CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
技術經理 @SYSTEX 精誠資訊
2021 ~ Present
Hybrid Architect and Backend Engineer
Within one month
Golang
Oracle Database
PostgreSQL
Employed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
臺灣國立空中大學
法律專班
Avatar of the user.
Avatar of the user.
Past
Staff Software Engineer @VicOne (A subsidiary of Trend Micro)
2021 ~ 2023
軟體工程師
Within one month
C++
C
Python
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
Yuan Ze University
Electrical Engineering (Group: Digital Technology)
Avatar of Mohammed Mufti.
Avatar of Mohammed Mufti.
Past
Senior Member Of Technical Staff @Amadeus
2012 ~ 2019
Senior Member Of Technical Staff
Within six months
Mohammed Mufti Senior C++ Developer C++ Developer with 18 years of experience with in-depth expertise in system / application programming, designing and debugging. Worked on varied technologies both on windows and Linux platform from User application to System Programming. Started working for Azure Software Pvt. Limited and expanded working expertise with Microsoft and Amadeus. Professional Summary :Have expertise in use of modern C++ (C++ 14/17/20) including areas like functional C++, template metaprogramming and template specialization and threading. Have in-depth
C
C++
STL
Unemployed
Full-time / Interested in working remotely
More than 15 years
Indira Gandhi National Open University(IGNOU)
Computer Science
Avatar of 陳柄宏.
Avatar of 陳柄宏.
Staff Cloud Architect Enginner @域動行銷股份有限公司
2023 ~ Present
雲端工程師,雲端架構師,數據架構師
Within one month
CHEN, PING-HUNG 陳 柄 宏 Cloud Data Engineer New Taipei City, Taiwan I hold certifications for both AWS and Azure platforms, and have been continuously deepening my knowledge in cloud computing. I am skilled in using Python programming language for data science-related tasks and automation operations. I have participated in big data projects such as smart transportation and real estate prediction, and I aspire to not only leverage my current skillset but also to be part of a team that encourages learning and growth for future [email protected] Skills Python Program writing
git
hadoop ecosystem
MongoDB
Employed
Not open to opportunities
Full-time / Interested in working remotely
4-6 years
輔仁大學
圖書資訊
Avatar of the user.
Avatar of the user.
高級工程師 @Zyxel Networks_兆勤科技股份有限公司(合勤集團)
2019 ~ Present
Software Engineer
Within one month
Python
Linux
Shell
Employed
Ready to interview
Full-time / Not interested in working remotely
6-10 years
元智大學
資訊工程
Avatar of 陳勤霖.
Avatar of 陳勤霖.
Past
博士後研究員 @洛桑大學神經發育疾病實驗室
2023 ~ 2023
Data Scientist, Data Analyst, Machine Learning Engineer
Within one month
訊號分析、神經細胞追蹤分析,與藥理試驗。 2. 研究論文撰寫與國際研討會的舉辦。 技能 Data Science Data Analysis, Image Analysis, Machine Learning, Deep Learning, Statistical Analysis, Data visualization Programming Python, PyTorch, NumPy, Pandas, Matplotlib, Scikit-Learn, Git, PostgreSQL, Docker Biotechnology Neuroscience, Genetics, Imaging, Scientific Writing Soft skill Project Management, Probelm Solving, Team Player, Proactive Communication 語言 English — 專業 Chinese — 母語或雙語 French — 初階 學歷 洛桑聯邦理工學
Data Science
Data Analysis
Machine Learning
Unemployed
Ready to interview
Full-time / Interested in working remotely
4-6 years
洛桑聯邦理工學院(EPFL)
神經科學
Avatar of 鄭凱元.
Avatar of 鄭凱元.
AI Engineer @TSMC 台積電
2022 ~ Present
AI工程師、機器學習工程師、深度學習工程師、資料科學家、Machine Learning Engineer、Deep Learning Engineer、Data Scientist
Within one month
resolution for wafer patch enhancement Computer vision algorithm development. Machine Learning Engineer (Computer Vision), VIVOTEK, 2019//4 Neural Network architecture design and optimization. Computer vision algorithm development. Mechanical Engineer (Vehicle Chassis), HAITEC, 2016//4 Design and develop steering wheel and airbag. SKILLS Programming Python C++ Development Tools PyTorch OpenCV Linux Docker Git Domain knowledge Super resolurion Object detection Face detection and recognition Machine Learning Web Crawling EDUCATION INSTITUTE FOR INFORMATION INDUSTRY Data Engineering and Data Analytics Intensive Training Program (2018//11) NATIONAL TAIWAN UNIVERSITY (NTU) Master of Mechanical
Python
machine learning
Linux
Employed
Full-time / Interested in working remotely
4-6 years
國立臺灣大學 (National Taiwan University)
機械工程研究所
Avatar of Chun Liu (Phoe).
Software Engineer
Within one month
術,能快速吸收新技術以進行系統開發和創新。 Education 國立暨南國際大學 資訊工程系 碩士 Computer Science and Information EngineeringMaster's DegreeBachelor's Degree Skills C/C++ Python Linux Kubernetes Docker Networking IPv6 Languages Chinese — Native English — Fluent Skills Skills Keywords Overview Descriptions Programming C/C++ Python System Level Programming, Scripting, Data Processing 熟悉以 C/C++ 和 Python 進行系統應用開發。 System Management Linux
C
C++
Python
Studying
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立暨南國際大學(National Chi Nan University)
Computer Science and Information Engineering
Avatar of Quoc Nguyễn.
Avatar of Quoc Nguyễn.
Software Developer @TMA Solutions
2021 ~ Present
Software Engineer / Backend Engineer
Within one month
Overall Position: DevOps + Backend Back-end Developer Intern • FPT Software JanMay 2020 # Cosmetic management system - Japanese customer: The project that help design a system to efficiently handle cosmetic inventory, employees , and voucher systems. Scale: 50+ people Technologies: Java (Spring boot) PostgreSQL MyBatis Roles and Responsibilities: Backend: Implement back-end API server with PostgreSQL and MyBatis mapping. Overall Position: Backend Skills Programming language: Python (Script and Flask), Java (Core and Spring Boot) Database : MariaDB, MySQL Containerize : Docker Scale, deploy and manage application: Kubernetes, Helm Installation: Ansible playbooks Basic knowledge: Automation test (Robot framewo...
Python
Git
Java
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
FPT University
Computer Software Engineering
Avatar of 陳信中.
Avatar of 陳信中.
Past
網頁程式開發(後端) @Evision Solution
2019 ~ 2021
Software Engineer
Within one month
HHIN-CHUNG CHEN - Familiar with large data querymillion+, oracle) - Intermediate skill on Front-End Developing. ( HTML, CSS ) - Advanced skill on Back-End Developing. ( PHP, Node JS, Python ) - Transnational cooperation with medium-sized team. ( about 20+ teammates ) - Always have strong willing to learn. Background: - E-commerce platform in Taiwan. - Warehouse manage system in China. Software Engineer Taipei Special Municipality,TW [email protected] 主要技能 Program Language: PHP Framework: ThinkPHP(5.1), Laravel(5.4) Database: Oracle, MySql Vsersion Control: Git, SVN 其他技能 Programming
PHP
NodeJS
Git
Unemployed
Full-time / Remote Only
6-10 years
National University of Kaohsiung
Computer Science and Information Engineering

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Senior Researcher
TXOne Networks, inc.
2021 ~ Present
Taiwan
Professional Background
Current status
Employed
Job Search Progress
Professions
Research / R&D
Fields of Employment
Cyber Security
Work experience
2-4 years work experience (6-10 years relevant)
Management
None
Skills
C++
C
Assembly Language
Node.js
JavaScript
c#
python
X86 Assembly
Security
Exploit
Cyber Security
Languages
Chinese
Native or Bilingual
English
Fluent
Job search preferences
Positions
Security Researcher
Job types
Full-time
Locations
Taiwan
Remote
Interested in working remotely
Freelance
No
Educations
School
National Taiwan University of Science and Technology
Major
Computer Science
Print

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.

Resume
Profile

Ma Sheng Hao

Cyber Security

Sheng-Hao Ma(@aaaddress1) is currently working as a senior researcher at TXOne Networks, specializing in Windows reverse engineering analysis for over 10 years. In addition, he is currently a member of CHROOT, an information security community in Taiwan. 


He has served as a speaker and instructor for various international conferences and organizations, such as Black Hat USA, DEFCON, CODE BLUE, HITB, VXCON, HITCON, ROOTCON, Ministry of National Defense, and Ministry of Education. He is also the author of the popular security book "Windows APT Warfare: The Definitive Guide for Malware Researchers".

  Taipei, Taiwan

[email protected]

+886 973 850 620

             

Skills

Professional Skills


  • Reverse Engineering
  • Malware Analysis (Windows & Linux)
  • IoT Malware (Embedding Linux)
  • Compiler Techniques
  • Operating System
  • Machine Learning
    • Neural Network based Model 
    • Word2Vec
    • Asm2Vec
  • Windows Security
    • Exploit
    • Pwn
    • Elevation of Privilege (EoP)
    • AntiVirus Bypassing

Programming Languages


  • x86
  • C/C++
  • C#
  • Python
  • Javascript

Publication


  • Windows APT Warfare: The Definitive Guide for Malware Researchers

Instructor


  • from Zero to Windows Shellcode Expert
  • Windows Malware Analysis In Practice
  • Linux Pwn: from Buffer Overflow to RoP

Experience

March 2021 - Present

Senior Researcher

TXOne Networks, inc.

Research the exploits used by the trendy Ransomware family e.g.  REvil, and vulnerabilities used by national-level cyber armies, like CVE-2021-40444.  Also develop a semantic-aware Binary decompiler engine and published it in Black Hat USA and CODE BLUE.

November 2020 - January 2021

Security Researcher

CyCraft

Served as Contractor to research methods on memory forensic and investigation in identifying malware signature, along with methods of how Microsoft Windows weakness on WoW64 layer could be abused by hackers; researched mono project and made a .NET binary analysis engine in C++.

January 2015 - January 2016

Malware Researcher

Ministry of Justice Investigation Bureau (MJIB)

Doing reversing engineering on that malware attacking Taiwan government, and writing reports about the behavior of the APT organization and conscious intention.

Speaker

Education

2018 - 2020

National Taiwan University of Science and Technology

Computer Science - Master

2014 - 2018

I-Shou University

Computer Science - Bachelor

Projects

RunPE In Memory

github.com/aaaddress1/RunPE-In-Memory・538 Stars

Run Windows PE File directly in memory like an Application Loader.

PR0CESS

github.com/aaaddress1/PR0CESS・513 Stars

Abuse the Windows internal process design to achieve wild attacks used by APT groups e.g. Process Herpaderping, Process Ghosting, UAC Bypassing.

Skrull

github.com/aaaddress1/Skrull・408 Stars

Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted.

wowInjector

github.com/aaaddress1/wowInjector・144 Stars

Inject payload to WOW64(Windows 32 on Windows 64) process via exploit 32-bit thread snapshot. This trick makes us possible to do malicious attacks and bypass Antivirus agents at the same time, e.g. Injection, Hollowing, Dropper, etc.

It's a proof-of-concept of the talk of HITB 2021. There are more details about reversing the whole WOW64 layer by Microsoft and abuse, see Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland.