CakeResume Talent Search

Advanced filters
On
4 à 6 ans
6 à 10 ans
10 à 15 ans
Plus de 15 ans
United States
Avatar of Ethel Alston.
OWNER
Dans 3 mois
don’t stress Best Security Services • ussmmstore AprJan 2020 Our created and provided every account is verified and safe We provide services after payment in very short time a, Investment of our company is about and being ready to invest more and this upcoming investment will be dependent on your love for Ussmmstore. Education University or School Field of study AprJan 2020 University or School Field of study AprJan 2020 Skills Word C# Java Canva C/C++ Excel CCNA ERP C++ Git PHP vb6 IOS OOP C CSS SQL AWS Languages English — Professional
Word
C#
Java
Au service militaire
Prêt à l'interview
Temps plein / Intéressé par le travail à distance
Plus de 15 ans
Avatar of the user.
Avatar of the user.
智慧製造全端開發工程師 @聯華電子股份有限公司
2022 ~ Présent
AI工程師、機器學習工程師、深度學習工程師、影像演算法工程師、資料科學家、Ai Application Engineer,Machine Learning Engineer,Deep Learning Engineer,Data Scientist
Dans 1 mois
Python
Qt
Git
Employé
Prêt à l'interview
Temps plein / Intéressé par le travail à distance
4 à 6 ans
元智大學 Yuan Ze University
工業工程與管理學系所
Avatar of 吳宇婷.
Avatar of 吳宇婷.
Past
Senior Software Engineer @仁寶電腦 Compal
2021 ~ Présent
Cloud Engineer、Project Management
Dans 1 mois
years of coding experience in different domains, such as IoT integration, E-commerce application, and medical products. In the future, I hope to work in an organization that can utilize my skills as a software developer and enhance project management. Focus on backend development 6+ years of C#, 3+ years of Python , 2+ years of Node.js 3+ years of project management 2 + years of Cloud management 3+ years of HL7 FHIR Standard Taipei City, Taiwan Skills Python, Nodejs, C#, React, MySQL, PostgresSQL, MongoDB, Redis, Docker, Azure, AWS , Docker
Engineering
Photoshop
IllustratorCS4
Sans Emploi
Prêt à l'interview
Temps plein / Intéressé par le travail à distance
6 à 10 ans
國立陽明交通大學
生物醫學資訊
Avatar of Ryan Chen.
Avatar of Ryan Chen.
Software Engineer @Innova Solutions Taiwan
2022 ~ Présent
Software Engineer / Backend Engineer
Dans 1 mois
Ryan Chen 陳冠瑋 Software Engineer | Backend Engineer I enjoy coding and learning new skills, and striking a work-life balance, Finding problems and solving them, and try to write a clean and reliable code. Skill Language C# JavaScript Go TypeScript Dev Framework ASP.NET Core(.NET 6) .NET Framework Winform ASP.NET Webform ABP Framework(.NET) React Database MS SQL MySQL Firestore Redis Others Git Flow Docker Jira Azure GCP Gitlab Jenkins WorkExperience Software Engineer Innova Solutions Taiwan AugNow Taipei, Taiwan,(Remote) Design & Develop Healthcare System (include FE & BE) Using GCP
.NET Core
SQL/MySQL
Github
Employé
Prêt à l'interview
Temps plein / Intéressé par le travail à distance
4 à 6 ans
國立臺北商業大學 National Taipei University of Business
Information Management
Avatar of Davide Biasin.
Avatar of Davide Biasin.
Past
ASP.NET Developer @LandCareResearch
2020 ~ 2020
Senior Software Engineer
Dans 2 mois
Next.js. • Implemented Live Chat Community with Socket.IO • Database modelling and implement models into MongoDB ASP.NET Developer LandCareResearch JanuaryNovember 2020Taipei, Taiwan 1.简单的页面和导航 2.输入填表(PEST资料) 3.把报告单换成PDF然后下载 Skills Excel Communication C# Java MySQL C/C++ python PHP AWS ReactJS Node.js / Express.js Golang Languages Chinese — Native or Bilingual English — Native or Bilingual EducationUniversity of Science and Technology Beijing Computer Science
Excel
Communication
C#
Sans Emploi
Prêt à l'interview
Temps plein / Uniquement Travail à distance
6 à 10 ans
University of Science and Technology Beijing
Computer Science
Avatar of Bobby Kalaf.
Developer / Programmer / Consultant
Plus d'1 an
Bobby Kalaf Developer / Programmer / Consultant • Atlanta, US • [email protected] Passionate about technology and it's use in making our lives easier, more productive, and more interconnected - constantly seeking to find the most advantageous balance between the scholarly ideals (for example, pure functions or design pattern), operational efficiency (ROI and scalability), and long-term maintainability and expansion (maintainable and testable code). Experience Dysfunctional Development, LLC , JunePresent Dysfunctional Development, LLC, JunePresent DD's core client is a small business with less than 10 employees or an individual (self-employed, retired, but non-technical) and
Excel
F#
c#
Prêt à l'interview
Temps plein / Intéressé par le travail à distance
6 à 10 ans
University of California, Los Angeles
Astrophysics
Avatar of Get Galatea mod apk unlimited Points.
Dans 1 mois
Get Galatea mod apk unlimited Points https://twitter.com/galatea_points https://facebook.com/galatea.points.generator/ CHECK HACKS HERE ---> https://safecode.info/galatea/ Are you a passionate Galatea reader looking to expand your horizons within the app? Look no further! Our Galatea Points Cheat Generator is here to revolutionize your reading experience. With our innovative tool, you can effortlessly unlock 250 free points, granting you access to a plethora of premium content without breaking the bank. Unveiling the Secrets Behind Our
PowerPoint
C#
Employé
Ouvert à de nouvelles opportunités
Temps plein / Uniquement Travail à distance
10 à 15 ans
Avatar of the user.
Avatar of the user.
Senior Analyst, Software Engineer @Synpulse Taiwan Ltd. | 星普思管理諮詢有限公司
2022 ~ Présent
Software Developer
Dans 1 mois
JavaScript
ASP.NET MVC
HTML5
Employé
Ouvert à de nouvelles opportunités
Temps plein / Intéressé par le travail à distance
4 à 6 ans
Queensland University of Technology(昆士蘭科技大學)
Computer Science
Avatar of Henry Lee.
Avatar of Henry Lee.
Software Engineer II @Paypal
2021 ~ Présent
Software Engineer / Backend Engineer
Dans 3 mois
Designed from scratch and developed the architecture of the vehicle order ETA system, which tracked the vehicle's journey from manufacturing to delivery in real-time, and maintained an individual customer-facing API with Java and Microsoft SQL. - Migrated the vehicle quality system by converting the Java codebase to C#, optimizing performance for mobile device execution. - Refined the continuous integration and continuous deployment pipeline of the vehicle quality system with Azure DevOps, expediting deployment and facilitating continuous integration across in-plant and Kubernetes cloud environments. FebJul 2019 Austin, TX Test Engineer HCL/Facebook - Evaluated test
Java
API Development
SQL
Employé
Ouvert à de nouvelles opportunités
Temps plein / Intéressé par le travail à distance
4 à 6 ans
Georgia Institute of Technology
Computer Science
Avatar of the user.
Avatar of the user.
Scrum Master / Project Manager @Yondu Inc
2022 ~ Présent
Scrum Master / Tech Lead / Project Manager
Dans 1 mois
C#
JavaScript
C# .Net MVC
Employé
Ne recherche pas de nouvelles opportunités
Temps plein / Uniquement Travail à distance
6 à 10 ans
Coursera
Google Project Management

Le Plan de Recrutement le Plus Efficace et Facile

Recherchez 800.000 CV et prenez l'initiative de contacter les candidats pour améliorer votre taux de recrutement. Le Choix de Centaines d'Entreprises

  • Consulter tous les résultats
  • Démarrer des nouvelles conversations sans limites
  • Seules les entreprises avec un abonnement peuvent consulter les CV
  • Consulter les adresses email et les numéros de téléphone des utilisateurs
Conseils de Recherche
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Seuls les CV publics sont disponibles avec pour les utilisateurs gratuits.
Mettez à niveau vers un abonnement Supérieur pour voir tous les résultats de recherche dont des dizaines de milliers de CV exclusifs à CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Dans 2 mois
Research Assistant
Academia Sinica
2021 ~ Présent
Tainan, 台灣
Professional Background
Statut Actuel
Employé
Progrès de la Recherche d'Emploi
Professions
Fields of Employment
Expérience Professionnelle
Moins de 1 an
Management
None
Compétences
Python
C#
C
TensorFlow
PyTorch
Bash scripting
Neo4J
Linux Shell
Langues
English
Intermédiaire
Job search preferences
Position Désirée
PHD Student
Type d'emploi
Temps plein
Lieu Désiré
United States
Travail à distance
Intéressé par le travail à distance
Freelance
Non.
Éducation
École
National Chung Cheng University
Spécialisation
Computer Science and Information Engineering
Imprimer

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C
Resume
Profile

Pei-Yu Tseng

Graduate Student

+1 8148265789

[email protected]

  State College, PA

I am a Graduate Student at Penn State, where I attend the laboratory led by Liu Peng, the director of the Cyber Security Lab. My research focuses on Network and System Security, and Deep Learning. 

Research Experience

Research Assistant

Pennsylvania State University08.2023 - Present

  • Reinforcement Learning for Advanced Persistent Threat
    • Analyzing real-world enterprise login data and network data to reconstruct the actual network environment.
    • Simulating the attack behavior of APT groups such as APT28 or APT41.

Academia Sinica • 09.2021 - 06.2023

  • Graph-based Neural Attack Behavior Detection and Alignment with Kernel Audit Logs for Advanced Persistent Threats
    • Simulated APT attack on Linux and Windows
    • Developed a theory for efficiently reducing kernel audit logs to ensure the high quality of behavior detection 
    • Developed models leveraging graph embedding to correlate and mine suspicious behavior in audit logs
  • Modeling Threat Representation through Building Cyber Threat Knowledge Base for Advanced Persistent Threats 
    • Developed models to extract semantic context from cyber threat intelligence platforms for generating provenance graphs
  • Using Honeypot Logs and Packets for Identifying Network Attack Patterns and their Signature
    • Utilizing  BERT-based models to analyze packets and logs from honeypots provided by Soft Bank

M.S.

National Chung Cheng University09.2019- 07.2021

  • Driving Behavior Recognition based on Generative Adversarial Networks   
    • Developed a redesigned model for identifying whether drivers are the owners of cars
    • Developed a mechanism for ensuring the reliability of the detection system
    • Evaluating the accuracy of several types of GAN in different situations

Work Experience

Penetration tester 

The Chiayi County Government • 05. 2020 - 12. 2020

  • Identified security vulnerabilities and weaknesses in websites or IoT devices for  the Chiayi county  government  
  • Designed and conducted simulated social engineering attacks

Network administrator

College of Engineering in CCU•  09. 2019 - 09. 2020

  • Maintained and administered the college's firewalls and network infrastructures
  • Managed the college's services, such as websites, VPN, and DNS

Education

PhD in Informatics

Penn State University•  08. 2023 - present

M.S . in Computer Science and Information Engineering

National Chung Cheng University •  09. 2019 - 07.2021

Publication

  • P.-Y. Tseng,  P.-C. Lin,  Edy Kristianto, Vehicle Theft Detection by Generative Adversarial Networks on Driving Behavior. Engineering Applications of Artificial Intelligence (published) [Paper]

Project

  • Reinforcement Learning for Advanced Persistent Threat
    •  A novel approach to defend against APT attacks, specifically targeting lateral movement.
    • To formulate APT attack into Observable Markov Decision Process (POMDP) problems
  • APT Discovery using OSINT and Network & System Logs
    • Integrated Open-source intelligence, Cyber threat intelligence, and MITRE ATT&CK framework into a cyber threat knowledge base, and developed neural network architectures to analyze and detect APT attacks in a multi-host environment.
    • Aligned the observed evidence to adversary lifecycle and correlated the relation between the detected 

      attacks and known attackers.

Skills


  • Python
  • TensorFlow
  • PyTorch



  • Bash scripting
  • Neo4J
  • Linux Shell



  • Java
  • C#
  • C