
Jielin Wong
Verified Expert in Engineering
Security Architect and Developer
Beijing, China
Toptal member since October 18, 2022
Jielin has twelve years of experience in security. After graduating, Jielin joined one of the most famous security companies in China, NSFOCUS, where he was in charge of WAF rule design and defense function. Later he went to a startup to lead the whole company's security and an AI unicorn company, where he designed the cloud security architecture. Now, Jielin is focused on cloud security architecture design, SAST, and penetration testing.
Portfolio
Experience
- Shell - 12 years
- Penetration Testing - 12 years
- Linux - 12 years
- Metasploit - 10 years
- Python 3 - 10 years
- Security Architecture - 10 years
- Threat Modeling - 8 years
- Amazon Web Services (AWS) - 3 years
Availability
Preferred Environment
Linux, Go, Python 3, MacOS, Visual Studio Code (VS Code)
The most amazing...
...thing I've designed is security architecture for a cloud platform.
Work Experience
Security Architect
SenseTime
- Conducted product security testing and cloud security architecture design.
- Designed the honeypot system, traffic monitoring system, and threat intelligence system.
- Helped the company implement a security baseline design for Kubernetes and a Docker image scanning architecture design.
- Received the best employee award in 2020 for my outstanding work in designing the security architecture of the cloud platform.
Security Engineer
SenseTime
- Oversaw the security testing of the entire SenseTime product, completing over 80 different products in total, including API scanning, fuzz testing, and firmware device testing.
- Performed penetration testing of the entire cloud platform, during which configuration permission issues were used to get AD administrator privileges.
- Designed an automated API scanning system, which can save fuzz time.
Security Architect
Smartisan
- Managed the whole company's security, including security architecture design, security scanning tool development, and penetration testing.
- Designed a honeypot system and a traffic monitoring system in the company and also developed a bug bounty platform in cooperation with my colleagues.
- Designed a basic zero-trust model based on Tencent Cloud.
Security Engineer
NSFOCUS
- Improved security by analyzing scanner attack samples and other web security attack techniques while adding responsive security rules based on different attack methods.
- Conducted internal product penetration testing.
- Provided technical support for DDoS products, helping customers defend themselves against large-scale DDoS attacks by configuring rules.
- Received the best new employee award in my first year of employment.
Experience
Threat Intelligence Platform
MAIN FEATURES
• Getting the IPs in traffic monitoring and comparing them with the malicious IP list.
• Getting the traffic monitoring access domain and comparing it with the domain in the open-source threat intelligence.
• Implementing a timing task agent based on Celery, which is used to download data from the open-source threat intelligence platform.
• Designing and implementing a task queue for the threat intelligence platform based on RabbitMQ, which is used to query for unhit data from the open-source threat intelligence platform.
Cloud Platform Security Architecture Design
Designed a Bro-based network traffic monitoring tool that can monitor the IP quintet and domain access information of the platform. I also developed threat intelligence for querying public IPs and domain names to discover unknown risks. Monitored the intranet for malicious scans and other behaviors based on TCP flag statistics.
KUBERNETES SECURITY BASELINE DESIGN
I used Kube-bench and Kube-hunter to perform basic security scanning of Kubernetes to meet the security baseline requirements.
DOCKER IMAGE SECURITY SCANNING DESIGN
Used ClamAV and Clair to implement Docker's image scanning architecture, which can solve the risk of malicious files in the image and the use of vulnerable components.
OSQUERY-BASED HOST MONITORING
I designed osquery-based host monitoring rules and infrastructure to detect reverse shells and malicious processes.
Automated API Fuzz Tool Based on Mitmproxy
Education
Bachelor's Degree in Information Security
Guizhou University - Guizhou, China
Certifications
AWS Certified Security – Specialty Certification
Amazon Web Services
Certified Red Team Professional (CRTP)
Pentester Academy
Offensive Security Certified Professional (OSCP)
Offensive Security
Certified Information Systems Security Professional (CISSP)
(ISC)²
Skills
Libraries/APIs
Vue
Tools
Shell, Metasploit, RabbitMQ, Celery, Osquery, Sqlmap
Languages
Python 3, Python, Go
Paradigms
Penetration Testing, REST
Platforms
Linux, Amazon Web Services (AWS), MacOS, Visual Studio Code (VS Code), Docker, Kubernetes, Windows, Burp Suite
Frameworks
ASM, Windows PowerShell, Django
Storage
Azure Active Directory, MongoDB
Other
Threat Modeling, Security Architecture, Ethical Hacking, Networking, Crypto, Data Encryption, Reverse Engineering, Cloud, Active Directory Federation, Threat Intelligence, XSS Testing
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring