You are on page 1of 2

Shuai Hao

+1 (778)-861-2858
shuaihao@uvic.ca

Rsum

321-1641 McKenzie Ave, Victoria, BC V8N5M4

Profile

Proficient in Linux, iOS, Object Oriented Design and Programming (C, C++, Java), bash shell scripting
Experienced with database development using SQL
Adept knowledge of TCP/IP protocols
Expert in intrusion detection and prevention, malware analysis, anti-virus, firewalls and security information
management systems
Skilled in translating knowledge to quickly master new technical areas
Competent to work in a big, dynamic team taking on different roles and responsibilities

Educational Background
Master of Engineering in Telecommunications and Information Security

University of Victoria (UVIC)

Bachelor of Applied Science in Information and Computer Science

Sept. 2015-Current

Sept. 2010-Jul. 2014

Beijing Information Science & Technology University (BISTU)


Emphasis on integration of computer and mathematics courses

Internship Experience
Beijing Boya Weiyuan Video Signal Technology Co., Ltd.

Position: Junior Network Administrator


Responsibility: assisted general network administrator in completing platform reform of digital high-definition optical
fibre transmission system, and organized internal collaboration and cooperation between the company and others

Beijing Newchannel Educational Consulting Co., Ltd.

Jun. 2015-Aug. 2015

Position: Teaching Assistant


Responsibility: trained students to cultivate a positive and healthy learning attitude; organised students to carry out
extracurricular activities and enriched students' after-school life

BD Cargo

Jan. 2013-Jun. 2013

Jun. 2014-Aug. 2014

Position: Junior Operations Analyst


Responsibility: planed and controlled the efficient forward, and reverse flow of the storage of goods, services between
vendor and customers in order to meet the requirements individually. Applied my professional knowledge to the
integration of information flow, material handling, packaging, inventory, transportation, and often security

Research Project Experience


Library Loan Management System (undergraduate)

Applied Java to program a data management system for the university library
Programmed several modules including search engine, collection management procedure, and late fines process

Network chat program (undergraduate)

Programmed window-based network communication tool based on User Datagram Protocol (Using VC6.0)
Designed dynamic interface, programmed keyboard input module and implementation of UDP

Analytical study of the Relationship between Beijings Computer Prices and Consumer Price Index (final project for
Bachelors degree)

Applied least squares method to estimate the parameters and determine regression coefficients. Established a multiple
linear regression model to analyse and predict relationship between Beijings computer prices and Beijings consumer
price index

Design for Hardware Trust (graduate)

Described the operating principles and the performance analysis of effectiveness of three Delay-Based Methods:
Shadow Registers, Ring Oscillators, and Path-delay
Compared the pros and cons between those methods, also proposed an approach to improve the model

Analytical Comparison of Wireless Security Protocols (graduate)

Explained and the working of the common security standards, which are 802.11 WEP, 802.11 WPA and WPA2
(802.11i). Also compared them and listed their vulnerabilities
Listed concepts and protocols, which are used with the security standards like AES and TKIP that are used in the
latest security standard of 802.11i

Comparison Study of Gateway Redundancy Protocols (graduate)

Explained three network redundancy protocols functionality, which are Hot Standby Routing Protocol (HSRP),
Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)
Compared their performance on different scenarios, simulated on GNS3 and presented results via Wireshark captures
and other research materials

Penetration Testing and Defense (graduate)

Worked on security tools like Wireshark, Zenmap, Nessus, Hydra, ncrack, Metasploit etc. in Kali (Linux) framework
to hack into virtual network
Used the attack intelligence obtained to implement adequate defense strategy to prevent or detect similar attacks in
Linux system (Ubuntu)

Implementation of Mobile Banking App for IOS Platform (doing now)

Integrating Plurilock biometric authentication service in a mobile banking software system

Activities and Community Service


Class Representative

Sept. 2010-Jun. 2014

Acted as a bridge of communication between students and teachers and organized a variety of activities
Gained leadership and organizational skills

Volunteer for Fragrant Hill Seniors Home

Jan. 2012-Aug. 2012

Member of Public Relations Department, Student Union

Sept. 2010-Jun. 2011

Successfully sought sponsorship from several business enterprises including Pepsi for a total of $10,000
Participated in planning and execution of several large-scale ceremonies

Reference
Available upon request

You might also like