Available for Immediate Hire
I’m an IT professional with 7 years of hands-on experience in systems administration, security implementation, and infrastructure management across manufacturing and distribution environments. Exploring opportunities where my practical experience can add value.
This page describes my actual work experience and capabilities based on specific implementations and day-to-day responsibilities in previous roles. It does not constitute a claim of comprehensive expertise in all aspects, features, or edge cases of mentioned technologies or platforms.
What I Bring
Leadership & Strategy
- Served on Executive Leadership Team as IT Manager
- Led enterprise-wide IT infrastructure across multiple locations
- Implemented modern security practices and business continuity solutions
- Managed vendor relationships and cloud infrastructure (AWS)
Security Expertise
- Implemented security tools and practices across entire organization
- Led incident response and security breach mitigation
- Discovered and reported zero-day vulnerabilities in enterprise ERP software
- Experience with MITRE ATT&CK, NIST Risk Management Framework, GDPR compliance
Cloud & Infrastructure
- Azure/Microsoft 365 hybrid environment administration (Entra ID, Exchange Online, SharePoint, Teams)
- Windows Server and Active Directory domain management
- AWS infrastructure management (EC2, S3, CloudFront, Lambda)
- Hybrid cloud environments bridging Azure, on-premises infrastructure, and AWS
- Infrastructure as Code (Terraform experience)
- Network security (Fortinet, SonicWall, Netgate, pfSense)
Automation & Development
- Python, PowerShell, Bash scripting for automation
- Created business automation solutions (shipping/receiving with SQL integration)
- Built production-ready tools and scripts (see Scripts)
- This entire site is built and deployed with automation I created
Examples of Work Completed
- Security Implementation: Deployed security tools and practices for data protection in previous role
- Business Continuity: Implemented backup and disaster recovery procedures across multiple locations
- Automation: Created Python/C# scripts that automated manual processes in ERP system integration
- Incident Response: Participated in and led security incident mitigation efforts
- Vulnerability Research: Identified and reported security vulnerabilities in enterprise software to vendor
Technical Experience
The following reflects practical experience from actual implementations and day-to-day work, not comprehensive knowledge of all features or edge cases.
Cloud Platforms: Managed hybrid Azure/Microsoft 365 environment including Entra ID (Azure AD), Exchange Online, SharePoint, Teams, and Intune for enterprise user management and collaboration. Implemented conditional access policies, device management, and security controls across the Microsoft ecosystem. Also have practical experience deploying specific AWS services including EC2 instances, S3 storage, CloudFront distributions, and Lambda functions. Have implemented hybrid architectures connecting cloud services to on-premises Windows domain infrastructure.
Identity & Access Management: Administered Active Directory and Azure Entra ID environments for user provisioning, group policy deployment, and access control. Implemented multi-factor authentication solutions and managed user lifecycle processes in enterprise settings.
Security Infrastructure: Deployed and maintained endpoint protection, network firewalls, and VPN solutions using vendors including Fortinet, SonicWall, pfSense, Sophos, Barracuda, and BitDefender. Experience is based on specific business security requirements, not all available features.
Windows Infrastructure: Administered Windows Server environments including Active Directory Domain Services, Group Policy, DNS/DHCP services, and file/print servers in production environments.
Backup & Recovery: Implemented and managed Veeam backup solutions, designed backup schedules, and tested recovery procedures for business continuity.
Scripting & Automation: Written Python, PowerShell, Bash, C#, and SQL scripts for specific automation tasks including business process integration with ERP systems and infrastructure management tasks encountered in daily work.
Tools & Platforms: Used RMM platforms (Atera, Action1), web servers (Apache, Nginx, IIS), and various monitoring/management tools as needed for specific job functions. Experience reflects practical use for business needs.
What I Bring to the Table
Practical Execution - Track record of completing projects and delivering working solutions. This site demonstrates hands-on technical capability.
Security Awareness - Background implementing security tools, responding to incidents, and considering security implications in infrastructure decisions.
Business Context - Experience working with executive leadership and translating technical decisions into business value.
Problem-Solving Approach - Comfortable identifying issues, researching solutions, and implementing fixes independently.
Continuous Learning - Stay current with security trends and new technologies through hands-on experimentation and practical application.
What I’m Exploring
Role Types of Interest: Positions in IT management, security, infrastructure, cloud operations, or DevOps. Open to roles that leverage my background in systems administration, security implementation, and team leadership. Not claiming to match every requirement - interested in discussing how my experience aligns with your specific needs.
Location: Remote preferred, open to Michigan-based opportunities
Compensation: Negotiable based on role, responsibilities, and fit
Environment: Organizations that value practical problem-solving, security-conscious operations, and continuous improvement
Let’s Talk
Email: kevin@glyph.sh
See My Work
Everything on this site demonstrates hands-on technical capability:
- Scripts - Production-ready automation scripts for Linux, macOS, and Windows
- Tools - Privacy-first browser tools I built (no data collection, runs entirely client-side)
- Documentation - Technical guides from real implementations:
- Security Hardening Checklist - Practical hardening across Windows, Linux, and macOS
- Infrastructure as Code Best Practices - Terraform patterns and IaC workflows
- Zero Trust Architecture - Modern security architecture principles
- Posts - Technical write-ups and security insights:
- Blocking AI Scrapers with AWS WAF - How I built technical enforcement for robots.txt violations
- Management Frameworks for IT Leaders - Practical project management from an IT Manager perspective
- Everything as Code: Platform Engineering - Building automated infrastructure workflows
- About - More about my background and experience
Ready to talk? Email me at kevin@glyph.sh for my full resume and to discuss opportunities.