CakeResume 找人才

進階搜尋
On
4 到 6 年
6 到 10 年
10 到 15 年
15 年以上
Avatar of Syahrul Ramadhan.
Avatar of Syahrul Ramadhan.
Supervisor @PT Adhya Mira Pasifik
2022 ~ 現在
Supervisor/Pengawas
一個月內
mengoperasikan program keuangan seperti Accurate dan software penunjang lainnya seperti Microsoft Office (Excel Advance), Outlook, Ms Team. Mengolah data menggunakan software seperti SQL, Tableau, Power BI, Basic Phyton. Menguasai basic design graphic untuk editing demi kebutuhan konten sosial media, seperti Photoshop dan Canva. Serta sedikit menguasai AI (Artificial Intelligence) tools sebagai penunjang pekerjaan. Finance Staff • PT Swadana Inservtama OktoberApril 2022 | Jakarta Barat Mengolah data konsumen agar dapat di proses untuk penagihan dan laporan keuangan perusahaan. Melakukan pencatatan penagihan dan piutang external (AP – AR). Memproses lebih lanjut data serta pembayaran untuk keperluan Asuransi. Melakukan
Accurate Accounting Software
SQL/MySQL
Tableau Visualizations
就職中
正在積極求職中
全職 / 對遠端工作有興趣
4 到 6 年
Universitas Tarumanagara
Industrial Engineering
Avatar of the user.
Avatar of the user.
曾任
Head Product Operation Manager - GAMES, Southeast Asia @OPPO Indonesia
2021 ~ 現在
Project Manager, Product Operations, Product Support, Program Manager
一個月內
Microsoft Office
Figma + Canva
Trello
待業中
正在積極求職中
全職 / 對遠端工作有興趣
6 到 10 年
BINUS University
Computer Science
Avatar of the user.
Avatar of the user.
曾任
Freelance @j172.tw
2024 ~ 現在
Project Manager、PM、專案經理、UX、網站企劃、產品企劃
一個月內
C#
vue.js
JavaScript / ES6 / jQuery
待業中
正在積極求職中
全職 / 對遠端工作有興趣
10 到 15 年
Shih Hsin University
Depatment of Information Mangement,Group of Information Technology
Avatar of 廖廷浩.
Avatar of 廖廷浩.
Software Engineer @Amazon Web Services (AWS)
2023 ~ 現在
資深前端工程師、資深後端工程師、全端工程師
一個月內
and entrepreneurship competition during the school year is "Cloud Internet of Things and Identity Recognition", which requires the use of Microsoft RMS system, C#, fingerprint identification, AES encryption, and Word watermarking. The competition won the bronze medal. During the semester, I took a case, the theme is artificial intelligence and chat robots, which requires the use of website front-end, back-end development, database design, AI semantic analysis, android, Ios development, and the completion time is about 6 months. With more than 3 years of experience in receiving cases, the one-stop service in the past
Excel
C#
flutter
就職中
正在積極求職中
全職 / 對遠端工作有興趣
4 到 6 年
Tamkang University
資訊工程學系
Avatar of Chang, Chung-Ho.
Avatar of Chang, Chung-Ho.
Senior Software Engineer @CPC Corporation, Taiwan
2018 ~ 現在
Sr. Software Engineer, Project Manager
兩個月內
I prioritize maintainable code, leading to extensive refactoring during my tenure. I find satisfaction when functionalities I develop benefit users, hence my earnest discussions with users about their usage scenarios honed through extensive interpersonal experiences during my military service. In the future, I aspire to deepen my expertise in software development while branching into DevOps and artificial intelligence fields, approaching this with an open-minded attitude. I hope for the opportunity to collaborate with your team and contribute unique value to the company! Best regards, Chang, Chung-Ho Work Experience 07/Present Se...
C#.NET development
T-SQL
Vue.js
就職中
正在積極求職中
全職 / 對遠端工作有興趣
6 到 10 年
San Diego State University
Avatar of 許瑋庭.
Avatar of 許瑋庭.
平面設計師 @橘焱胡同國際股份有限公司
2023 ~ 現在
平面設計/視覺設計
兩個月內
store card/menu/DM/other promotional materials) - Design of store decoration products (signboards/paintings/door curtains/guidance signs) - Matters assigned by supervisor I currently work for a restaurant group and am responsible for all brand design items. I am also very interested in artificial intelligence, fashion, and the pet industry. 嗨,我是勞倫。 現職為平面設計師。 大學畢業後,曾任職6~7年的全端工程師(包含dba),之後轉職為平面設計
Adobe Photoshop
Adobe Illustrator
Adobe InDesign
就職中
正在積極求職中
兼職 / 對遠端工作有興趣
6 到 10 年
Ching-Yun University
資訊管理學系
Avatar of GISH Shao.
Avatar of GISH Shao.
AI Engineer/系統開發工程師 @中信金控_台灣人壽保險股份有限公司
2022 ~ 現在
AI Engineer
一個月內
— GISH G SUMMARY Aiming to be a data scientist unicorn who excels at applied machine learning in a business/finance-related field. DevOps Engineer(Python) for Automatic Claim Processor (ACP) - OCR System (Hospital Diagnosis/Receipt). Applying tree-based algorithms to model Credit Scoring predictions in the finance industry. Achieving Hyperautomation through AI and RPA, which uses a special set of tools to automate tasks. Working Experience NovNow Artificial Intelligence Engineer @ CTBC Taiwan Life Insurance AI Team DevOps Engineer(Python) for Automatic Claim Processor (ACP) - OCR System (Hospital Diagnosis/Receipt) 1.
Python
SQL
就職中
正在積極求職中
全職 / 對遠端工作有興趣
4 到 6 年
國立台灣大學 National Taiwan University
Business Administration
Avatar of 廖祐成.
Avatar of 廖祐成.
曾任
security @誠品
2020 ~ 現在
Business Development Manager
一個月內
economy保持國民經濟發展的良好勢頭 maintain a good momentum of growth in the national economy報國計劃的實施 implementation of Dedicator's Project國際人工智慧與法律學會(International Association for Artificial Intelligence and Law, IAAIL)機械学習技術“Machine(機械)”“Human(人)”“Humachine”AI(Artificial Intelligence:人工知能)AIIoT先進ICT活用宏觀經濟穩定(Macroeconomic stability)健康及教育(Health and primary education)奈米生
Word
PowerPoint
Excel
待業中
正在積極求職中
全職 / 對遠端工作有興趣
6 到 10 年
政治大學
智慧財產&科技管理
Avatar of the user.
Avatar of the user.
Director of Integrated Marketing Center @財團法人人工智慧科技基金會
2023 ~ 現在
PM/產品經理/專案管理
一個月內
Microsoft Office
iOS
trello專案管理
就職中
目前會考慮了解新的機會
全職 / 對遠端工作有興趣
10 到 15 年
Shih Chien University
企業管理系
Avatar of Sayed Mohammad Ahmadi.
Avatar of Sayed Mohammad Ahmadi.
Data Analyst & IoT Software Developer @FARAZ ERTEBAT
2021 ~ 現在
Computer Vision / Deep Learning
一個月內
Computer Vision | Object Detection | Face Recognition | TensorFlow | PyTorch | Django | C# | WCF | Micro-Services | MicroControllers | Arduino | IoT Work Experience Data Analyst & IoT Software Developer • FARAZ ERTEBAT AugustPresent - Software Developer using C++ and Python - Working with Qt - Including projects such as: • Development of 3G, 4G, and 5G mobile core • Artificial intelligence-based detection of toxins or healthiness of fish aquariums • Cargo vehicle tracking and IoT-based navigation technologies. Phd Student Lecturer • University of Qom SeptemberJulyPhD Student 2. Thesis Title: ""Control the accuracy reduction rate due to the increase in the number of classes in face recognition" 3
C#
C/C++
MySQL
就職中
目前會考慮了解新的機會
全職 / 對遠端工作有興趣
4 到 6 年
University of Qom
Information Technology | Face Recognition

最輕量、快速的招募方案,數百家企業的選擇

搜尋履歷,主動聯繫求職者,提升招募效率。

  • 瀏覽所有搜尋結果
  • 每日可無限次數開啟陌生對話
  • 搜尋僅開放付費企業檢視的履歷
  • 檢視使用者信箱 & 電話
搜尋技巧
1
嘗試搜尋最精準的關鍵字組合
資深 後端 php laravel
如果結果不夠多,再逐一刪除較不重要的關鍵字
2
將須完全符合的字詞放在雙引號中
"社群行銷"
3
在不想搜尋到的字詞前面加上減號,如果想濾掉中文字,需搭配雙引號使用 (-"人資")
UI designer -UX
免費方案僅能搜尋公開履歷。
升級至進階方案,即可瀏覽所有搜尋結果(包含數萬筆覽僅在 CakeResume 平台上公開的履歷)。

職場能力評價定義

專業技能
該領域中具備哪些專業能力(例如熟悉 SEO 操作,且會使用相關工具)。
問題解決能力
能洞察、分析問題,並擬定方案有效解決問題。
變通能力
遇到突發事件能冷靜應對,並隨時調整專案、客戶、技術的相對優先序。
溝通能力
有效傳達個人想法,且願意傾聽他人意見並給予反饋。
時間管理能力
了解工作項目的優先順序,有效運用時間,準時完成工作內容。
團隊合作能力
具有向心力與團隊責任感,願意傾聽他人意見並主動溝通協調。
領導力
專注於團隊發展,有效引領團隊採取行動,達成共同目標。
兩個月內
Research Assistant
Academia Sinica
2021 ~ 現在
Tainan, 台灣
專業背景
目前狀態
就職中
求職階段
專業
產業
工作年資
小於 1 年
管理經歷
技能
Python
C#
C
TensorFlow
PyTorch
Bash scripting
Neo4J
Linux Shell
語言能力
English
中階
求職偏好
希望獲得的職位
PHD Student
預期工作模式
全職
期望的工作地點
United States
遠端工作意願
對遠端工作有興趣
接案服務
學歷
學校
National Chung Cheng University
主修科系
Computer Science and Information Engineering
列印

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C
履歷
個人檔案

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C