Jeremy Ruhnke

Advanced Product Support Tier 2 at InMotion Hosting
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Seaford, Delaware, United States, US
Languages
  • English -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Google IT Support Specialization
    Coursera
    May, 2020
    - Nov, 2024
  • IT Security: Defense against the digital dark arts
    Coursera
    May, 2020
    - Nov, 2024
  • Operating Systems and You: Becoming a Power User
    Coursera
    May, 2020
    - Nov, 2024
  • System Administration and IT Infrastructure Services
    Coursera
    May, 2020
    - Nov, 2024
  • Technical Support Fundamentals
    Coursera
    Apr, 2020
    - Nov, 2024
  • The Bits and Bytes of Computer Networking
    Coursera
    Apr, 2020
    - Nov, 2024
  • cPanel & WHM System Administrator I Certification
    cPanel
    Nov, 2019
    - Nov, 2024
  • cPanel & WHM Administrator Certification (CWA)
    cPanel
    Oct, 2019
    - Nov, 2024
  • cPanel Professional Certification (CPP)
    cPanel
    Jun, 2019
    - Nov, 2024
  • Hosting Support II
    GoDaddy
    Jan, 2016
    - Nov, 2024

Experience

    • United States
    • Internet Publishing
    • 100 - 200 Employee
    • Advanced Product Support Tier 2
      • May 2021 - Present

    • Technical Support Tier 1 E
      • Apr 2021 - May 2021

      • Providing exceptional service to web hosting small to medium size business customers by understanding their goals and objectives and creating a plan to accomplish those objectives • Troubleshooting advanced technical issues related to web applications and server configurations • Having elevated permissions and experience to provide in depth resolutions • Providing detailed consultations with advice built on best practices • Analyzing accounts for resource usage, identify resource… Show more • Providing exceptional service to web hosting small to medium size business customers by understanding their goals and objectives and creating a plan to accomplish those objectives • Troubleshooting advanced technical issues related to web applications and server configurations • Having elevated permissions and experience to provide in depth resolutions • Providing detailed consultations with advice built on best practices • Analyzing accounts for resource usage, identify resource and technical debt issues within an account • Performing migrations of websites and user content from a wide range of web hosting platforms • Configuring and installing software using WHM and the Linux command line, bash, and cPanel API • Maintaining and strengthening the customer relationship by thrilling the customer in every interaction • Serving as an escalation point and mentoring resource for other team members

    • Technical Support Tier 1
      • May 2020 - Apr 2021

      • Providing exceptional service to web hosting small to medium size business customers by understanding their goals and objectives and creating a plan to accomplish those objectives • Troubleshooting technical issues related to web applications and server configurations • Analyzing accounts for resource usage, identify resource issues within an account • Performing migrations of websites and user content from a wide range of web hosts • Configuring and installing software using WHM… Show more • Providing exceptional service to web hosting small to medium size business customers by understanding their goals and objectives and creating a plan to accomplish those objectives • Troubleshooting technical issues related to web applications and server configurations • Analyzing accounts for resource usage, identify resource issues within an account • Performing migrations of websites and user content from a wide range of web hosts • Configuring and installing software using WHM and the Linux command line, bash, and cPanel API • Maintaining and strengthening the customer relationship by thrilling the customer in every interaction • Serving as an escalation point and mentoring resource for other team members

    • United States
    • Computer and Network Security
    • Technical Consultant
      • Dec 2019 - Present

      Consulting toward better online security, presence and abilities using effective and simple solutions. Services range from website and online presence management to cybersecurity best practices. We also provide computer, smartphone and other technology support solutions. Consulting toward better online security, presence and abilities using effective and simple solutions. Services range from website and online presence management to cybersecurity best practices. We also provide computer, smartphone and other technology support solutions.

    • Business Consultant
      • Nov 2019 - Mar 2020

      Providing consulting to small and medium sized business in regards to funding and operational best practices. I achieve this by evaluating current needs and demands of our clients and providing the resources they require to grow and expand their business. I have access to the lenders and solutions that best suit their goals. If you are looking to grow, I have the tools to help you do it efficiently and safely. Providing consulting to small and medium sized business in regards to funding and operational best practices. I achieve this by evaluating current needs and demands of our clients and providing the resources they require to grow and expand their business. I have access to the lenders and solutions that best suit their goals. If you are looking to grow, I have the tools to help you do it efficiently and safely.

    • United States
    • IT Services and IT Consulting
    • Strategic Partnerships
      • Apr 2018 - Sep 2018

      Providing solutions and problems known and unknown to address the current climate of exponentially vulnerable systems in the world that are only multiplying by the nanosecond and asking for more and more access and resources. Something must be done. The people need the tools to wield the web wisely. Most massive and widespread, high-level compromises go unnoticed for at least 4 months on average. 20% of compromise comes from phishing and other email related attacks on large… Show more Providing solutions and problems known and unknown to address the current climate of exponentially vulnerable systems in the world that are only multiplying by the nanosecond and asking for more and more access and resources. Something must be done. The people need the tools to wield the web wisely. Most massive and widespread, high-level compromises go unnoticed for at least 4 months on average. 20% of compromise comes from phishing and other email related attacks on large organizations. The source of most malicious traffic comes from botnets, end-users devices. End-users with little concern let alone knowledge or tools. How do you combat a constant threat with apathy? You simply cannot. Hundreds of millions to billions of people's information leaked and security violated... ...that we are aware of so far. How do you know you are not already compromised? #areyouhacked #apathyisyourenemy #empathyisyourally Show less Providing solutions and problems known and unknown to address the current climate of exponentially vulnerable systems in the world that are only multiplying by the nanosecond and asking for more and more access and resources. Something must be done. The people need the tools to wield the web wisely. Most massive and widespread, high-level compromises go unnoticed for at least 4 months on average. 20% of compromise comes from phishing and other email related attacks on large… Show more Providing solutions and problems known and unknown to address the current climate of exponentially vulnerable systems in the world that are only multiplying by the nanosecond and asking for more and more access and resources. Something must be done. The people need the tools to wield the web wisely. Most massive and widespread, high-level compromises go unnoticed for at least 4 months on average. 20% of compromise comes from phishing and other email related attacks on large organizations. The source of most malicious traffic comes from botnets, end-users devices. End-users with little concern let alone knowledge or tools. How do you combat a constant threat with apathy? You simply cannot. Hundreds of millions to billions of people's information leaked and security violated... ...that we are aware of so far. How do you know you are not already compromised? #areyouhacked #apathyisyourenemy #empathyisyourally Show less

    • United States
    • Technology, Information and Internet
    • 700 & Above Employee
    • Server Support Specialist
      • Feb 2017 - Feb 2018

      Provide white glove, on demand support, for two seperate customer bases, premier account management and fully managed server support. Fluidly supporting complex to simple incidents and issues, speaking to all products supported by GoDaddy. This required handling advanced technical support to CentOS/cPanel server deployments of customers live/production environments. I also was responsible for understanding the safest and most effective resolution to any issue for our customers with… Show more Provide white glove, on demand support, for two seperate customer bases, premier account management and fully managed server support. Fluidly supporting complex to simple incidents and issues, speaking to all products supported by GoDaddy. This required handling advanced technical support to CentOS/cPanel server deployments of customers live/production environments. I also was responsible for understanding the safest and most effective resolution to any issue for our customers with mission critical needs.

    • Web Expert and Hosting Consultant
      • Jan 2017 - Feb 2018

      Providing on demand solutions to clients building, maintaining or otherwise securing their web presence. Looking to future pitfalls and challenges, is something rarely considered in a current pitfall or challenge and it is always best to solve problems in the now, whith the future in mind. Using a cannon to kill mosquito could seem silly now, but if the cannonball travels far enough to knock out the tiger sneaking up on you, it may simply be "killing two birds with one stone."

    • Consultant
      • Feb 2015 - Sep 2017

      Managing and researching emerging technologies related to the company's forward movement in the marketing industry. Maintaining and establishing the systems and information infrastructure end to end. Managing and researching emerging technologies related to the company's forward movement in the marketing industry. Maintaining and establishing the systems and information infrastructure end to end.

    • United States
    • Technology, Information and Internet
    • 700 & Above Employee
    • Hosting Padawan
      • Dec 2015 - Jan 2016

      Consistently providing the best possible customer experience one can muster for the sake of people's businesses and ventures, while resolving web host, email, and security issues. One moment a web server needs a certain intricate command, and the next it's a business looking for ways to expand their brand, and here they land, on the doorstep of internetland. Consistently providing the best possible customer experience one can muster for the sake of people's businesses and ventures, while resolving web host, email, and security issues. One moment a web server needs a certain intricate command, and the next it's a business looking for ways to expand their brand, and here they land, on the doorstep of internetland.

  • Private Clients
    • North America
    • Linux Consultant
      • Sep 2011 - Oct 2014

      Maintain the overall security of the assets of clients' local and global resources, at all phases, from physcial to digital through any and all means available, managing security plans and routes, as well as the research and deployment of technologies designed to protect sensitive areas, interests and information. Maintain the overall security of the assets of clients' local and global resources, at all phases, from physcial to digital through any and all means available, managing security plans and routes, as well as the research and deployment of technologies designed to protect sensitive areas, interests and information.

    • Account Manager and Team Leader
      • Feb 2011 - Nov 2011

Education

  • GoDaddy Learning
    Linux Systems Administration, Computer and Information Sciences and Support Services
    2016 - 2018
  • GoDaddy Learning
    Web Security
    2015 - 2017
  • SoloLearn
    Python Fundamentals, Python programming Language
    2017 - 2018
  • ITT Technical Institute-Indianapolis
    System Administration and Virtualization Technologies
    2008 - 2012
  • GoDaddy Learning
    HST250, Hosting and Web Related Technologies
    2015 - 2015

Community

You need to have a working account to view this content. Click here to join now