Jacob Erdman
DevOps Engineer at Therapy Brands- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Pat Stream
Jake is a trusted IT professional with the highest regard for quick and personalized service. In every issue I've requested assistance Jake showed excellent follow through to the point of personally asking me if the problems were resolved and if there was any thing else he could do. Jake shows himself to be personally interested in solving IT problems and there is no match to his skill level. I've seen him balance and excel at meeting the demands of servicing the IT needs of a really fast growing company. He is truly an asset!
Pat Stream
Jake is a trusted IT professional with the highest regard for quick and personalized service. In every issue I've requested assistance Jake showed excellent follow through to the point of personally asking me if the problems were resolved and if there was any thing else he could do. Jake shows himself to be personally interested in solving IT problems and there is no match to his skill level. I've seen him balance and excel at meeting the demands of servicing the IT needs of a really fast growing company. He is truly an asset!
Pat Stream
Jake is a trusted IT professional with the highest regard for quick and personalized service. In every issue I've requested assistance Jake showed excellent follow through to the point of personally asking me if the problems were resolved and if there was any thing else he could do. Jake shows himself to be personally interested in solving IT problems and there is no match to his skill level. I've seen him balance and excel at meeting the demands of servicing the IT needs of a really fast growing company. He is truly an asset!
Pat Stream
Jake is a trusted IT professional with the highest regard for quick and personalized service. In every issue I've requested assistance Jake showed excellent follow through to the point of personally asking me if the problems were resolved and if there was any thing else he could do. Jake shows himself to be personally interested in solving IT problems and there is no match to his skill level. I've seen him balance and excel at meeting the demands of servicing the IT needs of a really fast growing company. He is truly an asset!
Credentials
-
Amazon Web Services Cloud Practitioner
Amazon Web Services (AWS)Mar, 2022- Nov, 2024
Experience
-
Therapy Brands
-
United States
-
Software Development
-
200 - 300 Employee
-
DevOps Engineer
-
Dec 2021 - Present
-
-
System Administrator
-
Aug 2017 - Dec 2021
Systems administrator in charge of managing and maintaining the internal network. Moved to Devops 02/2022.
-
-
-
Consultant for PJV Consulting
-
Greater Denver Area
-
IT Consultant
-
May 2016 - Aug 2017
As an IT Consultant, I Maintain and troubleshoot Windows Server Environments. I have knowledge of physical networking components including firewalls, switches, NICs, cabling, and patch bays. Additionally, I troubleshoot various issues with end users using Windows, Android, and IOS. I also help create and manage user accounts in Windows Server 2008, 2008 r2, 2012, 2012r2 as well as user profiles on the respective machines. There is also the PBX side of things in which I Install, configure, and… Show more As an IT Consultant, I Maintain and troubleshoot Windows Server Environments. I have knowledge of physical networking components including firewalls, switches, NICs, cabling, and patch bays. Additionally, I troubleshoot various issues with end users using Windows, Android, and IOS. I also help create and manage user accounts in Windows Server 2008, 2008 r2, 2012, 2012r2 as well as user profiles on the respective machines. There is also the PBX side of things in which I Install, configure, and maintain user extensions in 3CX. Show less As an IT Consultant, I Maintain and troubleshoot Windows Server Environments. I have knowledge of physical networking components including firewalls, switches, NICs, cabling, and patch bays. Additionally, I troubleshoot various issues with end users using Windows, Android, and IOS. I also help create and manage user accounts in Windows Server 2008, 2008 r2, 2012, 2012r2 as well as user profiles on the respective machines. There is also the PBX side of things in which I Install, configure, and… Show more As an IT Consultant, I Maintain and troubleshoot Windows Server Environments. I have knowledge of physical networking components including firewalls, switches, NICs, cabling, and patch bays. Additionally, I troubleshoot various issues with end users using Windows, Android, and IOS. I also help create and manage user accounts in Windows Server 2008, 2008 r2, 2012, 2012r2 as well as user profiles on the respective machines. There is also the PBX side of things in which I Install, configure, and maintain user extensions in 3CX. Show less
-
-
-
Far Ridgeline Engagements LLC
-
United States
-
Strategic Management Services
-
1 - 100 Employee
-
Independent Contractor
-
May 2011 - May 2011
As an Independent Contractor, I am working as a role player and evaluator for intelligence collection. As an Independent Contractor, I am working as a role player and evaluator for intelligence collection.
-
-
-
DISH Network
-
United States
-
Telecommunications
-
700 & Above Employee
-
Customer Service Representative
-
Jul 2010 - Jan 2011
-
-
-
US Army
-
United States
-
Armed Forces
-
700 & Above Employee
-
Counterintelligence Agent / Human Intelligence Collector
-
Jan 2005 - Jan 2010
Perform counterintelligence support to counter-terrorism operations through: consolidating intelligence data; conducting liaison operations with both foreign and domestic agencies; plan aerial operations; prepare maps and charts; utilize multiple computer intelligence programs; plan and conduct counterintelligence investigations; apply military and civil law; detect, neutralize, and exploit intelligence targets; conduct overt, covert, technical, and non-technical operations and surveillance of… Show more Perform counterintelligence support to counter-terrorism operations through: consolidating intelligence data; conducting liaison operations with both foreign and domestic agencies; plan aerial operations; prepare maps and charts; utilize multiple computer intelligence programs; plan and conduct counterintelligence investigations; apply military and civil law; detect, neutralize, and exploit intelligence targets; conduct overt, covert, technical, and non-technical operations and surveillance of designated targets. Develop, maintain, and disseminate multi-discipline threat data and intelligence files on organizations, locations, and individuals of intelligence interest. Debrief select personnel (friendly and hostile) who possess information of intelligence interest. Develop human source networks throughout area of operations to provide timely and pertinent force protection information. Evaluate Foreign Intelligence and terrorist organization collection capabilities and activities. Conduct security investigations and process evidence. Received, produced and disseminated intelligence reports containing information obtained from all sources. I completed three combat tours in Iraq conducting Military Source Operations as well as training Iraqi Special Forces Counterintelligence Agents. I received the purple heart in 2006 for injuries sustained while conducting a convoy operation. In addition, I received the Joint Service Achievement Medal, Joint Service Commendation Medal and the Army Achievement Medal. Show less Perform counterintelligence support to counter-terrorism operations through: consolidating intelligence data; conducting liaison operations with both foreign and domestic agencies; plan aerial operations; prepare maps and charts; utilize multiple computer intelligence programs; plan and conduct counterintelligence investigations; apply military and civil law; detect, neutralize, and exploit intelligence targets; conduct overt, covert, technical, and non-technical operations and surveillance of… Show more Perform counterintelligence support to counter-terrorism operations through: consolidating intelligence data; conducting liaison operations with both foreign and domestic agencies; plan aerial operations; prepare maps and charts; utilize multiple computer intelligence programs; plan and conduct counterintelligence investigations; apply military and civil law; detect, neutralize, and exploit intelligence targets; conduct overt, covert, technical, and non-technical operations and surveillance of designated targets. Develop, maintain, and disseminate multi-discipline threat data and intelligence files on organizations, locations, and individuals of intelligence interest. Debrief select personnel (friendly and hostile) who possess information of intelligence interest. Develop human source networks throughout area of operations to provide timely and pertinent force protection information. Evaluate Foreign Intelligence and terrorist organization collection capabilities and activities. Conduct security investigations and process evidence. Received, produced and disseminated intelligence reports containing information obtained from all sources. I completed three combat tours in Iraq conducting Military Source Operations as well as training Iraqi Special Forces Counterintelligence Agents. I received the purple heart in 2006 for injuries sustained while conducting a convoy operation. In addition, I received the Joint Service Achievement Medal, Joint Service Commendation Medal and the Army Achievement Medal. Show less
-
-
Education
-
Metropolitan State University of Denver
Bachelor of Science (B.S.), Computer Information Systems -
Community College of Denver
Certificate in Computer Technology, Computer Information Systems -
Cochise College
Intelligence -
Somerset High School
Diploma