TERRY GLUFF

Hartland, WI

Terry@Gluff.me

Career Objective

Highly motivated individual progressing towards implementation of security and stability in all environments.

⚙ Technical Qualifications

Operating Systems

Windows Desktop/Server/Exchange

ESXi, Scale, Hyper-V

Linux Install/Config/Management

Microsoft Office

Cabinet Vision, Tabs3, Worldox

Networking

Cisco Router/Switch Config

VLAN / 802.1Q

LAN/WAN Technologies

TCP/IP, DNS, DHCP

FTP, Telnet, SMB

AD, GPO, Shared Folders

Security

Active Directory & GPO

HIPAA, PCI, NIST Compliance

System Performance Monitoring

Desktop Support

Exploit & Vulnerability Defense

Hardware

Server & Network Infrastructure

HDDs, Motherboards, RAM

NICs, Power Supplies

Network Printer Setup

💼 Professional Experience

ElevityIT Sep 2022 – Present

Consulting Project Engineer

  • Discuss and modify project plans to reflect accuracy
  • Set expectations with clients through progression of projects
  • Deploy hardware and services as defined by scope of project
  • Support client throughout project implementation
  • Document changes in environment for primary support team and service desk
  • New Client Onboarding — meet new clients, run full discovery, document procedures
  • Meet with internal and external teams to discuss changes
  • Support client through any questions/issues throughout process

ElevityIT Sep 2020 – 2022

Consulting Engineer

  • Resolve client issues in timely manner with extraordinary client feedback
  • Deploy hardware and software solutions that meet client needs
  • Project deployment — set expectations, create outline, communicate, execute
  • Configuration and troubleshooting: MFA, Backup & DR, VMs, VPN

Xanook (Self-employed) Sep 2017 – Present

President

  • Build and deploy web servers for EMAIL, FTP, FTPES, HTTPS, RTSP
  • Compliant with HIPAA, PCI and NIST standards
  • Provide network security from vulnerabilities — Viruses, Malware, Packet Sniffing/Injection, Exploits, MITM attacks
  • Virtual environment learning of exploits, Linux server administration and vulnerability remediation
  • Communication skills used to grow and maintain customers and engineers

PCLAN Services Nov 2016 – Sep 2020

Network Administrator

  • Described solutions to customers to implement reliability, security and BDR solutions
  • Project lead on multiple email migrations to GSuite/Office 365
  • Implemented Single Sign On utilizing Azure/Office 365 company-wide and at client locations
  • Installed and maintained Mobile Device Management systems
  • Managing and configuring LAN/VLAN assignment and static 802.1Q trunks
  • Implementing training standards internally and externally
  • Complied with HIPAA, PCI and NIST standards

Action DDS Oct 2015 – 2016

Production Specialist / I.T. Analyst

  • Copy, scan, produce and unitize client documents as requested
  • Performed Forensics to retrieve data
  • Configured Server 2008R2 Roles and Domain services
  • Provide knowledge of threats and countermeasures
  • Implemented server/SQL redundancy and security

TechyTerry (Self-employed) Mar 2015 – 2017

Technology Specialist

  • Communication used to find and grow customer base
  • Diagnosed Hardware & Software — Implemented Repairs
  • Removed Virus & Malware — Created backups & restored data
  • Personal virtual environments that I learned to exploit and secure
  • 100% satisfaction rating on all jobs

Peak Systems Inc 2015 – 2016 (Per Job)

I.T. Contractor

  • Computer Deployment
  • Memory Swap
  • Hard Disk Backup/Swap/Restore

Modus EDiscovery Jul 2014 – Oct 2015

Production Specialist

  • Copied and scanned client documents
  • Organized and Quality Checked documents
  • Export in formats: Summation, Concordance, PDF, iPro

🎓 Education

ITT Technical Institute 2014 – 2016

Associates — Network System Administrator

Greenfield, WI / Indianapolis, TN

Lab Work Highlights

  • Software installation, upgrades and configuration for Windows XP, Server 2003/2008, Office, and security tools
  • Implementation of event auditing, software policies through Active Directory and group policy
  • Server hardening — closing ports, anti-virus, firewalls, intrusion detection
  • Firewall and VPN configuration and security
  • Disaster recovery planning for information security policy
  • Database design, optimization, and future-proofing
  • Digital forensics using FTK — data extraction, documentation, and analysis while maintaining source integrity