2 Outline Prologue Software development Information security
3 Prologue Although sharing my work can help you to decide whatever you can assign task to me or not. I am rather to hide the details of my work because those works are confidential. All I can do is sharing a few resources that I used in my work for proofing my capabilities on software development and information security.
4 Software Development Experienced topics related to software development UML (Unified Modeling Language) DB, DBMS (include DB 2, MS-SQL, My. SQL…) Frontend (includes j. Query, JSON, RWD, Typescript…) Backend (includes SOAP, RESTful, Spring, Hibernate, ISO 8583…) Crypto modules (digital certificate, PKCS#11, MAC, AES, RSA, ECC, SHA 2…) OS (AIX, Windows, DOS, Android, Mac)
5 Software development KMS (Key Management System) development HSM (Hardware Security Module) G/W (Gateway) SP (a service point that I cannot let you know)
6 Software development (cont. ) Building gateway for LINE Pay integration
7 Information Security (cont. ) Experienced topics related to information security GDPR (General Data Protection Regulation) Blockchain Creditcard payment service Apple. Pay, Google. Pay, LINE Pay and Samsung. Pay OWASP top 10 ECC (Elliptic curve cryptography)
8 Information Security Concept of Time-Bound Hierarchical Key Assignment The diagram came from my master's thesis
9 Information Security (cont. ) Memo of CISSP (Certified Information Systems Security Professional) course
10 Find me LINE: @nickjjs E-mail: nicknelous@gmail. com