CurriculumVitae

zhaohongri’s Curriculum Vitae

Zhao Hongri (Leo Zhao)

Cloud Security Solutions Architect

📧 flashoop@gmail.com | 📱 +60 17 203 2066 / +86 158 1127 0428

📍 Kuala Lumpur, Malaysia | 🎓 B.S. Computer Science | 💼 18 Years Experience

🔗 LinkedIn

🎯 OffSec Profile


Professional Summary

Accomplished Cloud Security Solutions Architect with over 18 years of IT experience and 10+ years specializing in cloud security across AWS, Azure, and GCP platforms. Proven track record managing cloud security products at Alibaba Cloud and Huawei Cloud, with expertise in Anti-DDoS defense, Identity and Access Management (IAM), penetration testing, and regulatory compliance (GDPR, PCI-DSS, R155).

Successfully delivered $25M+ in security solutions revenue for enterprise clients across APAC, Middle East, and LATAM regions, including financial services, Web3, and automotive sectors. Holder of multiple elite certifications including CISSP, CCSP, OSCP, OSEP, GCPN, and AWS certifications.


Core Competencies

Cloud Security: AWS Security Specialist | Azure & GCP Security | Anti-DDoS Defense Architecture | IAM Design & Implementation

Cybersecurity: Penetration Testing (OSCP, OSEP, GCPN) | Vulnerability Assessment | Security Architecture | Threat Detection & Response

Compliance & Governance: GDPR | PCI-DSS | R155 | PDPA | SOC 2 | ISO 27001 | CIPP/E Certified

Technical Skills: Cloud Native Security | Network Security | Application Security | DevSecOps | Security Automation


Professional Experience

Cloud Security Solutions Architect | Huawei Technologies Malaysia

Huawei Cloud Computing Technology Co., Ltd. | December 2016 - Present

Global Sales Solutions Department (Malaysia) | Current Role

Cloud Security R&D Department (Beijing) | Previous Role

Anti-DDoS Product Management:

Identity and Access Management (IAM) Product Management:


Cloud Security Product Manager | Alibaba Cloud Computing Technology Co., Ltd.

Cloud Security Product Management Department | February 2013 - December 2016 | Hangzhou, China


Product Manager, Enterprise Security | Qihu 360 Enterprise Security

Enterprise Security Product Division | September 2006 - December 2013 | Beijing, China


Key Projects & Achievements

Enterprise Client Projects

Gaming Sector Specialist:

Lead security architect for top-tier gaming clients including Tencent Games (LATAM), Lilith Games, and 37 Interactive Entertainment (三七互娱).

Designed robust architectures to defend against Tbps-level DDoS attacks while maintaining ultra-low latency (<50ms) for global players.

Financial Services & Web3 Security

Automotive IoV Compliance Solutions


Personal Projects & Open Source

CyberDiagram - Security Audit Specialist Agent

cyberdiagram.com

AI-driven automated security audit platform integrating professional penetration testing tools with intelligent decision-making capabilities using Claude AI and Model Context Protocol (MCP).

Key Features:

Technology Stack: Claude AI, Model Context Protocol, Nmap, Metasploit, Exploit-DB

cyberdiagram
cyberdiagram2

Snapano - Network Asset Visualization Platform

snapano.com

Data visualization platform for simplified asset management and compliance reporting. Enables online management of network assets through interactive topology visualization.

snapano


Professional Certifications

Security Certifications

CCSP

Cloud Certifications

Privacy & Compliance


Education

Bachelor of Science in Computer Science

University Name | Graduation Year


Languages

English: Upper Intermediate (B2) - Professional Working Proficiency

Mandarin Chinese: Native Proficiency


Career Objectives

Target Positions:

Preferred Locations:


Technical Proficiencies

Cloud Platforms: AWS, Azure, Google Cloud Platform (GCP), Huawei Cloud, Alibaba Cloud

Security Tools: Metasploit, Nmap, Burp Suite, Wireshark, Exploit-DB, DirBuster

Programming/Scripting: Python, JavaScript/TypeScript, React, Node.js, Shell Scripting

Security Frameworks: NIST, ISO 27001, SOC 2, CIS Controls, OWASP Top 10

Networking: BGP, TCP/IP, DNS, Load Balancing, CDN, DDoS Mitigation

DevSecOps: CI/CD Security, Container Security, Infrastructure as Code (IaC)


References available upon request