Professional Documents
Culture Documents
+1 (778)-861-2858
shuaihao@uvic.ca
Rsum
Profile
Proficient in Linux, iOS, Object Oriented Design and Programming (C, C++, Java), bash shell scripting
Experienced with database development using SQL
Adept knowledge of TCP/IP protocols
Expert in intrusion detection and prevention, malware analysis, anti-virus, firewalls and security information
management systems
Skilled in translating knowledge to quickly master new technical areas
Competent to work in a big, dynamic team taking on different roles and responsibilities
Educational Background
Master of Engineering in Telecommunications and Information Security
Sept. 2015-Current
Internship Experience
Beijing Boya Weiyuan Video Signal Technology Co., Ltd.
BD Cargo
Applied Java to program a data management system for the university library
Programmed several modules including search engine, collection management procedure, and late fines process
Programmed window-based network communication tool based on User Datagram Protocol (Using VC6.0)
Designed dynamic interface, programmed keyboard input module and implementation of UDP
Analytical study of the Relationship between Beijings Computer Prices and Consumer Price Index (final project for
Bachelors degree)
Applied least squares method to estimate the parameters and determine regression coefficients. Established a multiple
linear regression model to analyse and predict relationship between Beijings computer prices and Beijings consumer
price index
Described the operating principles and the performance analysis of effectiveness of three Delay-Based Methods:
Shadow Registers, Ring Oscillators, and Path-delay
Compared the pros and cons between those methods, also proposed an approach to improve the model
Explained and the working of the common security standards, which are 802.11 WEP, 802.11 WPA and WPA2
(802.11i). Also compared them and listed their vulnerabilities
Listed concepts and protocols, which are used with the security standards like AES and TKIP that are used in the
latest security standard of 802.11i
Explained three network redundancy protocols functionality, which are Hot Standby Routing Protocol (HSRP),
Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)
Compared their performance on different scenarios, simulated on GNS3 and presented results via Wireshark captures
and other research materials
Worked on security tools like Wireshark, Zenmap, Nessus, Hydra, ncrack, Metasploit etc. in Kali (Linux) framework
to hack into virtual network
Used the attack intelligence obtained to implement adequate defense strategy to prevent or detect similar attacks in
Linux system (Ubuntu)
Acted as a bridge of communication between students and teachers and organized a variety of activities
Gained leadership and organizational skills
Successfully sought sponsorship from several business enterprises including Pepsi for a total of $10,000
Participated in planning and execution of several large-scale ceremonies
Reference
Available upon request