{"id":4228,"date":"2024-01-07T15:31:09","date_gmt":"2024-01-07T15:31:09","guid":{"rendered":"https:\/\/www.testpoint.com\/testers\/chen-li\/"},"modified":"2024-02-11T14:44:52","modified_gmt":"2024-02-11T14:44:52","slug":"chen-li","status":"publish","type":"testers","link":"https:\/\/www.testpoint.com\/testers\/chen-li\/","title":{"rendered":"Chen Li"},"content":{"rendered":"","protected":false},"featured_media":4550,"template":"","meta":{"tester-full-name":"Chen Li","location":"Beijing, China","languages":"Mandarin, English","expertise-and-skills-1":"Security Testing","expertise-and-skills-2":"Performance Testing","industry-experiences":"AI, Big Data","reviews-1":"Chen Li did an excellent job ensuring the security of our AI platform","reviews-2":"his attention to detail was commendable and he showed great expertise in his field","reviews-3":"Chen Li's performance testing was thorough and he provided clear","reviews-4":"actionable feedback to improve our big data system","reviews-5":"We were impressed with Chen Li's commitment to maintaining high standards throughout the testing process","reviews-6":"his proficiency in both Mandarin and English was a great asset","reviews-7":"Chen Li's agile testing methods were efficient and effective for our project","reviews-8":"His understanding of AI and big data was evident in his work and greatly appreciated","reviews-9":"Chen Li's dedication to ensuring the software system's security was impressive","reviews-10":"he was professional and his work ethic was commendable","reviews-11":"We were very satisfied with Chen Li's work","reviews-12":"his expertise in security testing made a significant difference in our project.","reviews-13":"","reviews-14":"","reviews-15":"","certifications":"Certified Agile Tester","test-coverage-areas":"AI Platforms, Big Data Systems","number-of-completed-tests":"4350","bug-discovery-rate":"0.93","rating":"","price":"119","bio":"

Committed to ensuring the security and high performance of software systems.<\/p>\n","motivations":"

Enjoys identifying vulnerabilities and strengthening defenses in AI and big data systems.<\/p>\n","availability---time-zone":"CST (China Standard Time)","test-type":"Desktop Application Testing"},"test-type":[23],"_links":{"self":[{"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/testers\/4228"}],"collection":[{"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/testers"}],"about":[{"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/types\/testers"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/media\/4550"}],"wp:attachment":[{"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/media?parent=4228"}],"wp:term":[{"taxonomy":"test-type","embeddable":true,"href":"https:\/\/www.testpoint.com\/wp-json\/wp\/v2\/test-type?post=4228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}