CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of the user.
Avatar of the user.
分部資訊主管 @國防部
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
Communication
.Net framework
.NET MVC
Employed
Ready to interview
Full-time / Interested in working remotely
6-10 years
元智大學
資訊工程學系
Avatar of Wang Jen Ming (王仁明).
Avatar of Wang Jen Ming (王仁明).
Past
Systems Engineer (Maintenance & Security) @Alliance Healthcare Group
2022 ~ 2023
IT Administrator, IT Analyst, Cyber security, System & Network Administrator
Within one month
Myanmar) 二月二月 2018 Design and Implement Network and Hyper-V Replication Servers Implementing Routing, Firewalls, GlusterFS, iSCSI, LVM, DNS, Microsoft Exchange and IIS Setting up Rsync, Rsyslog, Samba, Windows AD, FSRM, DFS services Network security monitoring and setup (firewalls, logs monitoring) Supporting End User, data backup, and restore Project coordination, inventory control, documentation 學歷NCC Education, UK Level 4 Diploma in ComputingMyanmar Maritime University B.Sc (Hons) Nautical Science 專業認證 • eLearnSecurity Web Application Penetration Tester (eWPT) • CompTIA Certified Cybersecurity Analyst (CySA+) • Cisco Certified Network Professional (CCNP – Security) • Qualys...
System Administration
Network Security
Web Security
Unemployed
Ready to interview
Full-time / Interested in working remotely
6-10 years
NCC Education, UK
Cyber Security
Avatar of the user.
Avatar of the user.
高級工程師 @不顯示公司名稱
2022 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
Active Directory
IIS
PHP
Employed
Ready to interview
Full-time / Interested in working remotely
10-15 years
立德大學
資訊工程
Avatar of Stephen Hsu.
Avatar of Stephen Hsu.
Past
Senior Test programmer @Robert Bosch GmbH
2022 ~ 2023
測試或資安專責人員
Within one month
headquarters' security quality requirements (based on IEC 62443, ISO 27001, CSF 2.0 standards), data security management/internal audits, localization system implementation, preparation of related materials, and conducting education and training will be carried out. * Based on verification and validation (V&V), I conduct functional and security testing on IP security cameras and their backend support systems and platforms (PCs, AIOs, servers, network environments, Windows/[embedded] Linux). This includes penetration testing, ACL permission control, defense in depth validation, SSO, and ZTNA. * According to customer requirements, conduct system planning analysis and (semi/full) automated
QA Automation
Test Driven Development
Test Management
Unemployed
Ready to interview
Full-time / Interested in working remotely
More than 15 years
Concordia University
Master of Business Administration (M.B.A.)
Avatar of Vlad Volkov.
Avatar of Vlad Volkov.
Past
Senior Quality Analyst @Thoughtworks
2022 ~ 2023
QA automation engineer / Software development engineer in test
Within one month
and i18n testing of Unity application (mobile & web) DecemberMarchPosition eliminated due to COVID impact) Quality Assurance Engineer • EO Finance, Cyprus Full stack testing of cryptocurrency wallet & exchange (mobile, web & desktop apps) Developed & maintained E2E and API tests Reviewed business requirements and design assets Mentored new testing team members Made regression testing twice faster JanuaryNovember 2019 QA Engineer • SPB TV, Russia Functional, interface and backend testing of dozen web and IPTV products Actively participated and offered ideas in meetings and features discussions Described several thousand bugs in Jira DecemberJanuary 2018 Test Engineer • Ficbook, Russia Exploratory, performance and penetration testing of social
Performance Testing
JavaScript
Postman
Unemployed
Ready to interview
Full-time / Not interested in working remotely
4-6 years
慈濟大學 Tzu Chi University
Mandarin Chinese Course
Avatar of 白紋愷.
Avatar of 白紋愷.
Engineer @Trend Micro 趨勢科技
2021 ~ Present
Software Engineer
Within two months
solution to the end user to make sure they would keep using our product and feel satisfied. Product CI/CD: Using GitHub Action to trigger product build and deploying package when the package is output successfully. BlockChain Security Corp, Programmer, May 2020 ~ Oct 2021 Developed Web App Penetration Testing Platform: Developed a website on Internet Information Services (IIS) using .NET Framework. Built databases to store user data, penetrating data, and penetrating syntaxes on a SQL Server. Integrated APIs of third-party penetration testing tools, e.g. ZAP and SQL Map. Solved
C/C++
SQL
Git
Employed
Ready to interview
Full-time / Interested in working remotely
4-6 years
National Chengchi University
Computer Science
Avatar of Edy Wijaya.
Avatar of Edy Wijaya.
Past
BD Listing & KOL Manager @Coinstore & Pionex Crypto Exchange
2022 ~ 2023
Within two months
Dipl.-ing Edy Wijaya While in college, I worked part-time as IT Support for Philips in Aachen and also at the RWTH Aachen Institute. After returning to Indonesia, I am active in IT solutions, both Hardware and Software, specifically in the field of networking infrastructure and VoIP. After a long time in the technical field, I started in the field of Business Development in Thano for physical security products, and then for the Hospitality Industry I marketed locking and access control products from Salto Systems. In my spare time, I took courses and was self
Troubleshooting Hardware and Software Problems
IT Support
Problem Solving
Unemployed
Open to opportunities
Full-time / Interested in working remotely
10-15 years
FH Aachen university of applied sciences
Electrical Engineering
Avatar of the user.
Avatar of the user.
Professional development @Career Break
2024 ~ Present
IT Infrastructure Manager, IT Support Manager
Within one month
Email Management
IT Support
Management & Leadership
Employed
Open to opportunities
Full-time / Interested in working remotely
10-15 years
BINUS University
Computer Science
Avatar of 林煌錡.
Avatar of 林煌錡.
Cyber Security Analyst @iTop Digital Technology Co., Ltd.
2021 ~ Present
資安威脅分析師、滲透測試工程師
Within one month
監控、Log分析與誤報除錯及規則調整等 導入過程中透過流量監控協助企業發掘對外服務對外開放的SQL Injection漏洞攻擊途徑 Penetration Testing 協助國內財團法人建制境外APT組織攻擊環境模擬,並蒐集相關惡意流量供研究使用,執行成果如下: 模擬易受攻擊的
Penetration Test
Threat Hunting
Azure Sentinel
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國防大學中正理工學院
資訊工程學系
Avatar of BlackSmile.
Avatar of BlackSmile.
Senior Information Security Manager @玉山證券
2024 ~ Present
Cyber Security Engineer
Within one month
BlackSmile Penetration Test Cyber Security Engineer Taoyuan City, Taiwan 大學於資訊管理系畢業,於2018年從軍後開始接觸資安領域。主要在部內負責弱點掃描及滲透測試的工作,並接受專業課程培訓,擔任單位Cyber Kill Chain教官,教授MITER ATT&CK定義之流程。 在工作上除了精進專業技能外,還累積了許多團
liunx
Windows
Kali Linux
Employed
Not open to opportunities
Full-time / Interested in working remotely
4-6 years
國立陽明交通大學(National Yang Ming Chiao Tung University)
國防資安管理

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
More than one year
Legal Secretary
District Court, Denver District Attorney's Office
2019 ~ Present
Denver, CO, USA
Professional Background
Current status
Job Search Progress
Professions
Fields of Employment
Legal Department
Work experience
1-2 years
Management
I've had experience in managing 1-5 people
Skills
Detailed Oriented
Coordination
Efficient
Guide
Administrative Tasks
Behavior Management
Contract Drafting
Technical Skills
Criminal Justice
Team Building
Communication
Result Oriented
Excel
kibana
splunk
Languages
Spanish
Fluent
Job search preferences
Positions
Legal Secretary
Job types
Full-time
Locations
Remote
Interested in working remotely
Freelance
Yes, I freelance in my spare time
Educations
School
University of Denver
Major
Cybersecurity
Print

SHEENA LEAL

[email protected], 720-539-9473

A driven and detail-oriented new cybersecurity specialist with six years' experience in the criminal justice field. Looking for analytical roles in cybersecurity to strengthen new technical skills in penetration testing, Wireshark, Kali Linux, Ethical Hacking, vulnerability assessment and Network Security. Energized team-player with proven customer service, problem solving and leadership skills. Completed certificate in Cybersecurity from the University of Denver in 2021.  Preparing for the CompTIA Security+ certificate. Eager to learn and to collaborate alongside like-minded individuals who want to ensure compliance with security best practices.

  Denver, CO, USA

    


Technical Skills

Programing Languages and Technologies: Linux Fundamentals, Java Script, Kali Linux,     SQL, and Python Fundamentals

Cybersecurity, Digital Forensics and Network Security: Vulnerability Scanning, Risk Assessment, Intrusion Detection, Machine Learning, CIA triad, Metasploit, Nmap, Windows security, XSS, Penetration Testing, Risk Management Processes, Windows/Linux Hardening, Privacy Principles, Network Forensics, Governance & Compliance, Information Systems and Technology.


Work Experience

September 2019 - Present

Legal Secretary Bilingual,  District Court, Denver District Attorney's Office

Develops consistent communication with a team of four District Court attorneys, an investigator and a victim advocate to ensure top quality case management. Works individually to prioritize and multitask all administrative tasks. Well-versed in legal proceedings, ethics, policies and in compliance with court processes. Deploys and masters the use of various databases and computer programs. Provides direction and guidance to attorneys on these databases and computer programs. 

June 2019 - September 2019

Judicial Assistant  Adams County Justice Center

Achieved superb attention to detail and thrived in a fast-paced and challenging environment where accuracy and efficiency matter. Review, updates and maintains internal and external case documentation. I sought out opportunities to continue to strengthen and diversify my skill set to carry out judicial activities across departments within the court.

August 2018 - June 2019

Lead Bilingual Intake Specialist  The Link, JAC for Adams County

Advocated and evaluated all at-risk youth for needs by using established assessment and screening tools. Collaborated and communicated with several teams and with diverse family structures to provide evidence-based solutions to ongoing family situations. Mentored and created work plans for specialists to apply in interviews and create positive relationships with families and youth.

Education

December - 2021

University of Denver

Cybersecurity Certificate

May 2017

Metropolitan State University of Denver

Bachelor of Science : Criminal Justice and Criminology

May 2011

Mile High Adventist Academy

High School Diploma

Projects

Red Team vs Blue Team

Utilized Microsoft Azure cloud environment involving security assessment of target machine, password exploitation through brute force attack, and reverse shell upload, and follow up through use of Kibana Filebeat, Metricbeat, and Packetbeat for identification and proposal of mitigation tactics on the target machine. Ran vulnerability scans and interpreted log data to suggest mitigation measures for each exploit found.

Elkstack

Connected through a virtual private network to utilize Microsoft Azure to perform network security monitoring through load balancers, virtual machines, and the installation and configuration of an ELK server through the use of Ansible playbooks to run ELK containers. Achieved ELK server to deploy and receive logs from all three web VM’s created in Microsoft Azure. 

Resume
Profile

SHEENA LEAL

[email protected], 720-539-9473

A driven and detail-oriented new cybersecurity specialist with six years' experience in the criminal justice field. Looking for analytical roles in cybersecurity to strengthen new technical skills in penetration testing, Wireshark, Kali Linux, Ethical Hacking, vulnerability assessment and Network Security. Energized team-player with proven customer service, problem solving and leadership skills. Completed certificate in Cybersecurity from the University of Denver in 2021.  Preparing for the CompTIA Security+ certificate. Eager to learn and to collaborate alongside like-minded individuals who want to ensure compliance with security best practices.

  Denver, CO, USA

    


Technical Skills

Programing Languages and Technologies: Linux Fundamentals, Java Script, Kali Linux,     SQL, and Python Fundamentals

Cybersecurity, Digital Forensics and Network Security: Vulnerability Scanning, Risk Assessment, Intrusion Detection, Machine Learning, CIA triad, Metasploit, Nmap, Windows security, XSS, Penetration Testing, Risk Management Processes, Windows/Linux Hardening, Privacy Principles, Network Forensics, Governance & Compliance, Information Systems and Technology.


Work Experience

September 2019 - Present

Legal Secretary Bilingual,  District Court, Denver District Attorney's Office

Develops consistent communication with a team of four District Court attorneys, an investigator and a victim advocate to ensure top quality case management. Works individually to prioritize and multitask all administrative tasks. Well-versed in legal proceedings, ethics, policies and in compliance with court processes. Deploys and masters the use of various databases and computer programs. Provides direction and guidance to attorneys on these databases and computer programs. 

June 2019 - September 2019

Judicial Assistant  Adams County Justice Center

Achieved superb attention to detail and thrived in a fast-paced and challenging environment where accuracy and efficiency matter. Review, updates and maintains internal and external case documentation. I sought out opportunities to continue to strengthen and diversify my skill set to carry out judicial activities across departments within the court.

August 2018 - June 2019

Lead Bilingual Intake Specialist  The Link, JAC for Adams County

Advocated and evaluated all at-risk youth for needs by using established assessment and screening tools. Collaborated and communicated with several teams and with diverse family structures to provide evidence-based solutions to ongoing family situations. Mentored and created work plans for specialists to apply in interviews and create positive relationships with families and youth.

Education

December - 2021

University of Denver

Cybersecurity Certificate

May 2017

Metropolitan State University of Denver

Bachelor of Science : Criminal Justice and Criminology

May 2011

Mile High Adventist Academy

High School Diploma

Projects

Red Team vs Blue Team

Utilized Microsoft Azure cloud environment involving security assessment of target machine, password exploitation through brute force attack, and reverse shell upload, and follow up through use of Kibana Filebeat, Metricbeat, and Packetbeat for identification and proposal of mitigation tactics on the target machine. Ran vulnerability scans and interpreted log data to suggest mitigation measures for each exploit found.

Elkstack

Connected through a virtual private network to utilize Microsoft Azure to perform network security monitoring through load balancers, virtual machines, and the installation and configuration of an ELK server through the use of Ansible playbooks to run ELK containers. Achieved ELK server to deploy and receive logs from all three web VM’s created in Microsoft Azure.