Cyber Security/Digital Forensics
1. Analyze logs for attacks using Arcsight, Splunk, and Sysmon.
2. Create rules on Arcsight (SIEM) to detect attacks.
3. After a customer has been attacked, analyze the evidence and create a
forensics report for the customer.
4. Conduct threat hunting in the customer’s environment.
5. Perform ethical hacking in a test environment to analyze attacker behavior.
6. Provide threat intelligence.
7. Develop a proof-of-concept (POC) each week to simulate a hacker attack
and evaluate prevention techniques.
8. Write three strategic intelligence articles per week.
9. Write two articles per week on tactical intelligence and technical intelligence.
10. Provide threat analysis and consulting for SOC Analysts regarding attacks.
SOC Manager
1. Manage and monitor SOC operations 24/7/365 to ensure uninterrupted and
efficient service.
2. Define work procedures to maximize the efficiency of analysts and
responders.
3. Manage the IT Incident Management System (ITSM) and create incident
reports.
4. Develop and maintain incident response plans and documents, including
use case testing and malware attack handling.
5. Conduct daily security checks to identify and resolve incidents promptly.
(Analyse False Positive incident)
6. Ensure services comply with SLAs/OLAs and meet customer satisfaction.
7. Monitor and report performance to ensure effective incident management
and resolution.
8. Plan work schedules to ensure uninterrupted services, even during staff
absences.
9. Test and evaluate systems like SIEM tools (e.g., QRadar, Splunk) for SOC
efficiency.
10. Implement system upgrades and document improvements for operational
efficiency.
11. Conduct vulnerability assessments (VA), vulnerability management (VM),
and penetration testing (PT).
12. Develop SOC training programs, including cybersecurity awareness and
technical training.
13. Inspect and validate SOC team performance across all levels (L1-L3).
14. Hold regular shift meetings to review issues and report weekly progress.
15. Propose solutions to enhance SOC systems to meet client needs.
16. Analyze threat intelligence to monitor and respond to global threats
effectively.
17. Analyze threat hunting
ธันวาคม 2564 ถึง กุมภาพันธ์ 2566
Solutions Consultant
World Information Technology
กรุงเทพ
สำหรับสมาชิกเท่านั้น
1. Team management such as job, skill and learning of member.
2. Coordinate with Akamai partner for problem solving
3. Security configuration for website such as Web Application Firewall (WAF)
on Layer 7 and DDOS on Layer 3 and 4.
-For WAF such as Command injection, XSS, LFI, RFI, SQL injection, Total
outbound, Web attack tool.
-For DDOS such as Mitigating HTTP flood attacks using POST requests,
Protect brute force, Control rate limit for malicious activity.
4. Traffic monitoring for website.
5. Increase speed of website with Content Delivery Network.
6. User management for customer.
มิถุนายน 2563 ถึง พฤศจิกายน 2564
IT Supervisor
Jaspal and sons
ถนนสีลม
สำหรับสมาชิกเท่านั้น
1. Manage client on SEPM
2. Manage IT job and resolve problem
3. Manage network system and resource such as VLAN, Port status etc.
4. Manage IT equipment such as stock and spare
5. Manage user in system such as Office 365, Jaspal system, Internet user
6. Monitoring and manage Access Point in WLC
7. Installation, Configuration, Manage and Resolve for Web Application on
WordPress and Web Server on Plesk (phpMyAdmin, MariaDB)
8. Technical Support Hardware, Software and Network
KDDI Corporation, Assistant Manager, June 2019 - June 2021 (2 years 1 month)
HBA Thailand,Leader,March 2015 - May 2019 (4 years 3 months
Kaset Phol Sugar LTD. Dec 2011 Jan 2015
Faculty of Tropical Medicine, Mahidol University Apr 2004 Sep 2011