ABOUT ME
A fourth-year Cybersecurity student expanding skills in Network Engineering. Possesses a solid foundation in security and penetration testing (Pentesting), enhancing a security- rst mindset in network design and operations. Seeking a Network Engineer position to leverage networking and security expertise in ensuring infrastructure performance and security for enterprises.
Ngo Bui Truong Vu
P entest
15/10/2003 Binh Hung, Binh Chanh, HCM 039******* ****************@*****.*** 1 of 2 - ©VietCV.io
ACTIVITIES
HOBBIES
Finding and exploiting
security vulnerabilities
Researching and testing
new a ack techniques
Participating in CTF
(Capture The Flag) and Bug
Bounty programs
Reading security
documentation, blogs, and
forums
h ps://www.cve.org/CVERecord
id=CVE-2025-46481
h ps://www.cve.org/CVERecord
id=CVE-2025-47629
h ps://www.cve.org/CVERecord
id=CVE-2025-47537
h ps://www.cve.org/CVERecord
id=CVE-2025-47538
h ps://www.cve.org/CVERecord
id=CVE-2025-47643
h ps://www.cve.org/CVERecord
id=CVE-2025-47683
PENTESTER INTERN
FORE CO., LTD & SUGANUMA August 2023 - Present
PENTEST CONTRIBUTOR
CENTER OF SOFTWARE ENGINEERING - DUY TAN
UNIVERSITY
May
2024 -
September
2024
HANDS-ON PRACTICE
WEB PENTEST HTB AND CTF
WORK EXPERIENCES
Participated in the BlueRock training project of Fore Co., Ltd. in conjunction with Suganuma. Participated in real projects on nding vulnerabilities, detecting and reporting security vulnerabilities, proposing solutions, using tools such as Metasploit, Burp Suite and Nmap to simulate a acks... of the project.
Participated in, accessed and tested the school's network system, assisted in assessing, testing and improving the security of the IT system. Reported detailed vulnerabilities on all school websites and proposed solutions. Additionally, I was given the opportunity to research new technologies and trends in the eld of network security, develop tools and integrate automation to support pentesting work. Identi ed and reported over 20 Low to Critical vulnerabilities in a timely manner
-Hack The Box (HTB): Practice security testing on real systems, exploit vulnerabilities, escalate privileges and evaluate the security level of the system.
-PortSwigger Web Security: Complete 80% of the lab with exercises on exploiting web vulnerabilities such as SQL Injection, XSS, SSRF, IDOR
-Capture The Flag (CTF): Participate in cybersecurity competitions with challenges on Web, Forensics, Crypto, Reverse
2 of 2 - ©VietCV.io
SKILLS
OS (Ubuntu, Windows Server,
KaliLinux, MACOS)
BurpSuite, Metaploit, ZAP,
Nmap
Python
NodeJS, JavaScript
OSI Model
PHP (read and understand)
Teamwork
Cloud & Virtualization: AWS,
Azure, VMware, Docker
Networking: TCP/IP, LAN/WAN,
Routing & Switching, VLAN, VPN,
Firewall, NAT
ENGLISH
LANGUAGES
Intermediate English
Communication
UNDERGRADUATE
DUY TAN UNIVERSITY August 2021 - August 2025
EDUCATION
GPA: 3.4/4.0
*Capstone Project 1 ( SCIENTIFIC RESEACH) : Deploy An Identify And Access - -
- Management Solution With FreeIPA For Enterprise (FIMAS) Focusing on deploying an Identity and Access Management (IAM) system for enterprises using FreeIPA, an open-source solution that manages users, groups, access permissions, and centralized authentication. The deployment process of FreeIPA includes the following key steps: Install and con gure FreeIPA on a Linux system, set up the user and group database, and de ne access policies.
Integrate security protocols such as LDAP, Kerberos, and SSSD to ensure secure and consistent authentication across the system. Link with Active Directory (AD) to synchronize account information, creating a uni ed management environment for both Linux and Windows systems.
Integrate with enterprise services such as SSH, VPN, and web applications to enforce role-based access control and minimize unauthorized access risks.
Enhance security by implementing Multi-Factor Authentication (MFA), monitoring system logs, and detecting unauthorized access a empts.
*Capstone Project 2 (SCIENTIFIC RESEACH): Applying Machine Learning to Enhance Automated Incident Response (ML-AIR)
- Focusing on the application of Machine Learning (ML) in automated incident response systems to detect threats, provide early warnings, and proactively mitigate a acks, thereby reducing the workload for Security Operations Centers (SOC).
Data Collection and Preprocessing
Utilize data from system logs, IDS/IPS, and SIEM for training ML models. Clean and normalize data to optimize model performance. Developing Machine Learning Models
Apply Supervised Learning to detect anomalies based on historical data.
Combine Unsupervised Learning to identify suspicious activities that were not previously observed.
Use Deep Learning to enhance the detection of sophisticated threats. Integrating ML into SOC Systems
Create an automated data analysis pipeline for real-time threat detection.
Connect with SIEM/SOAR systems to generate alerts and enable automated responses.
Build intelligent response mechanisms, such as automatic malicious IP blocking and isolating compromised systems.
Model Evaluation and Optimization
Compare ML performance against traditional rule-based methods. Fine-tune the model to reduce false positives and false negatives.