# Yongqing Zhu > Software Engineer at ByteDance Location: San Francisco Bay Area, United States Profile: https://flows.cv/yongqing Proficient Languages: C/C++ and Python Version Control: Git, Perforce Useful Tools: GDB, Vim, Shellscript, Wireshark Hands-on experience in Linux, FreeBSD, REST api, kubernetes, Regex Full cycle C++ software development (design, develop, unit testing, review, integration testing) Multi-threads programming, scaling C++ program development, data protection and replication strategies Knowledge of exploit techniques, such as Buffer Overflow, Use-after-free, SQL injection, XSS, CSRF, MITM, Dos & DDos Strong understanding of basic network protocols, such as HTTP, UDP, TCP, SMTP, DNS, FTP ## Work Experience ### Software Engineer @ TikTok Jan 2021 – Present | Mountain View, California, United States US Storage Infra team: - worked on bytedance RPC framework and its integration with different storage products - working on distributed journal system ### Software development Engineer @ NetApp Jan 2019 – Jan 2021 | San Francisco Bay Area Developed and maintained ONTAP data management system, practical working experience on Snapmirror which is the data protection tool for data replication and data management. Solid understanding of both on-premise and cross-platform Snapmirror, endpoints including ONTAP, solid fire, virtual machine and cloud endpoint(AWS, Azure, GCP etc). Key player in Snapmirror copy-to-cloud license project (C++ and Python). - Implemented APIs to periodically monitor the total physical usage of source volume in cloud endpoint Snapmirror relationships. - Implemented CLI & REST API to get the cloud endpoint information. Main contributor in copy-to-cloud backup with Trident(storage orchestrator for containers) and ADC(Filesystem in Userspace plugin) in kubernetes(k8s) cluster. Using Pistache as the REST framework and Swagger for REST APIs (C++). - Implemented a series of REST api calls to manage volume snapshots in the cloud (GCP, AWS, AZURE). ### Network Security Engineer internship @ Mogujie Jan 2018 – Jan 2018 | Hangzhou, Zhejiang, China * Deploy SURICATA in a by-pass server, by using splitting flows to collect statistical data. -Test SURICATA in multiple conditions and collect the results(hits in Emerging Threat rule set). Based on the data, select the useful rules to be transplanted into the moguIDS, which is co-operated with WAF(Web Application Firewall) * Implement Alerts module in moguIDS -Implement intrusion detection for moguIDS in two strategy: IP blacklist and Regex Match based on the selected rules. -Maintain the performance of moguIDS(which is developed based on DPDK), using Hyperscan to achieve fast detection at almost 0.00% loss rate in 350k pps network environment. -Use Hive to accumulate the format data into Hadoop, which is processed for anti-scan and future intrusion prevention purposes. ## Education ### Master's degree in Computer Science University of California, Riverside ### GPPE in Computer Science University of California, Riverside ### Bachelor's degree in Internet of Things Huazhong University of Science and Technology ## Contact & Social - LinkedIn: https://linkedin.com/in/yongqing-zhu --- Source: https://flows.cv/yongqing JSON Resume: https://flows.cv/yongqing/resume.json Last updated: 2026-03-29