CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
Sr. Full Stack Engineer @類神經網路股份有限公司
2021 ~ Present
資深程式設計師
Within one month
Android
Windows
Linux
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
輔仁大學 Fu Jen Catholic University
Computer Science and Information Engineering
Avatar of the user.
Avatar of the user.
Cyber Security Analyst @iTop Digital Technology Co., Ltd.
2021 ~ Present
資安威脅分析師、滲透測試工程師
Within one month
Penetration Test
Threat Hunting
Azure Sentinel
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國防大學中正理工學院
資訊工程學系
Avatar of 羅大偉.
Avatar of 羅大偉.
Product Developer @群暉科技 Synology Inc.
2023 ~ Present
Senior Android Engineer
Within one month
such as AdMob, Max, MV...) to implement app monetization. * Familiar with using Firebase for analysis, A/B testing, and remote configuration. * Skilled in using Retrofit to create a type-safe HTTP client. * Experienced with making Python scripts and writing Smali code for APK reverse engineering. * Successfully supervised team members to fulfill diverse development needs. * Tracked app data to verify requirements, optimize the app, and achieve my OKR goals.  New Taipei City,TW [email protected] 工作經歷 Synology ,- Now Android BeeDrive : BeeDrive 是一個輕
Android
Java
Smali
Employed
Open to opportunities
Full-time / Interested in working remotely
6-10 years
淡江大學
資訊工程
Avatar of chen chopper.
Avatar of chen chopper.
助理工程師 @行政法人國家資通安全研究院
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
陳燕葶 Chopper Chen 來自台南,個性活潑樂觀富創造力,樂於學習新知及勇於接受新的挑戰。西元2018年畢業於國防大學理工學院資訊工程學系,於國防部服務4年後,目前於財團法人國家實驗研究院服務,主要工作經歷包含程式開發、滲透測試、惡意程式
python語言
C
Assembly Language
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立臺北科技大學NTUT
自動化工程研究所
Avatar of Broccoli Huang 黃世豪.
Avatar of Broccoli Huang 黃世豪.
Sr. Android Developer @GoGoX
2023 ~ Present
Senior Android Engineer
Within one month
@gmail.com Skills Android Language Kotlin / Java Framework Jetpack / MediaBrowser / Leanback Test JUnit / Mockito / MockK / Espresso Platform Mobile / TV / Car / Wear / Chromecast DI Koin / Hilt / Dagger Library Retrofit / Coroutine / RxJava Persistence Room / SQLite Reverse Engineering jadx / repack / resign Android-based ROM Root / Flash ROM / Make AOSP Other Custom View JNI / NFC / IAB Lottie / Floating Window Software Engineering Clean Code / Architecture MVVM / MVP / MVC Design Pattern SOLID Workflow & Tools Aglie: Scrum / Kanban GitHub
Android
JAVA
kotlin
Employed
Full-time / Interested in working remotely
6-10 years
National Formosa University (NFU)
Computer Science and Information Engineering
Avatar of Mohammed Mufti.
Avatar of Mohammed Mufti.
Past
Support Engineer (Developer support core) @ Microsoft India R & D Private Limited
2008 ~ 2011
Senior Member Of Technical Staff
Within three months
compiler intrinsic / openMP (C++) ( Intel architecture) for parallel and multicore programming. Possess strong technical acumen on OS internals. Have fair amount of knowledge on Rootkits and its internals. Well-versed with secure software development life cycle for application development. Have Special Interest in reverse engineering, security and OS instrumentations. Technical Stack : a. Windows File System internals and application programming to deal with File Systems. b. Windows Audio & Video programming (DirectShow, DirectX/Direct3D/DirectSound/Media Foundation). c. Windows Media Player SDK using C++
C
C++
STL
Unemployed
Full-time / Interested in working remotely
More than 15 years
Indira Gandhi National Open University(IGNOU)
Computer Science
Avatar of HazaratAli Kalyal.
Avatar of HazaratAli Kalyal.
Senior Consultant @Capgemini Technology Service India Pvt Ltd
2017 ~ Present
Senior Consultant / CAD/PD Analyst
More than one year
HazaratAli Kalyal I have competent professional experience with around 14+ Years in Project Management, CAD Support, CAD/PDM Implementation, PLM, Engineering Tool Evaluation, Training, MBD, IoT Platform applications, Product Design, Reverse Engineering, Mold Design, Currently working as a Project Manager/Technical Manager and supporting technically as well as people management  Senior Technical Specialist / CAD & PDM Analyst Bangalore, IN [email protected] Profile  Working as a Project Manager and leading CAD and Windchill Team , supporting global user community with 100+ CAD, CAE and multiple PLM application, which involves testing, tool evaluation, application Implementation, and
Product Design
product design and development
Creo Parametric
Employed
Full-time / Interested in working remotely
10-15 years
JRN Rajasthan Vidhyapeeth University University (Distance learning)
Mechanical Engineering
Avatar of Ma Sheng Hao.
Offline
Avatar of Ma Sheng Hao.
Offline
Senior Researcher @TXOne Networks, inc.
2021 ~ Present
Security Researcher
More than one year
Ma Sheng Hao Cyber Security Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware
C++
C
Assembly Language
Employed
Full-time / Interested in working remotely
6-10 years
National Taiwan University of Science and Technology
Computer Science
Avatar of 陳居億/Chu-I Chen.
Avatar of 陳居億/Chu-I Chen.
資訊網路官 @資通電軍網路戰聯隊
2016 ~ Present
資安工程師
Within one month
國參訪Blackhat的名額。此外利用工作之餘考取多項資安相關證照、參加資安課程、進修人工智慧專長,增加競爭力。 Skill Expertise Penetration Testing Network Security Reverse Engineering Programming Language C C++ Python Golang Assembly PHP Side Project Android Weather App 由kotlin編寫,使用中央氣象局氣象資料開放平台提供之資料,提醒氣溫與濕度狀況
C
C++
Python
Reputation Credits2
Employed
Full-time / Interested in working remotely
4-6 years
University of Michigan(Coursera)
Using Python to Access Web Data
Avatar of the user.
Avatar of the user.
R&D Manager @LIMOTEC
2017 ~ Present
Project/Product Development Manager
More than one year
SolidWorks
Project Management
Patent Analysis
Employed
Full-time / Interested in working remotely
10-15 years
National Cheng Kung University
MEMS

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.