Summary
Overview
Work History
Education
Skills
Accomplishments
Software
Certification
Interests
Gaming,Movies ,Sports ,Music, Living Life ,Reading, Researching ,Gaming
Timeline
SoftwareDeveloper
Isaac Osei Asante

Isaac Osei Asante

Python Programmer,Penetrating Tester,Creative Director,Network Security,Data Analyst
Wuhan,China

Summary

To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy. Meticulous Data Scientist accomplished in compiling, transforming and analyzing complex information through software. Expert in machine learning and large dataset management. Demonstrated success in identifying relationships and building solutions to business problems. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals.

Overview

15
15
years of professional experience
18
18
years of post-secondary education
9
9
Certifications
4
4
Language

Work History

Independent Security Researcher

Bugcrowd
Wuhan, HB
08.2019 - Current
  • Reported over 20 security flaws to top companies on Hacker one platform and OpenBugBounty
  • Bug Hunting
  • Finding Vulnerabilities in web application of 25 different company privately.
  • Report various vulnerabilities from critical to low level in 5 top countries companies.
  • Worked effectively in fast-paced environments
  • Participated in team projects, demonstrating ability to work collaboratively and effectively
  • Proven ability to develop and implement creative solutions to complex problems
  • Worked flexible hours across night, weekend and holiday shifts
  • Gained strong leadership skills by managing projects from start to finish

Instructor

Udemy
Wuhan, HB
07.2019 - Current
  • First African to be Verified by Udemy Community
  • Have Over fifty-four (54) lectures on Python Programming
  • Taught Over 18,000 Student Python Programming
  • Taught Over 1000 students so far on Photoshop Tips and Tricks.
  • Tracked student progress, frequently checking in with struggling students and identifying root causes of problems
  • Applied various teaching aids to learning gaps and instruct and motivate students
  • Increased student participation via engaging lectures and assignments
  • Reviewed class and student records to identify improvement opportunities

Information Technology Coordinator

Ghana Education Service
Accra, Accra
11.2021 - 04.2023
  • Installed new hardware and oversaw maintenance of existing hardware to provide support for users.
  • Provided ongoing staff training on new innovations to integrate innovations into instruction and administration.
  • Improved students' analytical skills by introducing state-of-the-art computer program technologies.
  • Resolved hardware failures by troubleshooting hard drives, diagnosing memory issues and checking power supply.
  • Performed system administration duties by monitoring and modifying student profiles and resetting passwords.
  • Selected, purchased and maintained instructional technology materials and equipment.
  • Supported 100 teachers in implementing various educational strategies to create conducive learning environment.
  • Resolved wireless LAN and WAN connectivity issues to alleviate downtime.
  • Managed Government of Ghana School Information System Portal.
  • Managed IT staff monitoring and diagnosing server and data centre problems and design and implementation of new data centre technologies.

Senior Art and Creative Director

Central China Normal University
Wuhan, Hubei
08.2017 - 07.2019
  • Volunteer service for foreign Students and editorial board of school magazine as Head of multimedia and creative Art
  • Key responsibilities
  • Played vital role in cultural festival event organized by institution as video shooter and director
  • Build compelling graphics artwork and flyers design for marketing events on campus
  • Helped School Magazine Editorial Board in choosing right photo for magazine
  • Worked with Editorial Magazine Board President to manage response, including material development and media relation
  • Helped deign to cover artwork for school Magazine
  • Directed and trained foreigner who have passion for acting movies
  • Trained 600 foreigners volunteer service on how to use Adobe cloud Suites
  • Performed other extra-curriculum activities (sports, dance)
  • Key achievement/projects
  • Produce two Magazines for Institution.
  • First foreigner to run certificate course in Adobe cloud suites for 600 foreign Students
  • Produced, Directed and Edited two short Movies titled (“The Last Character’) and (“The Blind date)

Private English Teacher

English Center
Wuhan, Hubei
04.2019 - 05.2019
  • Volunteer service as I.C.T teacher, Taught Students I.C.T and English
  • Trained over 800 student how to boot and off computers
  • Taught students how to use part of speech in English
  • Taught student basic introduction to computer
  • Taught students how to use mouse and keyboard to play games
  • Key achievement/projects
  • Students were able to use boot and computers using right methods
  • Students start to communicate well in English.
  • Prepared comprehensive English curriculum for multiple classes
  • Led interesting and diverse group activities to engage students in course material

Creative Director

Central China Normal University
Wuhan, Hubei
01.2018 - 01.2019
  • In Recognition of offering Voluntary classes for International students in Adobe Suites and Video Editing.)
  • Trained over 1000 foreign Students on Video Students Using Adobe Suites
  • Also Established Editing Club Where International Students can join to express on their skill set
  • Delivered edits with multiple camera angle choices, titles, graphics, audio, and special effects
  • Developed strategic communication and marketing plans.
  • Developed high-impact creative trailers and promotional content for company campaigns from concept to completion.
  • Mentored and trained junior designers to help enhance skills and capabilities.
  • Collaborated with senior management to develop and implement marketing initiatives.

Voluntary Worker

Central China Normal University
Wuhan, Hubei
08.2018 - 09.2018
  • In Recognition for volunteer service to help New Students during beginning of 2018/2019 Academic year)
  • Supported engaging, fun, and smooth-running events by helping with planning.
  • Completed daily domestic tasks in shelters and group homes to assist people in need.
  • Used strong interpersonal communication skills to convey information to others.

Private English Teacher

Xiangyang Primary Foreign School
Xianyang, HB
12.2017 - 01.2018
  • Volunteer service as I.C.T teacher, Taught Students I.C.T and English
  • Taught 600 students how to write compositions
  • Taught student basic introduction to computer
  • Helped in invigilation of final examination
  • Taught students how to use search engines
  • Key achievement/projects
  • Students were able to use Keyboard Shortcuts properly for right task
  • Students were able to write simple words about themselves in English.
  • Prepared and implemented lesson plans covering required course topics.

Private English Teacher

Hubei-Yichang Foreign School
Yichang, HB
12.2016 - 01.2017
  • Volunteer service as I.C.T teacher, Taught Students I.C.T and English
  • Taught 400 student basic introduction to computer
  • Helped in invigilation of final examination
  • Taught students how to use search engines
  • Key achievement/projects
  • Students were able to use search engines to search educational papers.

Assistant Marketing Coordinator

Central China Normal University
Wuhan, Hubei
08.2016 - 12.2016
  • In Recognition for Dedication in Marketing for Fourth Issue of university.
  • Marketed over 3000 magazine Copies for University.
  • Composed daily posts for social media and helped build corporate presence on Twitter, Facebook, and Instagram.
  • Developed and tracked performance indicators to measure results of marketing campaigns.
  • Researched, monitored market trends, customer insights and competitors to avail of resources and exercise strategic decisions.
  • Executed comprehensive marketing plans that consistently achieved targets for increased revenue.
  • Launched successful digital marketing campaigns that achieved goals for increased website traffic.

Technical Support Technician and Database ManagementAssistant

Techno Paint Company, Umm Al Quwain
Umm Al-Qaiwain, Dubai
11.2014 - 08.2015
  • Work as Technical Support, Database management assistant and also helped in paint production
  • Key responsibilities
  • Helped in customer interaction role
  • Configuring and Monitoring over 100 GPS device
  • Provide Strong Technical and Customer Support to Client
  • Troubleshoot network and Managing Network devices
  • Performs related duties and special projects as assigned
  • Monitor and maintain inventory level, replenishment and transfer
  • Prepare operational analysis, reports and in, weekly, monthly basis and setting up yearly assessments
  • Set up and maintains network operations, including assembly of network hardware, infrastructure, telecommunications, and connectivity equipment
  • Page
  • Responsible for data and network backups based on established procedures
  • Responsible for network uptime on established procedures
  • Performs network troubleshooting to isolate and diagnose network problems
  • Upgrades network hardware and software components as required
  • Installs, upgrades, and configures network printing, directory structures, rights, security, software and files services
  • Key achievement/projects
  • Business expansion to big cities like Ajman and Sharjah

Technical Support Network Technician

Regional Maritime University
Accra, Ghana
08.2013 - 07.2014
  • Demonstrated strong management skills while managing multiple projects.
  • Proved successful working within tight deadlines and fast-paced environment.
  • Learned and adapted quickly to new technology and software applications.
  • Worked flexible hours across night, weekend and holiday shifts.
  • Configuring over 500 LAN, WAN, Wireless systems
  • Identifying, diagnosing, and revolving network problem
  • Provide users with all aspects of technical support.
    Monitor, resolves, and documents any help desk issues from end users,Establishes and administers accounts for network users, user environments, directories, and security for networks being installed.
  • Administers troubleshoots and maintains telephone system, phones and other communication equipment.
    Maintains inventory of all hardware, software, and telecommunications equipment.
  • Used critical thinking to break down problems, evaluate solutions and make decisions.
  • Identified issues, analyzed information and provided solutions to problems.
  • Demonstrated respect, friendliness and willingness to help wherever needed.
  • Adaptable and proficient in learning new concepts quickly and efficiently

Information Technology Teacher

Presbyterian Boys School, PRESEC-LEGON
Accra, Accra
05.2011 - 08.2011
  • Information Technology (I.T), Outline
  • Been assigned role to train student’s basics in Database and Network
  • Key responsibilities
  • Taught Students I.C.T
  • Taught student basic network topologies
  • Helped in invigilation of examination
  • Performed other extra-curriculum activities (inter-school sports)
  • Key achievement/projects
  • Students were able to create hotspot to connect another computer system together
  • Students created simple database that enters their name, student ID, Date of birth and country.
  • Planned and implemented curriculum to teach up-to-date technology to 400 students.
  • Facilitated computer lab of 400 people from Hp to Dell computer use and designed appropriate lesson plans.

Database Administrator

Kingsam Mineral Water Company
Nkawkaw, Eastern
05.2010 - 08.2010
  • Managing company database
  • Record both In-stock product and out-stock
  • Manage 500 workers salary
  • Generate company quarterly report
  • Key achievement/projects
  • Weekly sales income went higher due to proper database management
  • Company expansion was made due to high demand of product from customers.
  • Administered, supported, and monitored databases by proactively resolving database issues and maintaining servers
  • Created and implemented database designs and data models

Information Technology Teacher

Queen of Heart Preparatory School
Freetown, Nkawkaw
08.2008 - 07.2009
  • Work as Information Technology Teacher and bursar for institution
  • Helped kids to use computers
  • Helped students in using Microsoft office suites
  • Used computers to play games
  • Helped 80 students to use mavis beacon typing software
  • Key achievement/projects
  • Students were able to type at high accuracy
  • Students were able to save documents with Microsoft suite.
  • Tested and evaluated student progress to determine effectiveness and impact of teaching methods, materials and projects.
  • Trained and developed students' skills in word-processing, spreadsheet and database programs.

Education

Enterprise System Management and Security - Management Information Systems

University of California, University of Colorado System
California
01.2020 - 07.2020

Coursera Data Science -

I.B.M
New York
01.2020 - 07.2023

Forensic Accounting And Fraud Examination - Forensic Science

West Virginia University
Virginia
01.2020 - 07.2020

Computer Science -

Eduonix Securities
India
01.2018 - 04.2019

Master of Science - Management, Management Science and Engineering

Central China NormalUniversity
Wuhan
03.2016 - 07.2018

Bachelor of Education - Information Technology

Valley View University
Accra
08.2009 - 07.2013

Data Science - Data Management Technology

I.B.M
Cousera
01.2020 - 07.2020

Ph.D. - Cyberspace Science And Engineering

Wuhan University
China
08.2020 - Current

High School Diploma -

Koforidua Secondary And Technical School
Koforidua,Ghana
08.2005 - 05.2008

Skills

System Administrationundefined

Accomplishments

  • Seminars/Training/Workshop/Conference
  • August 2020 Blackhat U.S.A Virtual – Conference, San Francisco, United states ofAmerica
  • From 1st August – 6th
  • August
  • Outline
  • The purpose of the training was to introduce to the latest in Cybersecurity and New Methodology
  • Theconference covered the following deep topics areas
  • Stress-Testing Democracy: Election Integrity During a Global Pandemic
  • All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate -
  • Inside a Deeply Embedded Security Processor
  • Carrying our Insecurities with Us: The Risks of Implanted Medical Devices in SecureSpaces
  • Cloud Leak: DNN Model Extractions from Commercial MLaaS Platforms
  • Defending Containers Like a Ninja: A Walk through the Advanced Security Features of Docker &
  • Kubernetes
  • Emulating Samsung's Baseband for Security Testing
  • Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Tens of Millions of CriticalDevices
  • Hiding Process Memory via Anti-Forensic Techniques
  • HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
  • Room for Escape: Scribbling Outside the Lines of Template Security
  • An Unauthenticated Journey to Root: Pwning Your Company's Enterprise SoftwareServers
  • Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
  • Detecting Fake 4G Base Stations in Real Time
  • Election Security: Securing America's Future
  • Engineering Empathy: Adapting Software Engineering Principles and Process to Security
  • Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors'Firmware’s
  • Industrial Protocol Gateways Under Analysis
  • Repurposing Neural Networks to Generate Synthetic Media for Information Operations
  • Speaker: Philip Tully, Lee Foster
  • Web Cache Entanglement: Novel Pathways to Poisoning
  • Demystifying Modern Windows Rootkits
  • Discovering Hidden Properties to Attack the Node.js EcosystemiOS Kernel PAC, One Year Later
  • Policy Implications of Faulty Cyber Risk Models and How to Fix Them
  • Reverse Engineering the Tesla Battery Management System to increase Power Available
  • Ruling StarCraft Game Spitefully Exploiting the Blind Spot of AI-Powered GameBots
  • Stopping Snake Oil with Smaller Healthcare Providers: Addressing Security with Actionable Plans and
  • Page
  • Maximum Value
  • We Went to Iowa and All We Got were These Felony Arrest Records
  • Whispers Among the Stars: A Practical Look at Perpetrating (and Preventing) Satellite Eavesdropping
  • Attacks
  • Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
  • Building a Vulnerability Disclosure Program that Works for Election Vendors andHackers
  • FASTCash and INJX_Pure: How Threat Actors Use Public Standards for Financial Fraud
  • Healthcare – An Insider's Biopsy of Healthcare Application Security
  • NoJITsu: Locking Down JavaScript Engines
  • OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial AutomationScripts
  • Reversing the Root: Identifying the Exploited Vulnerability in 0-days UsedIn-The-Wild
  • The Devil's in the Dependency: Data-Driven Software Composition Analysis
  • Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and MLMagic
  • Demigod: The Art of Emulating Kernel Rootkits
  • Hacking the Voter: Lessons from a Decade of Russian Military Operations
  • IoT Skimmer: Energy Market Manipulation through High-Wattage IoTBotnets
  • Needing the DoH: The Ongoing Encryption and Centralization of DNS
  • Office Drama on macOS
  • Practical Defenses Against Adversarial Machine Learning
  • Stealthily Access Your Android Phones: Bypass the Bluetooth Authentication
  • Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon
  • When TLS Hacks You
  • Breaking VSM by Attacking Secure Kernel
  • Escaping Virtualized Containers
  • EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-PacketAttacks
  • Fooling Windows through SuperFetch
  • How I Created My Clone Using AI - Next-Gen Social Engineering
  • Lamphone: Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
  • Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec
  • Community
  • Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's StrongestWallets
  • Security Research on Mercedes-Benz: From Hardware to Car Control
  • A Decade After Stuxnet's Printer Vulnerability: Printing is Still the Stairway toHeaven
  • A Framework for Evaluating and Patching the Human Factor in Cybersecurity
  • Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
  • Detecting Access Token Manipulation
  • I calc'd Calc - Exploiting Excel Online
  • IMP4GT: Impersonation Attacks in 4G Networks
  • Plundervolt: Flipping Bits from Software without Rowhammer
  • Portable Document Flaws 101
  • Spectra: Breaking Separation Between Wireless Chips
  • About Directed Fuzzing and Use-After-Free: How to Find Complex & SilentBugs?
  • A Little Less Speculation, a Little More Action: A Deep Dive into Fuchsia's Mitigations for Specific CPU
  • Side-Channel Attacks
  • Breaking Brains, Solving Problems: Lessons Learned from Two Years of Setting Puzzles and Riddles for
  • InfoSec Professionals
  • Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
  • EdTech- The Ultimate APT
  • Heroku Abuse Operations: Hunting Wolves in Sheep's Clothing
  • Hunting Invisible Salamanders: Cryptographic (in)Security with Attacker-ControlledKeys
  • Kr00k: Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
  • When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security
  • Black-Box Laser Fault Injection on a Secure Memory
  • Page
  • Dive into Apple IO80211FamilyV2
  • Experimenting with Real-Time Event Feeds
  • Exploiting Kernel Races through Taming Thread Interleaving
  • Improving Mental Models of End-to-End Encrypted Communication
  • My Cloud is APT's Cloud: Investigating and Defending Office 365
  • Remote Timing Attacks on TPMs, AKA TPM-Fail
  • Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation
  • The Dark Side of the Cloud - How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis
  • A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
  • Beyond Root: Custom Firmware for Embedded Mobile Chipsets
  • Lateral Movement and Privilege Escalation in GCP; Compromise any Organization without Dropping an
  • Implant
  • Mind Games: Using Data to Solve for the Human Element
  • Operation Chimera - APT Operation Targets Semiconductor Vendors
  • The Paramedic's Guide to Surviving Cybersecurity
  • TiYunZong: An Exploit Chain to Remotely Root Modern Android Devices - Pwn Android Phones from2015 to 2020
  • Virtually Private Networks
  • You have No Idea Who Sent that Email: 18 Attacks on Email Sender Authentication
  • July 2019 Central China Normal University, Wuhan-Hubei,China
  • Robots’ theory and Its Application
  • Department of Information technology
  • Outline
  • The purpose of the training was to introduce basics of modelling, design, planning and control of roboticsystem
  • The training Workshop covered the following topics or areas
  • General introduction to robotics
  • Rotation and coordinate transformation
  • Design of mobile robots
  • Remote sensing
  • Data analysis and machine learning
  • Navigation, control and path planning
  • Technology development in robotics
  • July 2019 Central China Normal University, Wuhan-Hubei, China
  • Statistical Modelling and Visualization in R
  • Department of Information technology
  • Outline
  • The purpose of the training workshop is to learn how to use R to conduct statistical modelling andvisualization based on large – scale educational dataset
  • The training Workshop covered the followingtopics or areas
  • Basics of R programming language including factors, lists and dataframe
  • Advanced packages in R
  • Using R in applied statistics in the field of education
  • Page
  • Awards & Prizes / Personal Wins

Software

Programming

Certification

Microsoft Certified Azure Security Engineer Associate

Interests

Movies

Sports

Music

Living Life

Reading

Researching

Gaming

Gaming,Movies ,Sports ,Music, Living Life ,Reading, Researching ,Gaming

Fifa Gaming, Crime and Science fiction

Timeline

Information Technology Coordinator

Ghana Education Service
11.2021 - 04.2023

Ethical Hacking | Penetrating Testing and Bug Hunting by Udemy

07-2021

Data Science by I.B.M, Coursera

07-2021

Ph.D. - Cyberspace Science And Engineering

Wuhan University
08.2020 - Current

Microsoft Certified Azure Security Engineer Associate

07-2020

CNSS Certified Network Security Specialist by ICSI (International Cybersecurity Institute), United Kingdom

07-2020

SQL for Data Science by University of California, Coursera

07-2020

Enterprise System Management and Security by University of Colorado System, Coursera

07-2020

Forensic Accounting and Fraud Examination by West Virginia University, Coursera

07-2020

Learn Python Programming from Scratch by Eduonix Securities.

06-2020

Web Application Penetration Testing by Cryptos Cyber Security Private Limited

05-2020

Enterprise System Management and Security - Management Information Systems

University of California, University of Colorado System
01.2020 - 07.2020

Coursera Data Science -

I.B.M
01.2020 - 07.2023

Forensic Accounting And Fraud Examination - Forensic Science

West Virginia University
01.2020 - 07.2020

Data Science - Data Management Technology

I.B.M
01.2020 - 07.2020

Independent Security Researcher

Bugcrowd
08.2019 - Current

Instructor

Udemy
07.2019 - Current

Private English Teacher

English Center
04.2019 - 05.2019

Voluntary Worker

Central China Normal University
08.2018 - 09.2018

Creative Director

Central China Normal University
01.2018 - 01.2019

Computer Science -

Eduonix Securities
01.2018 - 04.2019

Private English Teacher

Xiangyang Primary Foreign School
12.2017 - 01.2018

Senior Art and Creative Director

Central China Normal University
08.2017 - 07.2019

Private English Teacher

Hubei-Yichang Foreign School
12.2016 - 01.2017

Assistant Marketing Coordinator

Central China Normal University
08.2016 - 12.2016

Master of Science - Management, Management Science and Engineering

Central China NormalUniversity
03.2016 - 07.2018

Technical Support Technician and Database ManagementAssistant

Techno Paint Company, Umm Al Quwain
11.2014 - 08.2015

Technical Support Network Technician

Regional Maritime University
08.2013 - 07.2014

Information Technology Teacher

Presbyterian Boys School, PRESEC-LEGON
05.2011 - 08.2011

Database Administrator

Kingsam Mineral Water Company
05.2010 - 08.2010

Bachelor of Education - Information Technology

Valley View University
08.2009 - 07.2013

Information Technology Teacher

Queen of Heart Preparatory School
08.2008 - 07.2009

High School Diploma -

Koforidua Secondary And Technical School
08.2005 - 05.2008
Isaac Osei AsantePython Programmer,Penetrating Tester,Creative Director,Network Security,Data Analyst