CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of Andrea Chuang.
Avatar of Andrea Chuang.
Director, Lab of next-generation sequencing @Stork Fertility Center
2018 ~ Present
RD
Within three months
Accreditation Foundation (TAF) Lab Director, Auditor LDTs Medical Lab Taiwan Genomics and Genetics Society (TGGS) Technologist, Reporting and Issuing Int Medical Technologist American Society for Clinical Pathology (ASCP) Medical Technologist (ASCPi) Education National Taiwan University, Graduate institute of clinical medicine Doctor of Philosophy • FebMar 2024 Research Topic: Mitochondria, Regression models, Machine learning New South Wales University (Australia), Graduate school of biomedical engineering Master exchange • JunJun 2011 Research Topic: Perlecan purification and analysis (Human colorectal cance model) National Taiwan University, Graduate institute of Clinical Laboratory Master of Medical technology •Research Topic: Acute leukemia, Erythroblastosis, Telomeres National Taiwan University, Clinical Laboratory and
Employed
Open to opportunities
Full-time / Not interested in working remotely
10-15 years
National Taiwan University
canditate, Graduate institute of Clinical medicine
Avatar of the user.
Avatar of the user.
Senior Product Manager @KKday
2022 ~ Present
產品經理
Within one year
Axure RP
hotjar
Google Analytics
Employed
Full-time / Interested in working remotely
4-6 years
國立台北教育大學
藝術與造型設計 產品設計組
Avatar of 蔡采潔.
Avatar of 蔡采潔.
工程師 @Taiwan Semiconductor Manufacturing 台灣積體電路製造股份有限公司
2023 ~ Present
全端/後端工程師
Within three months
and completed the backend project « Never Stra y» (See Projects) • Enhanced communication skills through collaboration with Front-End and iOS members on «Stylish» • Adopted Agile and Scrum Methodology for personal project development to deliver features on time Research Assistant • National Chiao Tung University MarJul 2019 • Wrote the paper based on Machine Learning for computer-aided diagnosis and prepared the submission to international journals Assistant R&D engineer • Ever Fortune.AI NovFeb 2019 • Adjusted deep learning models and parameters with Python • Established x-ray labeling system for doctors Trainee • Wanin International FevJun 2016 • Developed the bee and Rockman games in
Python
JavaScript
CSS
Employed
Not open to opportunities
Full-time / Interested in working remotely
4-6 years
National Chiao Tung University
Bioinformatics and Systems Biology
Avatar of the user.
Avatar of the user.
Lead Data Scientist @Welhunt
2021 ~ Present
Data Scientist, Data Analyst, Machine Learning Engineer
Within one year
Python
AWS
Machine Learning
Employed
Not open to opportunities
Full-time / Not interested in working remotely
4-6 years
National Yang Ming Chiao Tung University
Biomedical Informatics
Avatar of 장윤식.
More than one year
descent algorithm이나 Overfitting을 피하기 위해서 적용 기법 학습. Education 서울과학기술대학교 문예창작학과 전공, IT 융합 소프트웨어 전공Skills Artificial Intelligence Machine Learning Deep learning with TensorFlow Django Spark JAVA Project 피부 고민을 입력해봐 앱 : TF-IDF, BERT 활용 django 기반 화장품 추천 웹 앱 투자 유지 100억 이상 회사 복지 검색 앱
Artificial Intelligence
Machine Learning
Deep learning with TensorFlow
Intern / Interested in working remotely
More than 15 years
서울과학기술대학교
문예창작학과 전공, IT 융합 소프트웨어 전공
Avatar of Danny_Teng.
Avatar of Danny_Teng.
Software Engineering Section Manager @仁寶
2023 ~ Present
Lead Designer, Senior Consultant, Design Manager
Within one month
systems for IoT products on manufacturing lines, successfully applied to 37 IoT products, including smart meters, smart gym machines, and medical equipment, for quality monitoring and functional testing. -Collaborated closely with manufacturing teams and customers to enhance the ODM production process. -Developed instrument control programs for various measuring instruments, enabling programmatic control for smart manufacturing, encompassing digital power meters, Keysight Generators, and Anritsu RF instruments. -Led the development of the function testing program for the smart home gym machine (Tonal) and defined testing specifications for board function and assembly function. -Engineered automated to...
Python
Docker
DevOps
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Taipei University of Technology
電機系
Avatar of the user.
Front-End / Back-End / Full Stack Web Developer
More than one year
JavaScript
AngularJS
jQuery
Employed
Full-time / Interested in working remotely
4-6 years
NTUT
CSIE

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.