CakeResume Talent Search

上級
On
4〜6年
6〜10年
10〜15年
15年以上
Avatar of Vu Nguyen Ngoc Quang.
Avatar of Vu Nguyen Ngoc Quang.
Past
Mobile App Developer @Apple Inc.
2014 ~ 現在
Lead Infrastructure Engineer
2ヶ月以内
Web Services components such as EMR and S3 buckets for cloud computing needs. Wrote new support programs and scripts to increase data storage capacity. Designed and developed scripts for loading and analyzing large datasets from text files. Infrastructure Engineer • IBM JuneAugust 2019 Automated routine tasks using scripting languages to control inventory. Coordinated with vendors for maintenance activities related to hardware and software upgrades. Researched new technologies and solutions to improve existing infrastructure setup. Maintained inventory of IT assets and software licenses in an organized manner. Collaborated with engineers and software developers to sele
Machine learning
Virtualization Technologies
Pandas Python
無職
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
Avatar of the user.
Avatar of the user.
Past
Personal goal pursuit @Career Break
2024 ~ 現在
Senior Mobile App Developer
1ヶ月以内
powerpoint
Word
Excel
無職
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
BINUS University
Computer Science
Avatar of Chia-Wei Yen.
Avatar of Chia-Wei Yen.
Technology Consultant @台灣易思資訊科技股份有限公司
2019 ~ 2024
程式設計師
1ヶ月以内
leveraging IBM Cognos Planning Analytics (TM1) and Oracle Hyperion Essbase for advanced financial planning and analysis. Possesses strong analytical acumen complemented by proficiency in Python scripting. Demonstrates adaptability by effectively navigating UNIX environments, including AIX and Linux. Currently expanding proficiency by learning JavaScript and C++ programming languages. 工作經歷 Technology Consultant • DXC Technology 六月Present | Taipei, Taiwan Project experiences: * Fubon Life IFRS17 Implementation Project * Bank of Taiwan Hong Kong Branch AML System Implementation Project * Fire Department Special Search and Rescue Team 5G AI Rescue Platform Supervision Project * USI Budget System Implementation
Microsoft Office
SQL
Linux
就職中
面接の用意ができています
フルタイム / リモートワークに興味あり
10〜15年
National United University
Information Manager
Avatar of the user.
Avatar of the user.
Senior Front-End Engineer @TonFura
2023 ~ 現在
Front-End engineer / Full-stack engineer
1ヶ月以内
JavaScript
HTML5
CSS3
就職中
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
National Taiwan University
Computer Science and Information Engineering
Avatar of 曾敏昇.
Avatar of 曾敏昇.
Past
後端工程師 @Beyond Cars
2023 ~ 2023
後端工程師
1ヶ月以内
展容器。 性格率直正向善溝通, 追求自我反思並果斷改善,人生價值觀為【將心比心】。 後端 & DevOps工程師 城市,TW MBTI人格測試結果 Skill Programming Language back-end Node.js(Typescript) (Expert) Python (Familiar) Go (Familiar) front-end React.js (Familiar) HTML(Familiar) CSS (Beginner) Database MySQL (Familiar) PostgreSQL (Familiar) Redis (Beginner) MongoDB (Beginner) Others DevOps 1. Cloud AWS CloudFront Route53 RDS SES EC2 S3 ECR ECS Fargate Codepipeline Amplify WAF
MongoDB
MySQL
PostgreSQL
無職
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
輔仁大學
工商心理學
Avatar of Ryan Shen.
Avatar of Ryan Shen.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ 現在
資深程式設計師
1ヶ月以内
Ryan Shen Sr. Fullstack Engineer Taipei City, Taiwan Hi, I'm Ryan! I'm working as a web developer and I have 6 years of working experience as an engineer. I specialize in web development, code maintainability, and fundamentals of programming languages. [email protected] Work Experience Sr. Full Stack Engineer • 類神經網路股份有限公司 SepPresent Angular/Node.js/TypeScript/ Flutter /Docker/Firebase/MySQL/GCP 1. Built and maintained website management consoles in Angular to help shop owners
Android
Windows
Linux
就職中
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of Stevano Christian.
Avatar of Stevano Christian.
Past
Growth & Performance @Hypefast
2020 ~ 2024
Performance Marketing Manager
1ヶ月以内
dashboard to ensure correct strategies applied in digital execution level. Led alignment for offline campaign and online digital marketing campaign SEO improvement on website and blog, help to increase Stoqo organic traffic by 30-50% each month ASO improvement on PlayStore, increase apps traffic (organic% each month, and apps install rate 30-40% (overall) each month EducationBina Nusantara University Information System Studied analysis and system creation concept with object oriented approach. Studied multiple programming language and applied ERP (Enterprise Resource Planning) focused to solve business problem. Studied management, problem solving, and critical analysis relat...
Spreadsheets
Data Analysis
Meta Ads
無職
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
BINUS University
Information System
Avatar of 蔡昀橋.
Avatar of 蔡昀橋.
前端工程師 @法商法國巴黎人壽保險股份有限公司台灣分公司
2022 ~ 現在
資深前端工程師、系統分析師、專案經理
1ヶ月以内
作並熱愛挑戰,樂於協助、指導他人且擁有很強的學習能力。 I am Brad, with 8 years of experience in software development, currently specializing in front-end development and project management. I am proficient in multiple programming languages, project management, and design skills. I have rich experience in software development, working for well-known technology companies and large financial institutions. The projects I have handled include large-scale online banking, online insurance systems, reservation systems, electronic billboard systems, etc., and I am good
Java
python
Linux
就職中
面接の用意ができています
フルタイム / リモートワークに興味あり
6〜10年
Stony Brook University
Technological System Management
Avatar of the user.
Avatar of the user.
高級工程師 @東佑達自動化科技股份有限公司
2021 ~ 2023
研發工程師
1ヶ月以内
Halcon vision
AutoCAD Mechanical
Proteus
就職中
面接の用意ができています
フルタイム / リモートワークに興味あり
10〜15年
正修科技大學(Cheng Shiu University)
機械工程系
Avatar of Ch'iyuang Tseng.
Avatar of Ch'iyuang Tseng.
Past
Software Engineer @iKala
2020 ~ 2023
Software Engineer
1ヶ月以内
Chiyuang Tseng Chiyuang [email protected] Skills Programming language: Go, Python, C++ Developing tool: Linux, Git, Docker, Kubernetes, Postman Databases: MySQL, Redis, MongoDB, Firestore, BigQuery Cloud: GCP(Kubernetes Engine, BigQuery, CloudSQL, Cloud Storage, Pub/Sub), AWS(SES, SNS) Others: Nginx, ELK stack, RESTful API, Swagger Experience FebDec 2023 Senior Software Engineer, iKala(CDP) OctJan 2023 Software Engineer, iKala(CDP) Designed and implemented an URL shortener for event tracking Designed and implemented IAM module of CDP Responsible for 3rd party API integrations, includes Google Ads, AWS SES&SNS, Newsleopard(email), MAAC(LINE messaging provider), and EVERY8D
golang
Python
Shell Script
無職
面接の用意ができています
フルタイム / リモートワークに興味あり
4〜6年
台灣大學
計算機科學

最も簡単で効果的な採用プラン

80万枚以上の履歴書を検索して、率先して求人応募者と連絡をとって採用効率を高めましょう。何百もの企業に選ばれています。

  • 検索結果をすべて閲覧
  • 新しい会話を無制限に始められます
  • 有料企業にのみ履歴書を公開
  • ユーザーのメールアドレスと電話番号を確認
検索のコツ
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
無料プランでは公開済みの履歴書のみ利用できます。
上級プランにアップグレードして、CakeResume限定の何百万の履歴書など、すべての検索結果を閲覧しましょう。

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
1年以上
Senior Researcher
TXOne Networks, inc.
2021 ~ 現在
Taiwan
Professional Background
現在の状況
就職中
求人検索の進捗
Professions
Research / R&D
Fields of Employment
サイバーセキュリティ
職務経験
2〜4年の職務経験(6〜10年関連)
Management
なし
スキル
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
言語
Chinese
ネイティブまたはバイリンガル
English
流暢
Job search preferences
希望のポジション
Security Researcher
求人タイプ
フルタイム
希望の勤務地
Taiwan
リモートワーク
リモートワークに興味あり
Freelance
いいえ。
学歴
学校
National Taiwan University of Science and Technology
専攻
Computer Science
印刷

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
プロフィール

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.