TERRY GLUFF
Hartland, WI
Terry@Gluff.me
Career Objective
Highly motivated individual progressing towards implementation of security and stability in all environments.
⚙ Technical Qualifications
Operating Systems
Windows Desktop/Server/Exchange
ESXi, Scale, Hyper-V
Linux Install/Config/Management
Microsoft Office
Cabinet Vision, Tabs3, Worldox
Networking
Cisco Router/Switch Config
VLAN / 802.1Q
LAN/WAN Technologies
TCP/IP, DNS, DHCP
FTP, Telnet, SMB
AD, GPO, Shared Folders
Security
Active Directory & GPO
HIPAA, PCI, NIST Compliance
System Performance Monitoring
Desktop Support
Exploit & Vulnerability Defense
Hardware
Server & Network Infrastructure
HDDs, Motherboards, RAM
NICs, Power Supplies
Network Printer Setup
💼 Professional Experience
ElevityIT Sep 2022 – Present
Consulting Project Engineer
- Discuss and modify project plans to reflect accuracy
- Set expectations with clients through progression of projects
- Deploy hardware and services as defined by scope of project
- Support client throughout project implementation
- Document changes in environment for primary support team and service desk
- New Client Onboarding — meet new clients, run full discovery, document procedures
- Meet with internal and external teams to discuss changes
- Support client through any questions/issues throughout process
ElevityIT Sep 2020 – 2022
Consulting Engineer
- Resolve client issues in timely manner with extraordinary client feedback
- Deploy hardware and software solutions that meet client needs
- Project deployment — set expectations, create outline, communicate, execute
- Configuration and troubleshooting: MFA, Backup & DR, VMs, VPN
Xanook (Self-employed) Sep 2017 – Present
President
- Build and deploy web servers for EMAIL, FTP, FTPES, HTTPS, RTSP
- Compliant with HIPAA, PCI and NIST standards
- Provide network security from vulnerabilities — Viruses, Malware, Packet Sniffing/Injection, Exploits, MITM attacks
- Virtual environment learning of exploits, Linux server administration and vulnerability remediation
- Communication skills used to grow and maintain customers and engineers
PCLAN Services Nov 2016 – Sep 2020
Network Administrator
- Described solutions to customers to implement reliability, security and BDR solutions
- Project lead on multiple email migrations to GSuite/Office 365
- Implemented Single Sign On utilizing Azure/Office 365 company-wide and at client locations
- Installed and maintained Mobile Device Management systems
- Managing and configuring LAN/VLAN assignment and static 802.1Q trunks
- Implementing training standards internally and externally
- Complied with HIPAA, PCI and NIST standards
Action DDS Oct 2015 – 2016
Production Specialist / I.T. Analyst
- Copy, scan, produce and unitize client documents as requested
- Performed Forensics to retrieve data
- Configured Server 2008R2 Roles and Domain services
- Provide knowledge of threats and countermeasures
- Implemented server/SQL redundancy and security
TechyTerry (Self-employed) Mar 2015 – 2017
Technology Specialist
- Communication used to find and grow customer base
- Diagnosed Hardware & Software — Implemented Repairs
- Removed Virus & Malware — Created backups & restored data
- Personal virtual environments that I learned to exploit and secure
- 100% satisfaction rating on all jobs
Peak Systems Inc 2015 – 2016 (Per Job)
I.T. Contractor
- Computer Deployment
- Memory Swap
- Hard Disk Backup/Swap/Restore
Modus EDiscovery Jul 2014 – Oct 2015
Production Specialist
- Copied and scanned client documents
- Organized and Quality Checked documents
- Export in formats: Summation, Concordance, PDF, iPro
🎓 Education
ITT Technical Institute 2014 – 2016
Associates — Network System Administrator
Greenfield, WI / Indianapolis, TN
Lab Work Highlights
- Software installation, upgrades and configuration for Windows XP, Server 2003/2008, Office, and security tools
- Implementation of event auditing, software policies through Active Directory and group policy
- Server hardening — closing ports, anti-virus, firewalls, intrusion detection
- Firewall and VPN configuration and security
- Disaster recovery planning for information security policy
- Database design, optimization, and future-proofing
- Digital forensics using FTK — data extraction, documentation, and analysis while maintaining source integrity