Nutthawat Worachotchawin

Contact • +66-99-225-6290fc.nutthawat@gmail.com

3 Moo 2 , Banrai , Damnoensaduak , Ratchaburi TH 70130

Cloud Service
On Site : Auto Mobile (now)


Experience

Cloud Service ,AWS

On Site: Auto Mobile

Cloud engineers are responsible for designing, implementing, and managing cloud-based systems to ensure a secure cloud environment and appropriate availability of services. Cloud engineers usually specialize in a specific cloud-service vendor, such as Microsoft Azure, Google Cloud, or Amazon Web Services.

June 2024 - Present

Freelance Implement - Consult

System Engineer

Onsite Implement / Installation / Configuration / Maintenance
Windows Server / Backup and Restore AD System State /
Mail Server / Microsoft Exchange / DAG / Troubleshooting
Virtualization / Hyper-V / VMware
Veeam Back up

Prepared the environment for deployment of Windows Server 2019.
Analyzed the hardware and software requirements of Active Directory.
Installed, configured, and provide troubleshooting for Server 2019.
Migrated Windows Server 2003 from test environment to the production environment.
Implemented and managed IP Addressing; configured TCP/IP addressing on a server.
Created the Forest Root domain, and a Child domain in a production environment.
Installed and configured an Active Directory Domain Controller.
Established external trusts and cross-forest trusts.
Managed an Active Directory site; replication schedules, site links and boundaries.
Performed authoritative and non-authoritative restore operations.
Diagnosed and resolved issues related to master’s role failure and AD database.
Configured automatic updates for network clients by using Group Policy.
Designed, planned and implemented Group Policy, delegation strategies and OU structure.
Managed local, roaming, and mandatory profiles, planed strategy for placing Global Catalogue (GC) and evaluated the need to enable Universal Group Caching.
Created user accounts in Active Directory

January 2020 - May 2024

Freelance Programming Automation Control System (Onsite & Remote Service)

Automation Factory System Engineer

Manage Team Implement – Consult
Design, Implement, Wiring and Installation automation control system PLC programs.
Analyze and Solve Problems automation control system.
PLC Password Unlocking Service

January 2016 - December 2019

TorTerakit Automation Company Limited, Bangkok, Thailand

Service Engineer

Manage Team Implement – Consult
Provide advice and solutions to customer problems regarding automatic control systems.
Design, Implement, Wiring and Installation automation control system programs
Design automation control PLC and HMI programs.
Control Servo and Inverter

July 2011 - December 2015

Education

King Mongkut’s University of Technology Thonburi, Bangkok

Bachelor of Electrical Engineering
Major : Power Electric

GPA: 3.02

May 2007 - March 2011

Skills

Programming Languages & Tools
Operating Systems
  • Windows XP
  • Windows Vista
  • Windows 7, Windows 8
  • Windows 10 , Windows 11
  • DoS
  • Linux
Microsoft Servers
  • Windows Server 2003
  • Windows Server 2008
  • Windows Server 2012
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Mail Servers
  • Microsoft Exchange 2003
  • Microsoft Exchange 2007
  • Microsoft Exchange 2010
  • Microsoft Exchange 2013
  • Microsoft Exchange 2016
  • Microsoft Exchange 2019
High availability
  • Cluster File Server, Cluster SQL, SQL Always On
  • Hyper-V Cluster and Replica Broker Exchange
  • Database Availability Group (DAG)
Software
  • MS Office 2007, MS Office 2003/XP, Norton Utilities, WinFax, McAfee,
    WinZip, Symantec Ghost, Dame Ware Mini Remote Console, Anydesk,
    Oracle and so on
Hardware
  • Intel, AMD, HP, IBM, Dell PowerEdge and others
Virtualization
  • Microsoft Hyper-V, VMware
Networking
  • TCP/IP, Routers, Switches, Modems, Hubs and Bridges
Backup Product
  • Veeam Backup
Cloud
  • AWS, Azur, GCP, MS365
Deployment
  • WSUS

Interests

  • Cloud Technology and Cybersecurity

Cloud Technology and Cybersecurity: A Symbiotic Relationship

In the digital age, the cloud has become an indispensable component of modern infrastructure. From personal data storage to critical business operations, organizations increasingly rely on cloud-based services. However, the proliferation of cloud technology has also introduced new challenges, particularly in the realm of cybersecurity. The symbiotic relationship between cloud technology and cybersecurity is complex and multifaceted, requiring a delicate balance to ensure both innovation and security.

One of the primary benefits of cloud computing is its scalability. Businesses can easily adjust their computing resources to meet fluctuating demands, avoiding the need for upfront investments in hardware. However, this flexibility also presents security risks. If not properly managed, cloud environments can become susceptible to vulnerabilities such as misconfigurations, data breaches, and unauthorized access. To mitigate these risks, organizations must implement robust security measures, including regular vulnerability assessments, strong access controls, and data encryption.

Moreover, the shared nature of cloud infrastructure can introduce additional security challenges. Multiple tenants often share the same cloud platform, increasing the potential for data breaches and attacks. To address this issue, cloud providers must invest in advanced security technologies, such as intrusion detection systems and threat intelligence, to protect their customers' data. Additionally, organizations should adopt best practices for data isolation and segregation to minimize the risk of unauthorized access.

Despite the challenges, cloud technology offers significant opportunities for enhancing cybersecurity. Cloud-based security solutions, such as firewalls, intrusion prevention systems, and malware detection tools, can be deployed rapidly and efficiently. Furthermore, cloud providers often have access to specialized security expertise and resources that can help organizations stay ahead of emerging threats. By leveraging the capabilities of cloud technology, businesses can strengthen their security posture and protect their valuable assets.

In conclusion, the relationship between cloud technology and cybersecurity is symbiotic. While the cloud offers numerous benefits, it also introduces new challenges. To ensure a secure and reliable cloud environment, organizations must adopt a comprehensive approach to security, including implementing robust security measures, leveraging cloud-based security solutions, and staying informed about emerging threats. By striking the right balance between innovation and security, businesses can harness the power of cloud technology while mitigating the risks.


Training & Certifications

  • Active Directory Basic and Advance - MCT
  • AWS , Azure , GCP - MCT
  • Fortigate for Admin - MCT
  • Complete Ethical Hacking Bootcamp - Udemy
  • Devop Fundamental : CICD with AWS + Docker + Ansible + Jenkins - Udemy
  • AWS Cloud Practitioner - Udemy
  • AWS Advanced Networking Specialty - Udemy
  • DevSecOps Bootcamp - Udemy
  • Cyber Security From Beginner to Expert - Udemy