CakeResume Talent Search

Advanced filters
On
4-6 tahun
6-10 tahun
10-15 tahun
Lebih dari 15 tahun
Avatar of Vu Nguyen Ngoc Quang.
Avatar of Vu Nguyen Ngoc Quang.
Past
Mobile App Developer @Apple Inc.
2014 ~ Sekarang
Lead Infrastructure Engineer
Dalam dua bulan
Web Services components such as EMR and S3 buckets for cloud computing needs. Wrote new support programs and scripts to increase data storage capacity. Designed and developed scripts for loading and analyzing large datasets from text files. Infrastructure Engineer • IBM JuneAugust 2019 Automated routine tasks using scripting languages to control inventory. Coordinated with vendors for maintenance activities related to hardware and software upgrades. Researched new technologies and solutions to improve existing infrastructure setup. Maintained inventory of IT assets and software licenses in an organized manner. Collaborated with engineers and software developers to sele
Machine learning
Virtualization Technologies
Pandas Python
Tidak bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
Avatar of the user.
Avatar of the user.
Past
Personal goal pursuit @Career Break
2024 ~ Sekarang
Senior Mobile App Developer
Dalam satu bulan
powerpoint
Word
Excel
Tidak bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
BINUS University
Computer Science
Avatar of Chia-Wei Yen.
Avatar of Chia-Wei Yen.
Technology Consultant @台灣易思資訊科技股份有限公司
2019 ~ 2024
程式設計師
Dalam satu bulan
leveraging IBM Cognos Planning Analytics (TM1) and Oracle Hyperion Essbase for advanced financial planning and analysis. Possesses strong analytical acumen complemented by proficiency in Python scripting. Demonstrates adaptability by effectively navigating UNIX environments, including AIX and Linux. Currently expanding proficiency by learning JavaScript and C++ programming languages. 工作經歷 Technology Consultant • DXC Technology 六月Present | Taipei, Taiwan Project experiences: * Fubon Life IFRS17 Implementation Project * Bank of Taiwan Hong Kong Branch AML System Implementation Project * Fire Department Special Search and Rescue Team 5G AI Rescue Platform Supervision Project * USI Budget System Implementation
Microsoft Office
SQL
Linux
Sudah bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
10-15 tahun
National United University
Information Manager
Avatar of the user.
Avatar of the user.
Senior Front-End Engineer @TonFura
2023 ~ Sekarang
Front-End engineer / Full-stack engineer
Dalam satu bulan
JavaScript
HTML5
CSS3
Sudah bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
National Taiwan University
Computer Science and Information Engineering
Avatar of 曾敏昇.
Avatar of 曾敏昇.
Past
後端工程師 @Beyond Cars
2023 ~ 2023
後端工程師
Dalam satu bulan
展容器。 性格率直正向善溝通, 追求自我反思並果斷改善,人生價值觀為【將心比心】。 後端 & DevOps工程師 城市,TW MBTI人格測試結果 Skill Programming Language back-end Node.js(Typescript) (Expert) Python (Familiar) Go (Familiar) front-end React.js (Familiar) HTML(Familiar) CSS (Beginner) Database MySQL (Familiar) PostgreSQL (Familiar) Redis (Beginner) MongoDB (Beginner) Others DevOps 1. Cloud AWS CloudFront Route53 RDS SES EC2 S3 ECR ECS Fargate Codepipeline Amplify WAF
MongoDB
MySQL
PostgreSQL
Tidak bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
輔仁大學
工商心理學
Avatar of Ryan Shen.
Avatar of Ryan Shen.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ Sekarang
資深程式設計師
Dalam satu bulan
Ryan Shen Sr. Fullstack Engineer Taipei City, Taiwan Hi, I'm Ryan! I'm working as a web developer and I have 6 years of working experience as an engineer. I specialize in web development, code maintainability, and fundamentals of programming languages. [email protected] Work Experience Sr. Full Stack Engineer • 類神經網路股份有限公司 SepPresent Angular/Node.js/TypeScript/ Flutter /Docker/Firebase/MySQL/GCP 1. Built and maintained website management consoles in Angular to help shop owners
Android
Windows
Linux
Sudah bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of Stevano Christian.
Avatar of Stevano Christian.
Past
Growth & Performance @Hypefast
2020 ~ 2024
Performance Marketing Manager
Dalam satu bulan
dashboard to ensure correct strategies applied in digital execution level. Led alignment for offline campaign and online digital marketing campaign SEO improvement on website and blog, help to increase Stoqo organic traffic by 30-50% each month ASO improvement on PlayStore, increase apps traffic (organic% each month, and apps install rate 30-40% (overall) each month EducationBina Nusantara University Information System Studied analysis and system creation concept with object oriented approach. Studied multiple programming language and applied ERP (Enterprise Resource Planning) focused to solve business problem. Studied management, problem solving, and critical analysis relat...
Spreadsheets
Data Analysis
Meta Ads
Tidak bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
BINUS University
Information System
Avatar of 蔡昀橋.
Avatar of 蔡昀橋.
前端工程師 @法商法國巴黎人壽保險股份有限公司台灣分公司
2022 ~ Sekarang
資深前端工程師、系統分析師、專案經理
Dalam satu bulan
作並熱愛挑戰,樂於協助、指導他人且擁有很強的學習能力。 I am Brad, with 8 years of experience in software development, currently specializing in front-end development and project management. I am proficient in multiple programming languages, project management, and design skills. I have rich experience in software development, working for well-known technology companies and large financial institutions. The projects I have handled include large-scale online banking, online insurance systems, reservation systems, electronic billboard systems, etc., and I am good
Java
python
Linux
Sudah bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
6-10 tahun
Stony Brook University
Technological System Management
Avatar of the user.
Avatar of the user.
高級工程師 @東佑達自動化科技股份有限公司
2021 ~ 2023
研發工程師
Dalam satu bulan
Halcon vision
AutoCAD Mechanical
Proteus
Sudah bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
10-15 tahun
正修科技大學(Cheng Shiu University)
機械工程系
Avatar of Ch'iyuang Tseng.
Avatar of Ch'iyuang Tseng.
Past
Software Engineer @iKala
2020 ~ 2023
Software Engineer
Dalam satu bulan
Chiyuang Tseng Chiyuang [email protected] Skills Programming language: Go, Python, C++ Developing tool: Linux, Git, Docker, Kubernetes, Postman Databases: MySQL, Redis, MongoDB, Firestore, BigQuery Cloud: GCP(Kubernetes Engine, BigQuery, CloudSQL, Cloud Storage, Pub/Sub), AWS(SES, SNS) Others: Nginx, ELK stack, RESTful API, Swagger Experience FebDec 2023 Senior Software Engineer, iKala(CDP) OctJan 2023 Software Engineer, iKala(CDP) Designed and implemented an URL shortener for event tracking Designed and implemented IAM module of CDP Responsible for 3rd party API integrations, includes Google Ads, AWS SES&SNS, Newsleopard(email), MAAC(LINE messaging provider), and EVERY8D
golang
Python
Shell Script
Tidak bekerja
Siap untuk wawancara
Full-time / Tertarik bekerja jarak jauh
4-6 tahun
台灣大學
計算機科學

Paket Perekrutan Paling Mudah dan Efektif, Pilihan Ratusan Perusahaan

Cari lebih dari 800 ribu CV dan ambil aksi menghubungi pelamar kerja untuk rekrutmen yang lebih efektif. Pilihan ratusan perusahaan.

  • Lihat semua hasil pencarian
  • Tanpa batas harian untuk memulai pesan baru
  • CV dapat diakses oleh perusahaan berbayar
  • Lihat email pengguna & nomor telepon
Tips pencarian
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Hanya CV publik yang tersedia dengan paket gratis.
Upgrade ke paket lanjutan untuk melihat semua hasil pencarian, termasuk 10.000 lebih CV eksklusif di Cake Resume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Lebih dari satu tahun
Senior Researcher
TXOne Networks, inc.
2021 ~ Sekarang
Taiwan
Latar Belakang Profesional
Status sekarang
Sudah bekerja
Tahap pencarian kerja
Profesi
Research / R&D
Bidang Pekerjaan
Sekurity Cyber
Pengalaman Kerja
2-4 tahun pengalaman kerja (6-10 tahun relevan)
Management
Tidak ada
Keterampilan
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Bahasa
Chinese
Bahasa ibu atau Bilingual
English
Fasih
Preferensi Pencarian Pekerjaan
Jabatan
Security Researcher
Tipe Pekerjaan
Full-time
Lokasi
Taiwan
Bekerja jarak jauh
Tertarik bekerja jarak jauh
Freelance
Tidak
Pendidikan
Institusi Pendidikan
National Taiwan University of Science and Technology
Jurusan
Computer Science
Cetak

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

CV
Profil

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.