a strong commitment to learning and adopting better practices in my work. My passion for solving problems is not only driven by a profound sense of accomplishment but also by an eagerness to assist others in overcoming their challenges. This enthusiasm for problem-solving fuels my focus and dedication to
golang
MySQL
Docker
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
勤益科技大學
軟體工程
Avatar of the user.
Avatar of the user.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ Present
資深程式設計師
Within one month
Android
Windows
Linux
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of ChenHuei Huang.
Avatar of ChenHuei Huang.
BIOS Engineer @仁寶
2019 ~ Present
資深韌體工程師
Within one month
Lake: DELL XPS, DELLPrecision 5550 · Tiger Lake: DELL XPS, DELLPrecision 5560 · Alder lake: DELL XPS, DELLPrecision 5570 · Raptor Lake: DELL XPSQualcomm: · SC8380: DELL XPSTest Engineer • King Yuan Electronics, Inc. JulyMarchIC FT test environment settings 2. Product problem analysis 3. Test yield maintenance 4. Customer product development engineering assistance Responsible customers: 1. MediaTek Inc. 2. EcoNet Inc. Education National Quemoy University Department of Computer Science and Information Engineering 1. Graduated second in the department. 2. Special Research: Software-Defined Networking(SDNSkills C C++ PowerPoint x86 BIOS/coreboot
C
C++
PowerPoint
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
國立金門大學
資訊
Avatar of the user.
Avatar of the user.
Past
資深工程師 @Velodash Inc.
2019 ~ 2023
Android / Flutter / Backend
Within one month
Android
kotlin
JAVA
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
國立成功大學
資訊工程學系
Avatar of Leo Wu.
Avatar of Leo Wu.
Senior Front-End Engineer @TonFura
2023 ~ Present
Front-End engineer / Full-stack engineer
Within one month
吳酈哲 Leo Wu Software Engineer [email protected] Taipei, Taiwan Summary Experienced Front-End developer with over five years of expertise in the React ecosystem Successfully led Front-End teams for more than three years Proficient in JavaScript, HTML, and CSS, with a focus on programmatic ads for over four years Skilled in ensuring Cross-Browser Compatibility and delivering high-quality user experiences Proven ability to collaborate effectively with non-technical partners to achieve project objectives Skills Programming languages: JavaScript, TypeScript Front-End Frameworks and Libraries: React, Next.js, Ant Design, Material UI, Jest DevOps
JavaScript
HTML5
CSS3
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Taiwan University
Computer Science and Information Engineering
Avatar of 胡庭愷.
Avatar of 胡庭愷.
Past
Frontend Engineer @IT Project Co., Ltd.
2020 ~ 2024
Software Programmer
Within one month
胡庭愷 畢業於中正大學資訊工程學系。 前端熟悉 npm、React,後端熟悉 Java、Spring,資料庫如 PostgreSQL、MongoDB、Redis 亦有涉獵,其他也有使用如 Git、Docker 輔助開發。 目前開發經驗約五年,喜愛寫程式,對於開發技術充滿熱忱。  軟體工程師 電子郵件: [email protected] 經歷 前端工程師, 艾帝浦
Java
Spring MVC
jQuery
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
National Chung Cheng University
Computer Science and Information Engineering
Avatar of PoHung Chen.
Avatar of PoHung Chen.
Past
Software developer @Freelance Software Development
2019 ~ Present
Within one month
PoHung Chen Computer Software Professional Taipei City, Taiwan I am Mio, an iOS software engineer, proficient in developing native applications using Swift and Objective-C. Ability to develop applications with performance, reliability and maintainability Also I have App publish on AppStore https://apps.apple.com/tw/app/%E5%92%96%E5%95%A1%E7%99%BB%E8%A8%98%E7%B0%BF/idWORK EXPERIANCE Software Developer • Freelance Software DevelopmentPresent Software development for outsourcing case Complete 15+ projects of apps 1.Technology assessment • Difficult breakthrough • Architecture design • Choosing and integrating
Objective-C
Swift
Android Studio
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Cheng Kung University (NCKU), Taiwan 國立成功大學
Computer Science and Information Engineering
Avatar of the user.
Avatar of the user.
Past
Senior iOS Engineer @Noodoe 拓連科技股份有限公司
2022 ~ Present
iOS Developer
Within one month
Java
JavaScript
Objective-C/Swift
Unemployed
Ready to interview
Full-time / Interested in working remotely
10-15 years
Fju Jen Catholic University
Computer Science and Information Engineering
Avatar of Alex Lee.
Avatar of Alex Lee.
IT Infrastructure @暫時不提供
2022 ~ Present
IT Infrastructure
Within one month
博有限公司 NovemberJune 2022 From basic network management system, for instance : Fortigate, it's route and Vpn, to establish web servers, pre-work settings, automation of settings, optimize the structure of server, establish the monitors of servers, Microsoft Azure's operations and Azure Cli scripting 。 Site Reliability Engineering • 中佑資訊 JuneNovember 2019 Backend Site Reliability Engineering, maintaining and developing Nginx, Php, Mysql, Symfony Framework. When bugs detected, find where the bugs are , fix them and improve the system 。 EducationTunghai University(THU) Computer Science Information Engineering Skills Aws & Gcp Resources Kubernetes Terraform CI/CD
Python
Linux
Grafana
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
東海大學 Tunghai University
Computer Science Information Engineering

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.