CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
Past
博士後研究員 @洛桑大學神經發育疾病實驗室
2023 ~ 2023
Data Scientist, Data Analyst, Machine Learning Engineer
Within one month
Data Science
Data Analysis
Machine Learning
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
洛桑聯邦理工學院(EPFL)
神經科學
Avatar of the user.
Avatar of the user.
Past
Career transition @Career Break
2024 ~ 2024
NLP Engineer / Data Scientist / Machine Learning Engineer
Within one month
Python
SQL
NLP
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
National Chengchi University
資訊科學系
Avatar of 邱義塵.
Avatar of 邱義塵.
Past
Data Engineer @Rooit Inc. (XO App)
2023 ~ 2023
AI工程師、機器學習工程師、深度學習工程師、資料科學家、Machine Learning Engineer、Deep Learning Engineer、Data Scientist
Within one month
邱義塵 於獨角獸多媒體設計有限公司擔任 遊戲測試工程師一職 建立公司測試團隊的測試流程和撰寫自動化測試程式 SDET、AI工程師、機器學習工程師、深度學習工程師、資料科學家、Machine Learning Engineer、Deep Learning Engineer、Data Scientist 城市,TW [email protected] 工作經歷 獨角獸多媒體
Python
Data Analysis
Data Science
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
中國醫藥大學(China Medical University)
臨床醫學研究所
Avatar of 潘揚燊.
Avatar of 潘揚燊.
智慧製造全端開發工程師 @聯華電子股份有限公司
2022 ~ Present
AI工程師、機器學習工程師、深度學習工程師、影像演算法工程師、資料科學家、Ai Application Engineer,Machine Learning Engineer,Deep Learning Engineer,Data Scientist
Within one month
潘揚燊 ㄕㄣ Shen Pan Kaohsiung City,Taiwan •  [email protected] 希望職務:人工智慧、機器視覺應用開發工程師 現任 : 聯華電子 RPA 平台全端開發工程師 您好,我是潘揚燊,目前任職於 聯華電子 , 擔任 智慧製造 全端開發工程師 , 畢業於元智大學工業工程與管理學系研
Python
Qt
Git
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
元智大學 Yuan Ze University
工業工程與管理學系所
Avatar of the user.
Avatar of the user.
Senior engineer @Chicony Electronics Co, Ltd.
2018 ~ Present
全端工程師、後端工程師、前端工程師、軟體專案主管、AI工程師、機器學習工程師、深度學習工程師、資料科學家、Machine Learning Engineer、Deep Learning Engineer、Data Scientist
Within one month
Python
C
C++
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Taiwan Ocean University
Computer science and engineering
Avatar of Patrick Hsu.
Avatar of Patrick Hsu.
Algorithm Research & Development @適着三維科技股份有限公司 TG3D Studio Inc.
2021 ~ Present
Software Engineer
Within one month
Patrick Hsu AI Research & Development As a seasoned AI engineer with six years of experience, I specialize in computer vision, 3D body model reconstruction, generative AI, and possessing some knowledge in natural language processing (NLP). | New Taipei City, [email protected] Work Experience (6 years) Algorithm Research & Design• TG3D Studio MayPresent A skilled engineer specialized in computer vision and generative AI with experience in developing and training AI models for digital fashion applications. Body AI: Virtual Try On Integrated cutting-edge technologies such as Stable Diffusion, ControlNet, and Prompt Engineering to create a sophisticated system for
Python
AI & Machine Learning
Image Processing
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
國立台灣大學
生物產業機電工程所
Avatar of 王文祥.
Avatar of 王文祥.
經理 @鴻博資訊有限公司
2015 ~ Present
軟體工程師、電玩程式設計師、後端工程師、APP開發工程師、演算法開發工程師
Within one month
technologies such as OpenCV, Scikit-Image, scikit-learn, NumPy, Matplotlib, PyQt5, etc., to implement various functionalities. Additionally, I possess the ability to develop mobile applications using Django and React Native. I am proficient in using testing frameworks, GitHub for version control, and Docker for deployment. . Machine Learning and Deep Learning Here is a summary of the relevant technologies in the field of machine learning that I have researched and become familiar with over the past year: Numpy (Numerical Computing Library) : Numpy is one of the core libraries for numerical computing in Python. It provides
Python
AOI
MES
Employed
Ready to interview
Full-time / Remote Only
10-15 years
崑工科技大學
電子工程
Avatar of 陳郁夫.
Avatar of 陳郁夫.
Senior Software Engineer & Feature Product Manager @聯發科
2022 ~ Present
資深軟體工程師
Within one month
. I'm responsible for software architecture, development, and design in the multi-camera domain, with a primary focus on cinematic mode and open-platform-related development and planning. During my time pursuing a Master's degree in Information Management at National Chiao Tung University, I delved into deep learning and its applications in finance. My research culminated in a thesis on multi-modal deep learning for semantic models in stock trading strategies. Throughout my graduate studies, I actively participated in various competitions and received accolades for my contributions." 現任職於聯發科
C++
Python
Machine Learning
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
國立師範大學附屬高級中學
Avatar of 张云.
Avatar of 张云.
Past
Senior Software Engineer @上海赛厨网络科技有限公司
2016 ~ 2024
React Native Mobile App Developer
Within one month
张云(Cloud Zhang) Senior Software Engineer | React Native | Android - 7 years of development experience, including 4 years in Android development, 4 years in React Native app development, and 2 years in React web development - Fast-learning new technologies, quickly diving into the project Shanghai, China | [email protected] |Experiences Senior Software Engineer • SIDECHEF INC. JanuaryJanuaryReact Native App development and performance optimization - Web applications development - Android SDK development - Integrate third-party SDK for both App & Web - Machine Learning development on ETA model written in Python Software Engineer • SIDECHEF INC. AprilJanuaryCollaborated with team to migrate Android/
React Native Web
React Native App
TypeScript and ReactJS
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
赣南师范大学
计算机科学与技术
Avatar of Shammi HSIEH.
Avatar of Shammi HSIEH.
資訊人員 @新北市淡水區公所
2023 ~ Present
AI工程師、機器學習工程師、深度學習工程師、資料科學家、Machine Learning Engineer、Deep Learning Engineer、Data Scientist
Within one month
謝慧珊 目前就職於公家機關擔任資訊人員,熱愛閱讀與寫作, 即將於致理科技大學進修商務智慧與創新科技研究所碩士班, 研究範圍為AI創新科技領域。 個性情感充沛並且喜歡觀察人群與反思,勇於接受挑戰。 座右銘: 樂觀積極,感恩惜福 www.shammixxd159
office
Python
WordPress
Employed
Open to opportunities
Full-time / Remote Only
10-15 years
致理科技大學
資訊管理系

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.