CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
資深系統工程師 @口袋證券股份有限公司
2024 ~ Present
資深軟體工程師、後端工程師
Within one month
Word
Excel
PowerPoint
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立聯合大學
資訊管理系
Avatar of 盧駿軒.
Avatar of 盧駿軒.
Product Manager @Global HashPower Exchange
2021 ~ Present
UX或專案管理相關的職務
Within six months
file format, from tradition Word files to Apiary, effectively accelerate the development process and reduce communication costs. Leading the company's internal products (Facebook Live Streaming) planing to development, due to Facebook Streaming usage policy issue are not officially available, but the App Beta version has been completed. Skills Document writing: FRD, BRD, Issue track report, Product flow, Wireframe Tools: Axure RP, Prototype Tools: Marvel, Invision, Flinto. Sketch, Mixpanel Languages: Markdown, HTML & SCSS, Basic JavaScript Others Tools: Slack, Trello, Productboard, RealtimeBoard, Gantt Chart, Postman, Notion for product management Portfolio Prototype Fb Live Streaming : I have tried different
Sketch
Axure RP
Markdown
Employed
Full-time / Interested in working remotely
4-6 years
中國文化大學
森林暨自然保育學系
Avatar of the user.
Avatar of the user.
Past
Writer @Write any papers
2015 ~ Present
More than one year
writing
word
Excel
Unemployed
Full-time / Interested in working remotely
4-6 years
Writing college
Avatar of 陳柄宏.
Avatar of 陳柄宏.
Staff Cloud Architect Enginner @域動行銷股份有限公司
2023 ~ Present
雲端工程師,雲端架構師,數據架構師
Within one month
CHEN, PING-HUNG 陳 柄 宏 Cloud Data Engineer New Taipei City, Taiwan I hold certifications for both AWS and Azure platforms, and have been continuously deepening my knowledge in cloud computing. I am skilled in using Python programming language for data science-related tasks and automation operations. I have participated in big data projects such as smart transportation and real estate prediction, and I aspire to not only leverage my current skillset but also to be part of a team that encourages learning and growth for future [email protected] Skills Python Program writing
git
hadoop ecosystem
MongoDB
Employed
Not open to opportunities
Full-time / Interested in working remotely
4-6 years
輔仁大學
圖書資訊
Avatar of Kashif Israr Zafar.
Avatar of Kashif Israr Zafar.
Fiverr @5 years experience of typing, writing, documents editing, content creating
2005 ~ Present
Freelance Writing
Within one year
Kashif Israr Zafar Typing, Writing, Editing, Content Creater Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud. [email protected] Work Experience JanuaryPresent Taipei, Taiwan Fiverr 5 years experience of typing, writing, documents editing, content creating working as professional freelance writer, editor, typing for 5 years EducationAllama Iqbal Open University Islamabad Arts Strong grip on writing, typing, document editing, (word, pdf, excel) Skills Word Excel PowerPoint Languages English — Professional
Word
Excel
PowerPoint
Studying
Full-time / Interested in working remotely
4-6 years
Allama Iqbal Open University Islamabad
Arts
Avatar of the user.
Avatar of the user.
Past
Product Designer @Freelance
2023 ~ Present
UI/UX Designer / Product Designer
Within one month
Customer Relationship Management (CRM)
Multicultural Team Management
Zendesk Support
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
Brigham Young University - Hawaii
Communications, Digital Humanities , International Cultural Studies
Avatar of Naomi Lin.
Avatar of Naomi Lin.
行銷副理 / KOL Radar 行銷科技事業部 @愛卡拉互動媒體股份有限公司
2021 ~ Present
品牌專案企劃、網路行銷企劃、數位行銷企劃
Within one month
換生: 喬治亞學院與州立大學,修習行銷相關課程(–) MENG HSIEN (Naomi) LIN " 5+ years of experience in digital marketing and branding. A dedicated team player and problem-solver." Contact: [email protected] 【Professional Skills】 English Proficiency: TOEIC 955 / Invited Debate Coach at NTU English Debate Competition Web Data & User Analysis: GA4, Ahrefs, SimilarWeb, Hotjar, Google Looker Studio (Data Visualization & Analysis) Marketing Planning & Strategy: KPI Planning, Budget Management, SEO & Content Markting, Online Ad Planning, Website Planning, Visual Design (Canva), EDM Market..
Google Analytics
Sales & Marketing
Photoshop
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
臺北市立大學
英語教學系
Avatar of Diana Shih.
Avatar of Diana Shih.
Past
Solopreneur @Media Ape
2022 ~ 2024
Creative/Content /Project head Digital, Television ,Films and Social Media
Within one month
Diana Shih Experienced Multimedia Producer with 3+ years in content creation, achieving a 25% viewership increase and 1500% revenue growth in key projects. Skilled in social media and Google Analytics, with expertise in strategizing and executing digital marketing campaigns. Proficient in quantitative research and crafting compelling media narratives. Taipei, Taiwan | Portfolio: https://www.shihstories.com/ Skills Video Production Scriptwriting Video Editing Storyboarding 2D Animation Software Adobe Photoshop Adobe After Effects Final Cut Pro Procreate Project Management Time management Stakeholder communication Budget management Resource allocation Analytics Quantitative data analysis Qualitative data analysis
Word
PowerPoint
Excel
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
University of Bonn
Neuroscience
Avatar of 陳勤霖.
Avatar of 陳勤霖.
Past
博士後研究員 @洛桑大學神經發育疾病實驗室
2023 ~ 2023
Data Scientist, Data Analyst, Machine Learning Engineer
Within one month
陳勤霖 神經工程博士背景的數據分析師 Ph.D. in Neuroscience from Neuroengineering lab I have 5 years of hands-on experience in image and data analysis with biotechnology innovation projects. Dependable ability in managing collaborative projects to success. Business-driven motivation to apply analytic skills to optimize the product and its development procedure. https://chinlinchen1312.wixsite.com/chin-lin-chen 工作經歷 一月十二月 2023 博士後研究員 洛桑大
Data Science
Data Analysis
Machine Learning
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
洛桑聯邦理工學院(EPFL)
神經科學
Avatar of 王文祥.
Avatar of 王文祥.
經理 @鴻博資訊有限公司
2015 ~ Present
軟體工程師、電玩程式設計師、後端工程師、APP開發工程師、演算法開發工程師
Within one month
2007 | Taipei, Taiwan Manufacturing Execution System (MES) System Development Product∶ https://docplayer.net/Ibm-high-tech-mes-solution-view-series.html IBM LCDView IBM SiView IBM EAP Educational Background Kun Shan University ( https://www.ksu.edu.tw/ ) Electrical Engineering •Skills Python AOI MES EAP C++ C# Linux Windows Docker Node.js Node-RED Word Database Language Chinese — Native Language English — Technical Document Listening, Speaking, Reading, Writing Summary of Personal Python Programming Experience I am a developer with extensive experience in Python programming, specializing in the
Python
AOI
MES
Employed
Ready to interview
Full-time / Remote Only
10-15 years
崑工科技大學
電子工程

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.