Post Job Free
Sign in

Network Engineer Penetration Testing

Location:
Ho Chi Minh City, Vietnam
Salary:
300$
Posted:
May 21, 2025

Contact this candidate

Resume:

ABOUT ME

A fourth-year Cybersecurity student expanding skills in Network Engineering. Possesses a solid foundation in security and penetration testing (Pentesting), enhancing a security- rst mindset in network design and operations. Seeking a Network Engineer position to leverage networking and security expertise in ensuring infrastructure performance and security for enterprises.

Ngo Bui Truong Vu

P entest

15/10/2003 Binh Hung, Binh Chanh, HCM 039******* ****************@*****.*** 1 of 2 - ©VietCV.io

ACTIVITIES

HOBBIES

Finding and exploiting

security vulnerabilities

Researching and testing

new a ack techniques

Participating in CTF

(Capture The Flag) and Bug

Bounty programs

Reading security

documentation, blogs, and

forums

h ps://www.cve.org/CVERecord

id=CVE-2025-46481

h ps://www.cve.org/CVERecord

id=CVE-2025-47629

h ps://www.cve.org/CVERecord

id=CVE-2025-47537

h ps://www.cve.org/CVERecord

id=CVE-2025-47538

h ps://www.cve.org/CVERecord

id=CVE-2025-47643

h ps://www.cve.org/CVERecord

id=CVE-2025-47683

PENTESTER INTERN

FORE CO., LTD & SUGANUMA August 2023 - Present

PENTEST CONTRIBUTOR

CENTER OF SOFTWARE ENGINEERING - DUY TAN

UNIVERSITY

May

2024 -

September

2024

HANDS-ON PRACTICE

WEB PENTEST HTB AND CTF

WORK EXPERIENCES

Participated in the BlueRock training project of Fore Co., Ltd. in conjunction with Suganuma. Participated in real projects on nding vulnerabilities, detecting and reporting security vulnerabilities, proposing solutions, using tools such as Metasploit, Burp Suite and Nmap to simulate a acks... of the project.

Participated in, accessed and tested the school's network system, assisted in assessing, testing and improving the security of the IT system. Reported detailed vulnerabilities on all school websites and proposed solutions. Additionally, I was given the opportunity to research new technologies and trends in the eld of network security, develop tools and integrate automation to support pentesting work. Identi ed and reported over 20 Low to Critical vulnerabilities in a timely manner

-Hack The Box (HTB): Practice security testing on real systems, exploit vulnerabilities, escalate privileges and evaluate the security level of the system.

-PortSwigger Web Security: Complete 80% of the lab with exercises on exploiting web vulnerabilities such as SQL Injection, XSS, SSRF, IDOR

-Capture The Flag (CTF): Participate in cybersecurity competitions with challenges on Web, Forensics, Crypto, Reverse

2 of 2 - ©VietCV.io

SKILLS

OS (Ubuntu, Windows Server,

KaliLinux, MACOS)

BurpSuite, Metaploit, ZAP,

Nmap

Python

NodeJS, JavaScript

OSI Model

PHP (read and understand)

Teamwork

Cloud & Virtualization: AWS,

Azure, VMware, Docker

Networking: TCP/IP, LAN/WAN,

Routing & Switching, VLAN, VPN,

Firewall, NAT

ENGLISH

LANGUAGES

Intermediate English

Communication

UNDERGRADUATE

DUY TAN UNIVERSITY August 2021 - August 2025

EDUCATION

GPA: 3.4/4.0

*Capstone Project 1 ( SCIENTIFIC RESEACH) : Deploy An Identify And Access - -

- Management Solution With FreeIPA For Enterprise (FIMAS) Focusing on deploying an Identity and Access Management (IAM) system for enterprises using FreeIPA, an open-source solution that manages users, groups, access permissions, and centralized authentication. The deployment process of FreeIPA includes the following key steps: Install and con gure FreeIPA on a Linux system, set up the user and group database, and de ne access policies.

Integrate security protocols such as LDAP, Kerberos, and SSSD to ensure secure and consistent authentication across the system. Link with Active Directory (AD) to synchronize account information, creating a uni ed management environment for both Linux and Windows systems.

Integrate with enterprise services such as SSH, VPN, and web applications to enforce role-based access control and minimize unauthorized access risks.

Enhance security by implementing Multi-Factor Authentication (MFA), monitoring system logs, and detecting unauthorized access a empts.

*Capstone Project 2 (SCIENTIFIC RESEACH): Applying Machine Learning to Enhance Automated Incident Response (ML-AIR)

- Focusing on the application of Machine Learning (ML) in automated incident response systems to detect threats, provide early warnings, and proactively mitigate a acks, thereby reducing the workload for Security Operations Centers (SOC).

Data Collection and Preprocessing

Utilize data from system logs, IDS/IPS, and SIEM for training ML models. Clean and normalize data to optimize model performance. Developing Machine Learning Models

Apply Supervised Learning to detect anomalies based on historical data.

Combine Unsupervised Learning to identify suspicious activities that were not previously observed.

Use Deep Learning to enhance the detection of sophisticated threats. Integrating ML into SOC Systems

Create an automated data analysis pipeline for real-time threat detection.

Connect with SIEM/SOAR systems to generate alerts and enable automated responses.

Build intelligent response mechanisms, such as automatic malicious IP blocking and isolating compromised systems.

Model Evaluation and Optimization

Compare ML performance against traditional rule-based methods. Fine-tune the model to reduce false positives and false negatives.



Contact this candidate