Summary
Overview
Work history
Education
Skills
Certification
Languages
Timeline
Generic
Kudzayi Matsika

Kudzayi Matsika

Cape Town,South Africa

Summary

Highly skilled IT Support Engineer with a proven track record of providing exceptional solutions across diverse client environments. Proficient in troubleshooting, implementing upgrades, and optimizing IT operations to enhance productivity. Adept at delivering outstanding customer service and ensuring seamless IT infrastructure performance. Seeking an opportunity to leverage extensive skill set and technical expertise in a dynamic and innovative organization to drive excellence and achieve business objectives.

Overview

6
6
years of professional experience
1
1
Certification

Work history

Tier 2 Technical Engineer

Zhero | Cybersecurity & IT Support
Cape Town, Western Cape
10.2024 - 01.2025
  • Resolved complex IT issues by providing effective Tier 2 support.
  • Enhanced system functionality for improved user experience via thorough technical assistance.
  • Streamlined troubleshooting processes to improve efficiency in problem resolution.
  • Documented troubleshooting steps, promoting knowledge sharing amongst colleagues.
  • Installed and configured software applications as part of collaborative project teams.
  • Assisted junior engineers in complex tasks, fostering a learning environment within the team.

Freelancer IT Consultant

Self Employed
Cape Town, South Africa
01.2024 - Current
  • Carried out day-to-day duties accurately and efficiently.
  • Successfully delivered on tasks within tight deadlines.
  • Demonstrated respect, friendliness and willingness to help wherever needed.
  • Worked flexible hours, covering nights, weekends and bank holidays.
  • Completed duties to deliver on targets with accuracy and efficiency.

2nd Line Engineer

Ultima
Cape Town
10.2023 - 01.2024

Active Directory:

  • Efficiently managed user and computer accounts through Active Directory, ensuring seamless authentication and access control across our network.
  • Deployed and managed Group Policy via Active Directory to enforce consistent configurations and security policies, enhancing network security and compliance.
  • Created and managed distribution and security groups in Active Directory for Microsoft Exchange, improving email communication and security.

CrowdStrike:

  • Deployed advanced endpoint protection to prevent breaches.
  • Conducted root cause analysis to identify and mitigate threats.
  • Managed incident response to swiftly address security breaches.
  • Configured and maintained Falcon platform for optimal performance.
  • Monitored and analyzed security events for potential threats.

Endpoint Manager/Intune :

  • Seamlessly deployed and manage Group Policy to enforce consistent configurations and security policies across our network.
  • Effortlessly onboarded new devices, applying standardized configurations for enhanced efficiency and productivity.
  • Expertly managed devices and applications through centralized Endpoint Manager console, simplifying IT administration.

Office 365 (O365) :

  • Managed licenses and subscriptions for O365 users, optimizing cost and ensuring proper access levels.
  • Efficiently handled user management tasks, including creation, modification, and deprovisioning of accounts.

Microsoft Exchange :

  • Effortlessly create and manage distribution groups and security groups, streamlining email communication within our organization.
  • Implemented blacklists and whitelists, proactively mitigating spam and phishing attacks to protect users.
  • Conducted meticulous mail trace and message tracking, enabling quick resolution of email delivery issues and incidents.

Technical Support Engineer

Mukuru Shared Services
Cape Town
08.2018 - 05.2023

Azure AD :

  • Mastered the art of securing user accounts with Multi-Factor Authentication (MFA), fortifying defences against unauthorized access.
  • Implemented Single Sign-On (SSO) solutions for streamlined access to various applications, enhancing user productivity.
  • Managed user identities and permissions within Azure Active Directory
  • Leveraged Privileged Identity Management (PIM) to elevate security by carefully controlling elevated access privileges.

Endpoint Manager/Intune:

  • Enrolled and managed devices for consistent policy enforcement.
  • Deployed and managed applications across various platforms.
  • Created and deployed configuration profiles for standardized settings.
  • Developed and enforced compliance policies for security.
  • Integrated Conditional Access policies for secure access.
  • Executed remote actions like wipe, lock, and restart for security.

Jamf :

  • Seamlessly enrolled macOS and iOS devices into Jamf management platform, streamlining device control and security.
  • Deployed software and configurations seamlessly through Jamf console, simplifying app distribution and updates.
  • Handled device offboarding, removing devices efficiently from Jamf management system.

Google Workspace Admin:

  • Created, managed, and deleted user accounts to ensure proper access levels and permissions.
  • Provided technical support and training to end users to help them effectively use Google Workspace tools.
  • Configured and maintained Google Workspace settings for optimal performance.

Mimecast:

  • Integrated email systems for enhanced protection and continuity.
  • Enforced compliance with advanced email filtering and encryption.
  • Deployed email security configurations and policies.
  • Managed user offboarding by deactivating accounts and archiving communications.

Networking :

  • Configured and managed network devices like routers, switches, and firewalls ensuring seamless data flow and robust security.
  • Implemented advanced VLAN techniques to segment networks, optimizing performance, and bolstering data integrity.
  • Deployed cutting-edge wireless access points to provide reliable and secure wireless connectivity to all users.
  • Employed dynamic firewall rule configurations to precisely control network traffic and safeguard against cyber threats.

Defender for Endpoint :

  • Conducted comprehensive malware scans and threat assessments to swiftly identify and neutralize security risks.
  • Isolated affected devices, effectively containing threats and preventing further data breaches.
  • Monitored device compliance to enforce robust security policies, minimizing vulnerabilities within our network.
  • Created proactive remediation plans to address security vulnerabilities and strengthen overall defences.

Education

Inyathi High School
Bulawayo

Skills

  • Zendesk ,Servicedesk ,Jira & ServiceNow Ticketing Systems
  • Connectwise
  • Networking
  • N-AbleMe
  • Windows Server
  • Jamf MDM
  • Microsoft Exchange Admin
  • Mimecast Admin
  • OKTA
  • Crowdstrike
  • Azure Active Directory
  • Active Directory
  • Defender For Endpoint
  • Endpoint Manager
  • Office 365 Admin
  • Google Workspace
  • IVMS CCTV Configuration
  • Access Control Configuration
  • Computer Hardware & Software
  • PABX System Config

Certification

  • Microsoft Certified: Security, Compliance, and Identity Fundamentals (2023-01)
  • Microsoft Certified: Azure Fundamentals (2022-04)
  • Microsoft Certified: Azure Administrator Associate (2020-10)
  • Microsoft Certified: Security Operations Analyst Associate (2023-02)
  • Microsoft Certified: DevOps Engineer Expert (2021-06)
  • Comptia N+ (2019-10)
  • Comptia A+ (2019-10)
  • Certified in CyberSecurity (2024-09)
  • Xcally certified Associate
  • GSuite Administrator Fundamentals

Languages

English
Native

Timeline

Tier 2 Technical Engineer

Zhero | Cybersecurity & IT Support
10.2024 - 01.2025

Freelancer IT Consultant

Self Employed
01.2024 - Current

2nd Line Engineer

Ultima
10.2023 - 01.2024

Technical Support Engineer

Mukuru Shared Services
08.2018 - 05.2023

Inyathi High School
Kudzayi Matsika