CakeResume Talent Search

Advanced filters
On
De 4 a 6 años
6-10 años
10-15 años
Más de 15 años
Avatar of Vu Nguyen Ngoc Quang.
Avatar of Vu Nguyen Ngoc Quang.
Past
Mobile App Developer @Apple Inc.
2014 ~ Presente
Lead Infrastructure Engineer
En el plazo de dos meses
Web Services components such as EMR and S3 buckets for cloud computing needs. Wrote new support programs and scripts to increase data storage capacity. Designed and developed scripts for loading and analyzing large datasets from text files. Infrastructure Engineer • IBM JuneAugust 2019 Automated routine tasks using scripting languages to control inventory. Coordinated with vendors for maintenance activities related to hardware and software upgrades. Researched new technologies and solutions to improve existing infrastructure setup. Maintained inventory of IT assets and software licenses in an organized manner. Collaborated with engineers and software developers to sele
Machine learning
Virtualization Technologies
Pandas Python
Desempleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
Avatar of Wawan Jabrik.
Avatar of Wawan Jabrik.
Past
Manager @PT Sarinah
2000 ~ 2022
IT Business Analyst / Project manager / Project Coordinator / Manager / Staff IT
En un mes
Wawan Jabrik IT Manager Profesional, honest, humble, responsible, good attitude, consistent and disciplined who has 20 years of experience working in the retail business handling IT Infrastructure, IT services, IT governance with COBIT 4, data analysis and application software development. Capabilities with MS SQL, MYSQL, Postgre, databases, LAN and WAN, Mikrotik, Wifi, Router, installation and configuration CCTV , Cobit 4, Indi 4.0, ITMS ,SOPs and policies, IT Governance, Risk Management and have handled projects as a project lead. Klaten, Kabupaten Klaten, Jawa Tengah, [email protected] https://www.linkedin.com/
Network Infrastructure
Network Administration
Software Development
Desempleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
Más de 15 años
Universitas Mercubuana Jakarta
Informatika
Avatar of the user.
Avatar of the user.
Past
Personal goal pursuit @Career Break
2024 ~ Presente
Senior Mobile App Developer
En un mes
powerpoint
Word
Excel
Desempleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
BINUS University
Computer Science
Avatar of Chia-Wei Yen.
Avatar of Chia-Wei Yen.
Technology Consultant @台灣易思資訊科技股份有限公司
2019 ~ 2024
程式設計師
En un mes
leveraging IBM Cognos Planning Analytics (TM1) and Oracle Hyperion Essbase for advanced financial planning and analysis. Possesses strong analytical acumen complemented by proficiency in Python scripting. Demonstrates adaptability by effectively navigating UNIX environments, including AIX and Linux. Currently expanding proficiency by learning JavaScript and C++ programming languages. 工作經歷 Technology Consultant • DXC Technology 六月Present | Taipei, Taiwan Project experiences: * Fubon Life IFRS17 Implementation Project * Bank of Taiwan Hong Kong Branch AML System Implementation Project * Fire Department Special Search and Rescue Team 5G AI Rescue Platform Supervision Project * USI Budget System Implementation
Microsoft Office
SQL
Linux
Empleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
10-15 años
National United University
Information Manager
Avatar of Leo Wu.
Avatar of Leo Wu.
Senior Front-End Engineer @TonFura
2023 ~ Presente
Front-End engineer / Full-stack engineer
En un mes
吳酈哲 Leo Wu Software Engineer [email protected] Taipei, Taiwan Summary Experienced Front-End developer with over five years of expertise in the React ecosystem Successfully led Front-End teams for more than three years Proficient in JavaScript, HTML, and CSS, with a focus on programmatic ads for over four years Skilled in ensuring Cross-Browser Compatibility and delivering high-quality user experiences Proven ability to collaborate effectively with non-technical partners to achieve project objectives Skills Programming languages: JavaScript, TypeScript Front-End Frameworks and Libraries: React, Next.js, Ant Design, Material UI, Jest DevOps
JavaScript
HTML5
CSS3
Empleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
National Taiwan University
Computer Science and Information Engineering
Avatar of 曾敏昇.
Avatar of 曾敏昇.
Past
後端工程師 @Beyond Cars
2023 ~ 2023
後端工程師
En un mes
展容器。 性格率直正向善溝通, 追求自我反思並果斷改善,人生價值觀為【將心比心】。 後端 & DevOps工程師 城市,TW MBTI人格測試結果 Skill Programming Language back-end Node.js(Typescript) (Expert) Python (Familiar) Go (Familiar) front-end React.js (Familiar) HTML(Familiar) CSS (Beginner) Database MySQL (Familiar) PostgreSQL (Familiar) Redis (Beginner) MongoDB (Beginner) Others DevOps 1. Cloud AWS CloudFront Route53 RDS SES EC2 S3 ECR ECS Fargate Codepipeline Amplify WAF
MongoDB
MySQL
PostgreSQL
Desempleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
輔仁大學
工商心理學
Avatar of Ryan Shen.
Avatar of Ryan Shen.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ Presente
資深程式設計師
En un mes
Ryan Shen Sr. Fullstack Engineer Taipei City, Taiwan Hi, I'm Ryan! I'm working as a web developer and I have 6 years of working experience as an engineer. I specialize in web development, code maintainability, and fundamentals of programming languages. [email protected] Work Experience Sr. Full Stack Engineer • 類神經網路股份有限公司 SepPresent Angular/Node.js/TypeScript/ Flutter /Docker/Firebase/MySQL/GCP 1. Built and maintained website management consoles in Angular to help shop owners
Android
Windows
Linux
Empleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of the user.
Avatar of the user.
Past
Growth & Performance @Hypefast
2020 ~ 2024
Performance Marketing Manager
En un mes
Spreadsheets
Data Analysis
Meta Ads
Desempleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
BINUS University
Information System
Avatar of 蔡昀橋.
Avatar of 蔡昀橋.
前端工程師 @法商法國巴黎人壽保險股份有限公司台灣分公司
2022 ~ Presente
資深前端工程師、系統分析師、專案經理
En un mes
作並熱愛挑戰,樂於協助、指導他人且擁有很強的學習能力。 I am Brad, with 8 years of experience in software development, currently specializing in front-end development and project management. I am proficient in multiple programming languages, project management, and design skills. I have rich experience in software development, working for well-known technology companies and large financial institutions. The projects I have handled include large-scale online banking, online insurance systems, reservation systems, electronic billboard systems, etc., and I am good
Java
python
Linux
Empleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
6-10 años
Stony Brook University
Technological System Management
Avatar of the user.
Avatar of the user.
高級工程師 @東佑達自動化科技股份有限公司
2021 ~ 2023
研發工程師
En un mes
Halcon vision
AutoCAD Mechanical
Proteus
Empleado
Listo para la entrevista
A tiempo completo / Interesado en trabajar a distancia
10-15 años
正修科技大學(Cheng Shiu University)
機械工程系

El plan de reclutamiento más ligero y eficaz

Busque currículums y tome la iniciativa de ponerse en contacto con los solicitantes de empleo para lograr una mayor eficacia en la contratación. La elección de cientos de empresas.

  • Examinar todos los resultados de la búsqueda
  • Acceso ilimitado para iniciar nuevas conversaciones
  • currículos accesibles sólo para empresas de pago
  • Ver dirección de correo electrónico y números de teléfono de los usuarios
Consejos de búsqueda
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Sólo los currículums públicos están disponibles con el plan gratuito.
Actualiza a un plan avanzado para ver todos los resultados de la búsqueda incluyendo decenas de miles de currículums exclusivos en CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Más de un año
Senior Researcher
TXOne Networks, inc.
2021 ~ Presente
Taiwan
Professional Background
Situación actual
Empleado
Progreso en la búsqueda de empleo
Professions
Research / R&D
Fields of Employment
Ciberseguridad
Experiencia laboral
2-4 años experiencia laboral (6-10 años relevante)
Management
Ninguno
Habilidades
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Idiomas
Chinese
Nativo o bilingüe
English
Fluido
Job search preferences
Posición
Security Researcher
Tipo de trabajo
A tiempo completo
Ubicación
Taiwan
A distancia
Interesado en trabajar a distancia
Freelance
No.
Educación
Escuela
National Taiwan University of Science and Technology
Mayor
Computer Science
Imprimir

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Perfil

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.