CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of Ethan Chiou.
Avatar of Ethan Chiou.
Past
Software Project Manager @Askey Computer Corp.(Asus Group), Taiwan,
2020 ~ 2023
Project Manager、Software Project Manager、Product Manager
Within one month
issues. ‧ Developing MicroSoft Windows Embedded Standard 7/2009 prebuilt Images on VIA System products. Software Engineer • Sine Tech 三月七月 2008 Microsoft Windows CE programmer Project Engineer • Foundation of Taiwan Industry Service 七月五月 2006 Project management 學歷Tamkang University Water Resources and Environmental EngineeringFeng Chia University Automatic Control EngineeringNational Pingtung Senior High School Field of study 技能 Poject Management Skill Project Management tools: JIRA, Confluence, MS Project Embedded System Microsoft Embedded OS building, deploying Python Shell Scripting / Bash 語言 Chinese — 母語或雙語 English — 中階
Embedded System
Microsoft Embedded
Python
Unemployed
Ready to interview
Full-time / Interested in working remotely
10-15 years
Tamkang University
Water Resources and Environmental Engineering
Avatar of the user.
IT Manager / Support Engineer
More than one year
Word
Excel
it engineer
Ready to interview
Interested in working remotely
6-10 years
ISEP
Civil Engineering
Avatar of Wai Lee.
Avatar of Wai Lee.
攝影師 @SANSUI 山水家電
2023 ~ Present
專業攝影師
Within one month
對照比較的閱讀模式,期望讀者能從書中獲得對中國陸軍軍服百年來的演變有初步的認識。 軟體技能 | Computer Skills 文書處理軟體 Microsoft Word Microsoft Powerpont Microsoft Windows 7 Microsoft Windows 10 影像編修軟體 Adobe Lightroom 2020 Adobe Photoshop 2020 set.a.light 3D STUDIO 影音剪輯軟體 Adobe Premiere Pro Adobe After Effects 工作經歷 山水家電 產
word
english
windows
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
臺中科技大學
商業設計系
Avatar of Jason Wang.
Avatar of Jason Wang.
Past
Account Manager @Arrow Electronics
2022 ~ 2023
業務
Within one month
Experience AugSepAccount Manager Arrow Electronics Responsible for key account management. ● Promote the Arrow's product line to customers. ● Maintain a good relationship with customers. ● Demand creation of new business opportunities. ● Management inventory for customer demand. AugAugSales Manager Chander Electronics CorpResponsible for Microsoft's product line revenue grew. ● Promote Microsoft Windows embedded system. ● Maintain customers and maintain a good relationship with customers. ● Develop creative and new business ideas for Microsoft Azure. ● Customize smart/IoT solutions for customer requirements. DecJanAccount Manager Avnet Dedicated
word
powerpoint
excel
Unemployed
Open to opportunities
Full-time / Interested in working remotely
6-10 years
China University of Science and Technology
Department of Information Engineering
Avatar of Martin Myburgh.
Avatar of Martin Myburgh.
Cloud Engineer @Stiki Cloud
2022 ~ Present
Devops Engineer / Cloud Engineer
Within two months
could leverage Microsoft's state-of-the-art technology and resources to build and deliver innovative solutions to my clients. Additionally, the program offered me access to a dynamic community of like-minded entrepreneurs, facilitating networking and collaboration with startups across South Africa and beyond. Participating in the Microsoft Startup Program has been instrumental in driving the success of my new enterprise, as it has given me the support and resources necessary to accelerate growth and provide value to my clients. My typical workday comprises testing, planning, and executing Microsoft Windows 365 cloud pc roll-outs and
Facilitation
Rapid Solution Deployment Framework
Object Oriented Programing
Employed
Full-time / Interested in working remotely
More than 15 years
University of Johannesburg
Certificate in C# from International School for Scientific Computing
Avatar of Jaka Hariyono.
Avatar of Jaka Hariyono.
Network Engineer @PT Grab Teknologi Indonesia
2023 ~ 2023
Senior IT Support Engineer
Within two months
Jaka Hariyono Like to meet people, hard worker, can work with team, self motivated, like face challenge, dedicated and do the best for company, independent and with good communication and interpersonal skills. Marital Status : Married Address : JL. H. Jamat, GG Rais RT01/04 No.131, Buaran,Serpong, Tangerang Selatan Nationality : Indonesia Religion : Islam Phone / Mobile :Email :[email protected] PROFESSIONAL COURSE - MEI 2023 CCNAIDN.ID) TECHNICAL SKILLS - OS, Cloud, Project management tools : Windows 10, Mac OS, Microsoft Windows Server 2012 R2, Linux (CentOS, Ubuntu), Jira, Confluence, VMware 6.0 andIAM
Troubleshoot
Attendance Management
Windows Server 2012
Full-time / Remote Only
4-6 years
University of Budi Luhur
Information Systems
Avatar of the user.
Avatar of the user.
System Infrastructure Team Leader @Infosoft Systems
2019 ~ Present
System Infrastructure Team Leader
Within one year
Microsoft Windows
Active Directory
VMware VSphere
Full-time / Interested in working remotely
6-10 years
College
AAB-Computer Systems Networking and Telecommunications
Avatar of 蕭匹稀.
Avatar of 蕭匹稀.
系統網路 @瑞興銀行
2019 ~ Present
資訊工程師
Within six months
硬體維護。 ASP網頁撰寫 MS SQL管理 基本網路排除 軟硬體維護 其他經歷 2016年 中壢網工班207期畢業 技能 網路 Cisco Forti juniper PA CheckPoint 系統 Microsoft Windows Microsoft Windows Server Hadoop Linux MAC OS DB MS SQL 程式 C++ Java html ASP BAT 虛擬化 vsphere hyper-v 工具 Wireshark Nessus SSLLAB VirusTotal 證照 VCP SCJP CCNA CCNP E-soft SIP ECSA 丙級電腦軟體應
SCJP
CCNA
CCNP
Employed
Full-time / Not interested in working remotely
6-10 years
大漢技術學院
資訊工程
Avatar of Patrick Sandrin, Tchatchoua Mbada.
Avatar of Patrick Sandrin, Tchatchoua Mbada.
SQL Server Database Administrator & Linux Systems Administrator @OAG Analytics
2019 ~ Present
SQL Server Database Administrator & Linux Systems Administrator
More than one year
Patrick Sandrin, Tchatchoua Mbada DevOps Engineer & Site reliability engineer & AWS Engineer & Linux Systems Administrator & SQL Database Administrator Houston, TX, [email protected] Experienced IT professional working for almost 10 years in the IT field. My knowledge and experience include: - SQL Database administrator (DBA) with about 10 years of production support experience in designing, testing and supporting next-generation database solutions in SQL Server environments (SQL server installation, implementation & migration - performance running & capacity monitoring - backup & recovery - failover cluster & always ON - Database maintenance - ETL - SSRS - SSAS - SSIS) - Linux Systems Administrator with about 6 years of experience in troubleshooting network
Cooperative
Mirroring
Troubleshooting
Full-time / Interested in working remotely
6-10 years
Ankara University
Bachelor of Science, Computer Science
Avatar of the user.
Avatar of the user.
Technical Solutions Architect @Coretronic Intelligent Cloud Service
2018 ~ Present
後端工程師/系統架構師
Within one month
ASP.NET Core
Angular
AngularJS
Employed
Full-time / Interested in working remotely
10-15 years
National Chiayi University
Computer Science & Information Engineering Emphasizing on Knowledge and Information

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.