CakeResume 找人才

进阶搜寻
On
4 到 6 年
6 到 10 年
10 到 15 年
15 年以上
Avatar of Vu Nguyen Ngoc Quang.
Avatar of Vu Nguyen Ngoc Quang.
曾任
Mobile App Developer @Apple Inc.
2014 ~ 现在
Lead Infrastructure Engineer
兩個月內
Web Services components such as EMR and S3 buckets for cloud computing needs. Wrote new support programs and scripts to increase data storage capacity. Designed and developed scripts for loading and analyzing large datasets from text files. Infrastructure Engineer • IBM JuneAugust 2019 Automated routine tasks using scripting languages to control inventory. Coordinated with vendors for maintenance activities related to hardware and software upgrades. Researched new technologies and solutions to improve existing infrastructure setup. Maintained inventory of IT assets and software licenses in an organized manner. Collaborated with engineers and software developers to sele
Machine learning
Virtualization Technologies
Pandas Python
待业中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
Avatar of the user.
Avatar of the user.
曾任
Personal goal pursuit @Career Break
2024 ~ 现在
Senior Mobile App Developer
一個月內
powerpoint
Word
Excel
待业中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
BINUS University
Computer Science
Avatar of Chia-Wei Yen.
Avatar of Chia-Wei Yen.
Technology Consultant @台灣易思資訊科技股份有限公司
2019 ~ 2024
程式設計師
一個月內
leveraging IBM Cognos Planning Analytics (TM1) and Oracle Hyperion Essbase for advanced financial planning and analysis. Possesses strong analytical acumen complemented by proficiency in Python scripting. Demonstrates adaptability by effectively navigating UNIX environments, including AIX and Linux. Currently expanding proficiency by learning JavaScript and C++ programming languages. 工作經歷 Technology Consultant • DXC Technology 六月Present | Taipei, Taiwan Project experiences: * Fubon Life IFRS17 Implementation Project * Bank of Taiwan Hong Kong Branch AML System Implementation Project * Fire Department Special Search and Rescue Team 5G AI Rescue Platform Supervision Project * USI Budget System Implementation
Microsoft Office
SQL
Linux
就职中
正在积极求职中
全职 / 对远端工作有兴趣
10 到 15 年
National United University
Information Manager
Avatar of the user.
Avatar of the user.
Senior Front-End Engineer @TonFura
2023 ~ 现在
Front-End engineer / Full-stack engineer
一個月內
JavaScript
HTML5
CSS3
就职中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
National Taiwan University
Computer Science and Information Engineering
Avatar of 曾敏昇.
Avatar of 曾敏昇.
曾任
後端工程師 @Beyond Cars
2023 ~ 2023
後端工程師
一個月內
展容器。 性格率直正向善溝通, 追求自我反思並果斷改善,人生價值觀為【將心比心】。 後端 & DevOps工程師 城市,TW MBTI人格測試結果 Skill Programming Language back-end Node.js(Typescript) (Expert) Python (Familiar) Go (Familiar) front-end React.js (Familiar) HTML(Familiar) CSS (Beginner) Database MySQL (Familiar) PostgreSQL (Familiar) Redis (Beginner) MongoDB (Beginner) Others DevOps 1. Cloud AWS CloudFront Route53 RDS SES EC2 S3 ECR ECS Fargate Codepipeline Amplify WAF
MongoDB
MySQL
PostgreSQL
待业中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
輔仁大學
工商心理學
Avatar of Ryan Shen.
Avatar of Ryan Shen.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ 现在
資深程式設計師
一個月內
Ryan Shen Sr. Fullstack Engineer Taipei City, Taiwan Hi, I'm Ryan! I'm working as a web developer and I have 6 years of working experience as an engineer. I specialize in web development, code maintainability, and fundamentals of programming languages. [email protected] Work Experience Sr. Full Stack Engineer • 類神經網路股份有限公司 SepPresent Angular/Node.js/TypeScript/ Flutter /Docker/Firebase/MySQL/GCP 1. Built and maintained website management consoles in Angular to help shop owners
Android
Windows
Linux
就职中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of Stevano Christian.
Avatar of Stevano Christian.
曾任
Growth & Performance @Hypefast
2020 ~ 2024
Performance Marketing Manager
一個月內
dashboard to ensure correct strategies applied in digital execution level. Led alignment for offline campaign and online digital marketing campaign SEO improvement on website and blog, help to increase Stoqo organic traffic by 30-50% each month ASO improvement on PlayStore, increase apps traffic (organic% each month, and apps install rate 30-40% (overall) each month EducationBina Nusantara University Information System Studied analysis and system creation concept with object oriented approach. Studied multiple programming language and applied ERP (Enterprise Resource Planning) focused to solve business problem. Studied management, problem solving, and critical analysis relat...
Spreadsheets
Data Analysis
Meta Ads
待业中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
BINUS University
Information System
Avatar of 蔡昀橋.
Avatar of 蔡昀橋.
前端工程師 @法商法國巴黎人壽保險股份有限公司台灣分公司
2022 ~ 现在
資深前端工程師、系統分析師、專案經理
一個月內
作並熱愛挑戰,樂於協助、指導他人且擁有很強的學習能力。 I am Brad, with 8 years of experience in software development, currently specializing in front-end development and project management. I am proficient in multiple programming languages, project management, and design skills. I have rich experience in software development, working for well-known technology companies and large financial institutions. The projects I have handled include large-scale online banking, online insurance systems, reservation systems, electronic billboard systems, etc., and I am good
Java
python
Linux
就职中
正在积极求职中
全职 / 对远端工作有兴趣
6 到 10 年
Stony Brook University
Technological System Management
Avatar of the user.
Avatar of the user.
高級工程師 @東佑達自動化科技股份有限公司
2021 ~ 2023
研發工程師
一個月內
Halcon vision
AutoCAD Mechanical
Proteus
就职中
正在积极求职中
全职 / 对远端工作有兴趣
10 到 15 年
正修科技大學(Cheng Shiu University)
機械工程系
Avatar of Ch'iyuang Tseng.
Avatar of Ch'iyuang Tseng.
曾任
Software Engineer @iKala
2020 ~ 2023
Software Engineer
一個月內
Chiyuang Tseng Chiyuang [email protected] Skills Programming language: Go, Python, C++ Developing tool: Linux, Git, Docker, Kubernetes, Postman Databases: MySQL, Redis, MongoDB, Firestore, BigQuery Cloud: GCP(Kubernetes Engine, BigQuery, CloudSQL, Cloud Storage, Pub/Sub), AWS(SES, SNS) Others: Nginx, ELK stack, RESTful API, Swagger Experience FebDec 2023 Senior Software Engineer, iKala(CDP) OctJan 2023 Software Engineer, iKala(CDP) Designed and implemented an URL shortener for event tracking Designed and implemented IAM module of CDP Responsible for 3rd party API integrations, includes Google Ads, AWS SES&SNS, Newsleopard(email), MAAC(LINE messaging provider), and EVERY8D
golang
Python
Shell Script
待业中
正在积极求职中
全职 / 对远端工作有兴趣
4 到 6 年
台灣大學
計算機科學

最轻量、快速的招募方案,数百家企业的选择

搜寻简历,主动联系求职者,提升招募效率。

  • 浏览所有搜寻结果
  • 每日可无限次数开启陌生对话
  • 搜尋僅開放付費企業檢視的简历
  • 检视使用者信箱 & 电话
搜寻技巧
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
免费方案仅能搜寻公开简历。
升级至进阶方案,即可浏览所有搜寻结果(包含数万笔览仅在 CakeResume 平台上公开的简历)。

职场能力评价定义

专业技能
该领域中具备哪些专业能力(例如熟悉 SEO 操作,且会使用相关工具)。
问题解决能力
能洞察、分析问题,并拟定方案有效解决问题。
变通能力
遇到突发事件能冷静应对,并随时调整专案、客户、技术的相对优先序。
沟通能力
有效传达个人想法,且愿意倾听他人意见并给予反馈。
时间管理能力
了解工作项目的优先顺序,有效运用时间,准时完成工作内容。
团队合作能力
具有向心力与团队责任感,愿意倾听他人意见并主动沟通协调。
领导力
专注于团队发展,有效引领团队采取行动,达成共同目标。
超過一年
Senior Researcher
TXOne Networks, inc.
2021 ~ 现在
Taiwan
专业背景
目前状态
就职中
求职阶段
专业
研发
产业
网络安全
工作年资
2 到 4 年工作经验(6 到 10 年相关工作经验)
管理经历
技能
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
语言能力
Chinese
母语或双语
English
进阶
求职偏好
希望获得的职位
Security Researcher
预期工作模式
全职
期望的工作地点
Taiwan
远端工作意愿
对远端工作有兴趣
接案服务
学历
学校
National Taiwan University of Science and Technology
主修科系
Computer Science
列印

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

简历
个人档案

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.