CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of Stephen Hsu.
Avatar of Stephen Hsu.
Past
Senior Test programmer @Robert Bosch GmbH
2022 ~ 2023
測試或資安專責人員
Within one month
Stephen Hsu I have in-depth knowledge of ISO27001, IEC62443, ETSI EN, NIST, CSF 2.0, and GDPR standards. I have extensive experience in architecture design, detailed design, development, defense in depth, and implementation of information security solutions, especially in internal audits within organizations, system implementation, and planning, implementation, and problem-solving throughout the product project lifecycle. Furthermore, I have significant work experience with Windows and Linux platforms, applying them to manual and automated testing solutions for product functionality and security. Taoyuan City, Taiwan Certifications and related courses Information Security Certification ISC2 CC (certified in cybersecurity
QA Automation
Test Driven Development
Test Management
Unemployed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
Concordia University
Master of Business Administration (M.B.A.)
Avatar of the user.
Avatar of the user.
Past
Software Project Manager @Askey Computer Corp.(Asus Group), Taiwan,
2020 ~ 2023
Project Manager、Software Project Manager、Product Manager
Within one month
Embedded System
Microsoft Embedded
Python
Unemployed
Ready to interview
Full-time / Interested in working remotely
10-15 years
Tamkang University
Water Resources and Environmental Engineering
Avatar of Jaron Cheng.
Avatar of Jaron Cheng.
Software Validation & Quality Assurance Senior Manager @Marvell Technology
2020 ~ Present
QA automation engineer / Software development engineer in test
Within one month
Jaron Cheng New Taipei City, [email protected] https://www.linkedin.com/in/jaroncheng/ Hi, my name is Jaron, I'm the senior manager, software validation and quality assurance at Marvell. I've been dedicated to SOC software development in the field of server and industrial storage for over a decade. Now I'm seeking for new opportunity of engineering role - Software, please feel free to arrange a meeting with me if my expertise meets your requirements. Thank you. Work Experience Software Validation & Quality Assurance Senior Manager
PowerPoint
Excel
Word
Employed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
Yuan-Ze University
Electrical Engineering
Avatar of the user.
Avatar of the user.
資深軟體工程師 @畢竟科技股份有限公司
2022 ~ Present
Software Manager / Senior Backend Engineer
Within one month
Golang Backend
Python
ElasticSearch
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
國立暨南大學
財務金融學系
Avatar of Wesley Liu.
Senior Software Engineer
Within one month
CHIEN HUNG, LIU Software Engineer | Quality Assurance | Industrial Electromechanical Control A software engineer with over ten years of experience in quality assurance for IBM Security products. Possessed comprehensive QA skills, including system administration and integration, security, test infrastructure, networking, automation, and Python programming. Also experienced in collaborating with teams across countries and cultural boundaries. In 2018, joined IBM Cloud as a DevOps Engineer in Shanghai and worked there untilRecently completed industrial electromechanical control training and obtained certifications in www.linkedin.com/in/wesley990 [email protected] Areas of professional skills Test
Automation
DevOps
Python
Ready to interview
Full-time / Interested in working remotely
6-10 years
National ChangHua University of Education
Computer Science
Avatar of P.Koteswar.
Avatar of P.Koteswar.
Cloud Services Manager @AIA
2021 ~ 2022
DevOps Engineer, Site Reliability Engineer
Within one month
AWS CloudWatch, Azure LogAnalytics Azure Monitor, Kibana, Thanos, Graylog , Opsgenie , Slack Network & Security Istio Service Mesh, SSL and TLS Certs Network Firewalls Ingress & Egress Controllers Routing, TGW and VPC Peering Infra As Code Terraform Terragrunt Go Lang ARM Templates, AWS CloudFormation Database Administration PostgreSQL MongoDB DynamoDB MSSQL Scripting python Scripting Bash & Shall Scripting :: Work Experience:: Skyflow Inc. FebruaryPresent Engineering Lead | SRE A WS | Kubernetes | Argo CD | Istio | Go Lang | GitLabs | Terraform | Terragrant| PGsql Manage the overall design and implementation of secure, scalable, and fault-tolerant infrastructure Managing and Automating Infrastructure Using Terraform, Terragrunt and Go Scripting. Deploying and
DevOps / CI / CD
Site Reliability Engineering
Terraform/Ansible/Jenkins
Employed
Ready to interview
Full-time / Interested in working remotely
10-15 years
Sikkim Manipal University
Information Technology
Avatar of the user.
Avatar of the user.
Past
CTO @龍盛
2018 ~ Present
PM/產品經理/專案管理
Within one month
MySql
PHP
Laravel
Unemployed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
勤益科技大學
工業工程管理
Avatar of Johnny Tsai.
Avatar of Johnny Tsai.
工程師 @富士康工業互聯網股份有限公司
2022 ~ Present
SRE / DevOp engineer / Backend engineer
Within one month
師擔任SRE、後端工程師的角色。 -負責系統共用功能 ( Spring Boot、Restful API) 開發 -協助導入容器 ( Docker ) -日誌監控 (ELK、Prometheus、Grafana) -負責CI/CD 維護更新 (Jenkins、Bash、Redmine) -解決線上問題 中壢資策會 JAVA雲端開發養成班 擔任組長 - 旅遊網站開發 - 教同學如何將憑證應用在GCP 專案經歷 鴻海科
Java
Spring Boot
Linux
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
國立勤益科技大學 National Chin Yi University of Technology
資訊工程
Avatar of 楊國呈(Adler Yang).
Avatar of 楊國呈(Adler Yang).
Past
Staff Customer Applications Engineer @MaxLinear
2022 ~ 2023
Staff Engineer
Within one month
integration and performance. Collected network metrics from the OpenWRT platform using InfluxDB , and visualized them on a customized Grafana dashboard for enhanced network monitoring and analysis. Debugged and resolved customer’s platform software issues Write readable design documents and user manuals application note. Skills: C, Python, Linux, Bash, TCP/IP, Front-end development, OpenWRT and PrplOS 2017/03 – 2022/02 (5 Years) Taipei, Taiwan Software Engineer Inforich資富電子 Develop and maintain a P2P VPN web management system for OpenWRT routers including a web-based management system and a P2P-based NAT
C
Python
Linux
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
National Chi Nan University
Computer Science & Information Engineering
Avatar of WU YI-HONG.
Avatar of WU YI-HONG.
Engineer @NEXCOM International Co., Ltd.
2023 ~ Present
工程師
Within one month
WU YI-HONG 1. Name: Yi-Hong, Wu Region: New Taipei, Taiwan Phone Number:E-mail: [email protected] Other Contact Method: LINE ID:wuuemingWhatsapp:Telegram:WeChat: wuuemingGithub: https://github.com/YeeHong HackMD: https://hackmd.io/@ebCv20MXS0y-pa8XsRnrOw 2. Skills Programming: Python, Docker, C, C++, bash Operating System: Linux (server building, network management) Tool: Docker, Git, SVN Languages: Mandarin, Hokkien, English, Cantonese (Little) Engineer Taipei,Taiwan [email protected] Work Experience NEXCOM International Co., Ltd., Engineer, Dec 2023 ~ Current Job description
Linux
Bash
Docker
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
National ChangHua University of Education
Information Management

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Within two months
Research Assistant
Academia Sinica
2021 ~ Present
Tainan, 台灣
Professional Background
Current status
Employed
Job Search Progress
Professions
Fields of Employment
Work experience
Less than 1 year
Management
None
Skills
Python
C#
C
TensorFlow
PyTorch
Bash scripting
Neo4J
Linux Shell
Languages
English
Intermediate
Job search preferences
Positions
PHD Student
Job types
Full-time
Locations
United States
Remote
Interested in working remotely
Freelance
No
Educations
School
National Chung Cheng University
Major
Computer Science and Information Engineering
Print

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C
Resume
Profile

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C