Benson Thuo, Developer in Nairobi, Nairobi County, Kenya
Benson is available for hire
Hire Benson

Benson Thuo

Verified Expert  in Engineering

Support Specialist Developer

Location
Nairobi, Nairobi County, Kenya
Toptal Member Since
January 12, 2023

Benson is a highly skilled security and network developer with a solid IT background and a proven history of excellence in implementations, post-go-live support, cybersecurity, and network and system administration. He has expertise in renowned companies across diverse sectors, including agriculture, telecommunications, carbon credit, and event management. Currently overseeing the IT security of more than fifty companies, Benson's adaptability and proficiency make him a standout professional.

Portfolio

Carbon Credit Company
IT Support, Google Cloud, IT Security, Security...
Kenya Tea Development Agency Limted
SAP, SAP Security, Authorization, ABAP, SAP BI Security, SAP HR Security...
Kenya Tea Development Agency Limited
Cisco, Networks, Windows, Back-end Admin Systems, Linux, Microsoft, VMware...

Experience

Availability

Part-time

Preferred Environment

Google AppSheet, Google Workspace, MDM, MacOS, SAP Security, SAP, System Administration, Windows, Infrastructure, Scrum

The most amazing...

...achievement was implementing a program ensuring the segregation of duties and compliance with GDPR and SOX, mitigating fraud risks, and enhancing data privacy.

Work Experience

IT Support | Security Specialist (via Toptal)

2023 - PRESENT
Carbon Credit Company
  • Revamped onboarding workflows, ensuring seamless, efficient, and secure processes. Enforced rigorous security protocols and compliance standards, minimizing risks and enhancing integrity.
  • Developed insightful reports for mobile device management, enhancing efficiency in overseeing diverse devices across countries and time zones. Provided real-time visibility on device setup progress for international users.
  • Crafted a visionary ICT policy to navigate dynamic tech trends, synchronizing IT endeavors with organizational objectives.
  • Deployed comprehensive IT security measures, resulting in a 30% reduction in cybersecurity incidents within the initial 6-month period.
  • Led MDM deployment and oversaw the implementation of security measures, encompassing VPN and antivirus solutions, achieving full adherence to company protocols.
  • Coordinated onboarding procedures and optimized device administration, resulting in a 20% reduction in onboarding duration.
  • Delivered proficient remote support for workstations, consistently meeting SLA targets with a 90% issue resolution rate.
  • Oversaw help desk operations, attaining a commendable 95% customer satisfaction rating.
  • Troubleshooted technical issues, ensuring minimal downtime and optimal productivity.
  • Provided strategic guidance on optimal methodologies and technologies, resulting in a notable 15% enhancement in IT operational efficiency.
Technologies: IT Support, Google Cloud, IT Security, Security, Site Reliability Engineering (SRE), HR Tools, MacBook, Office 365, Azure Active Directory B2C (ADB2C), Google Workspace, Business Services, Email, Gmail, Azure Active Directory, IT Automation, DNS Configuration, Technical Consulting, Technical Leadership, Requirements Analysis, Windows 10, APIs, System Administration, English, Microsoft Teams, Google AppSheet, Google+, Google, Workflow, Mail Servers, Apple Mail

SAP Security Administrator

2017 - PRESENT
Kenya Tea Development Agency Limted
  • Led a cross-functional team of five, including system administrators and QA professionals, executing a substantial SAP implementation for a sales and marketing firm. Achieved process optimization and heightened operational efficiency.
  • Coached and evaluated three developers while efficiently managing SAP end user account configuration, administration, and maintenance. Ensured seamless permissions and access rights.
  • Led the implementation of segregation of duties compliance in the SAP controlling module, enforcing controlled restrictions across areas, orders, cost centers, and groups, effectively mitigating fraud risks.
  • Administered user authorization and account management for 60+ companies, mitigating fraud risks and ensuring adherence to data privacy protocols.
  • Led seamless system migration, adhering to timelines. Meticulously documented changes, securing approvals for timely implementation, showcasing strong project management skills.
  • Collaborated with IT teams to streamline incident response processes, reducing resolution time by 20%.
  • Led security control optimization, boosting system performance by 15%.
  • Deployed comprehensive security protocols to bolster data protection, integrating advanced monitoring, detection, and prevention strategies for heightened cybersecurity resilience.
  • Conducted in-depth vulnerability assessments, resulting in a 25% decrease in system vulnerabilities.
  • Led SAP security enhancement project, achieving a 30% reduction in unauthorized access incidents in six months.
Technologies: SAP, SAP Security, Authorization, ABAP, SAP BI Security, SAP HR Security, Authentication, User Authentication, Scrum, Agile, Windows, Linux, SQL, SAP HANA, IT Audits, Policy, C#, IT Support, IT Security, Security, MacBook, Google, Anti-spam Protection, Antivirus Software, IoT Security, Troubleshooting, Procure to Pay, Monitoring, System Administration, Cybersecurity, Network Security, Network Protocols, Penetration Testing, Google+, HR Tools, Site Reliability Engineering (SRE), System Service & Hardware Control, SAP ERP, Linux Servers, IT Infrastructure, IT, IT Networking, Infrastructure, Technical Writing, Networking, Technical Documentation, Documentation, MacOS, FortiGate, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, VLANs, Fortinet Firewall Configuration, Hotspot, PCI, Servers, Design, SAP Warehouse Management System (WMS), SAP S/4HANA, Enterprise Resource Planning (ERP), Change Management, Microsoft Office, Microsoft Excel, Active Directory Federation, Windows Server 2016, Excel Expert, Leadership, VPN, Audits, SAP Integration, SAP Implementation, SAP HCM, SAP Plant Maintenance (PM), Information Security, IT Administration, Database Security, Microsoft 365, Windows 11, Windows PowerShell, SAP Testing, Testing, ITIL, Spreadsheets, Reports, Network Management Stations (NMS), Windows System Administration, Solution Architecture, IT Automation, DNS Configuration, Technical Consulting, Technical Leadership, Requirements Analysis, Windows 10, APIs, English, Microsoft Teams, SAP S/4HANA Cloud

System and Network Administrator

2016 - PRESENT
Kenya Tea Development Agency Limited
  • Crafted network specifications by carefully examining user requirements, workflow, access, and security prerequisites, ensuring optimal performance and functionality.
  • Designed, configured, and analyzed requirements for deploying various applications, managing over 60 servers at the head office.
  • Assessed the current architecture, identified business security issues and vulnerabilities, and implemented effective remedial measures.
  • Achieved consistent network performance by diligently monitoring and analyzing usage trends and optimizing performance.
  • Addressed and resolved network issues across seven regional offices, all 68 factories, and KTDA subsidiaries, escalating to ICT services when required.
  • Achieved successful guidance on networking standards and specifications to address diverse networking requirements while effectively evaluating and deploying cutting-edge technologies to enhance performance.
  • Managed and executed networking projects within the organization, ensuring strict adherence to established standards and procedures.
  • Identified potential network infrastructure system threats, diligently monitored and analyzed the intrusion detection system (IDS), and effectively implemented mitigation measures.
  • Achieved the preservation of network, system, and application integrity and security through the technical enforcement of organizational security policies.
  • Collaborated with key stakeholders, including ICT-Services, ICT Business Systems, RICTCs, FSAs, and a security administrator, to guarantee network availability and seamless server system resource management.
Technologies: Cisco, Networks, Windows, Back-end Admin Systems, Linux, Microsoft, VMware, SANs, Business Continuity Planning (BCP), Disaster Recovery Plans (DRP), Cisco Switches, Cisco Routers, LAN, WAN, Multiprotocol Label Switching (MPLS), Access Control, DNS, Domain DNS Setup, Windows Server, Linux Servers, C#, SAP, SAP HANA, IT Support, IT Security, Security, MacBook, Google, Anti-spam Protection, Antivirus Software, IoT Security, Troubleshooting, Procure to Pay, Monitoring, System Administration, Cybersecurity, Network Security, Network Protocols, Penetration Testing, IT Audits, Google+, L3 Network Protocol, SQL, HR Tools, Site Reliability Engineering (SRE), System Service & Hardware Control, SAP ERP, IT Infrastructure, IT, IT Networking, IP PBX, PBX, Infrastructure, Amazon Web Services (AWS), Technical Writing, Networking, Technical Documentation, Documentation, MacOS, FortiGate, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, VLANs, Fortinet Firewall Configuration, Hotspot, PCI, Servers, Design, SAP Warehouse Management System (WMS), Microsoft Office, Microsoft Excel, Active Directory Federation, Windows Server 2016, Excel Expert, VPN, Audits, Information Security, IT Administration, Database Security, Microsoft 365, Windows 11, Windows PowerShell, Testing, ITIL, Spreadsheets, Reports, Network Management Stations (NMS), Windows System Administration, Solution Architecture, Microsoft Exchange, Email, IT Automation, DNS Configuration, Technical Consulting, Technical Leadership, Requirements Analysis, Windows 10, English, Mail Servers, DNS Servers, Microsoft Outlook, Outlook, Network Administration

Chief Technology Officer

2015 - PRESENT
Sunflower Events
  • Led a 4-person technical team in developing and implementing a comprehensive IT infrastructure solution, encompassing software, IT networks, and IT security domains.
  • Implemented an accounting application, eliminating manual processes and paperwork, significantly enhancing process efficiency. Streamlined payroll operations and facilitated the generation of essential reports.
  • Implemented remote work software that enabled 10+ users to work from home during the COVID-19 period. The same application helped me to support remote users and ensured business process continuity.
Technologies: Networks, System Administration, Troubleshooting, IT Support, Access Control, IT Audits, IoT Security, Cisco, MacBook, Windows, Microsoft, Antivirus Software, Monitoring, Anti-spam Protection, Firewalls, Google, Procure to Pay, Cybersecurity, Network Security, Network Protocols, Google+, L3 Network Protocol, HR Tools, Site Reliability Engineering (SRE), System Service & Hardware Control, Linux Servers, Windows Server, IT Infrastructure, IT, IT Networking, IP PBX, PBX, Infrastructure, Networking, Documentation, MacOS, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, Hotspot, PCI, Servers, Design, Microsoft Office, Microsoft Excel, Excel Expert, CTO, Leadership, VPN, Information Security, IT Administration, GoDaddy, Database Security, Microsoft 365, Windows 11, Google Cloud Platform (GCP), IT Management, Spreadsheets, Reports, Solution Architecture, Microsoft Exchange, Windows System Administration, Google Workspace, Business Services, Email, Gmail, IT Automation, DNS Configuration, Technical Consulting, Technical Leadership, Requirements Analysis, Windows 10, English, Mail Servers, SMTP, DNS Servers, IMAP, Microsoft Outlook, Outlook, Network Administration, Apple, Apple Mail

Systems Developer

2023 - 2024
Real Estate Company (via Toptal)
  • Integrated email systems across diverse applications and platforms, enhancing data flow and accelerating decision-making processes, fostering agility in 3rd-party relationship management.
  • Implemented a robust video hosting platform prioritizing data privacy. Implemented measures to safeguard video integrity, thwarting tampering and ensuring content authenticity and purity.
  • Developed an advanced email tracking system, providing real-time analytics for enhanced decision-making and communication strategy optimization via seamless integration.
Technologies: Email, HubSpot CRM, HubSpot, Google Workspace, Business Services, Gmail, IT Automation, DNS Configuration, Technical Consulting, Technical Leadership, Requirements Analysis, WordPress, Windows 10, APIs, System Administration, Google, English

IT Solutions Architect

2015 - 2016
Safaricom
  • Designed information systems that deliver strategically using business acumen and understanding organization strategy. Showed strong knowledge of enterprise architecture methodologies such as TOGAF or the equivalent.
  • Assessed a broad range of information solutions and products, particularly document management, collaboration, and content management.
  • Explained technical concepts to lay audiences and worked with board-level stakeholders.
Technologies: Cisco, WAN, LAN, Multiprotocol Label Switching (MPLS), Customer Support, Cisco Wireless, Cisco Routers, FibreChannel, Solution Design, Presales, Network Operation Centers (NOC), IT Support, Google Cloud, IT Security, Security, MacBook, Google, Anti-spam Protection, Antivirus Software, Troubleshooting, Cybersecurity, Network Protocols, L3 Network Protocol, System Service & Hardware Control, Linux Servers, Windows Server, IT Infrastructure, IT, IT Networking, IP PBX, PBX, Infrastructure, Technical Writing, Networking, Technical Documentation, Documentation, MacOS, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, VLANs, Servers, Architecture, Design, Microsoft Office, Microsoft Excel, Excel Expert, VPN, Information Security, IT Administration, ITIL, Spreadsheets, Reports, Solution Architecture, Microsoft Exchange, Windows System Administration, IT Automation, DNS Configuration, Technical Consulting, Requirements Analysis, Windows 10, English, Business to Business (B2B)

ICT Officer

2011 - 2012
Nexus Networx
  • Offered technical support on-site, via phone, or by email.
  • Configured computer networks and structured cabling.
  • Installed hardware and software systems and maintained or repaired equipment.
  • Provided technical support services and closed-circuit television installation.
Technologies: Projects, CCNA, CompTIA Network+ Certification, Networks, IT Infrastructure, IT Support, Google Cloud, IT Security, Security, MacBook, Google, Anti-spam Protection, Antivirus Software, Troubleshooting, Monitoring, System Administration, Cybersecurity, Network Protocols, System Service & Hardware Control, Windows Server, IT, IT Networking, IP PBX, PBX, Infrastructure, Networking, Documentation, MacOS, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, Hotspot, Servers, Design, Microsoft Office, Microsoft Excel, Excel Expert, VPN, Information Security, IT Administration, Spreadsheets, Reports, Microsoft Exchange, Windows System Administration, DNS Configuration, Requirements Analysis, English

Project Imarisha for Kenya Tea Development Agency Limited

https://news.sap.com/africa/2022/09/kenya-tea-development-agency-brews-perfect-technology-mix/
Successfully implemented the SAP Enterprise Resource Planner (ERP) crossover fifty companies. Through meticulous users, roles, and authorizations creation across diverse modules such as finance, controlling, sales and distribution, and quality assurance, we achieved a remarkable cost reduction of $65 million annually.

Efficient SAP ERP implementation: seamless SAP ERP deployment. Ensuring the implementation process was smooth and aligned with each company's unique requirements.

Thorough users, roles, and authorizations management: data security and access controls meticulously defined user roles and authorizations for various personnel within each organization by tailoring the configurations to match specific roles and responsibilities and enhanced system integrity, reducing the risk of unauthorized access and data breaches.

Cross-module expertise: Our comprehensive expertise spanned multiple modules, including finance, controlling, sales and distribution, and quality assurance. This proficiency allowed us to address the diverse needs of each company and ensure the ERP's seamless integration with existing systems and processes.

Streamlining Onboarding Excellence

Designing and implementing a cutting-edge workflow for automating the onboarding and systems access assignment process. Through transforming what was once a time-consuming and error-prone task into a seamless, efficient, and secure process.

The workflow also ensured strict adherence to security protocols and compliance standards, mitigating potential risks and bolstering data integrity. By automating this critical process, you have freed up valuable time for HR and IT teams to focus on strategic initiatives, driving innovation and growth throughout the organization.

Accounting and Payroll Automation Using Quickbooks

I automated accounting tasks such as bookkeeping, invoicing, time tracking, expense tracking, and inventory tracking with increased accuracy. This allowed businesses to easily track employee hours, set up payment schedules, and pay employees.

Empowering Informed Decisions with Comprehensive Reports

Designed and implemented comprehensive reports that have revolutionized how critical information is gathered and utilized within the organization. The approach to generating reports on Rippling mobile device management agent installation status, device condition, device health, and computer inventory for efficient operations. By meticulously collecting and presenting this data in a user-friendly and visually appealing manner, teams can make informed decisions with unparalleled efficiency and precision.

The reports provide real-time visibility into the status of Rippling agent installations, enabling the IT department to monitor and manage device onboarding seamlessly. This enhanced oversight has resulted in reduced set up times, ensuring that new employees can access the resources they need from the moment they join the team. The reports capture device condition, and health has proactively identified and addressed potential hardware and software issues. Maintenance teams can now optimize their workflows, minimizing downtime and maximizing productivity across the organization. The computer inventory reports have streamlined asset tracking and resource allocation.

Languages

ABAP, PHP, Java, HTML, SQL, C#

Tools

SAP Security, VPN, SAP Quality Assurance (QA), SAP Portal, SAP Controlling (CO), SAP S/4HANA, Microsoft Excel, Spreadsheets, Microsoft Exchange, Microsoft Teams, Microsoft Outlook, SAP Solution Management, VMware, SAP Workflow, SAP Plant Maintenance (PM), Slack, Zoom, Notion, Azure Active Directory B2C (ADB2C), Apple Mail

Paradigms

Scrum, Agile, Penetration Testing, Change Management, Testing, ITIL, Requirements Analysis, Database Design, Agile Software Development

Platforms

Windows, SAP HANA, Linux, Microsoft, Windows Server, MacOS, Windows Server 2016, Google Cloud Platform (GCP), Azure, WordPress, Amazon Web Services (AWS), HubSpot, Google AppSheet, Apple

Storage

FibreChannel, Database Security, Google Cloud, Database Modeling, Azure Active Directory, Databases, SAP S/4HANA Cloud

Industry Expertise

Cybersecurity, Network Security

Other

SAP, SAP HR Security, SAP BI Security, Networks, IP Networks, WiFi, Cisco, Cisco Switches, Firewalls, Authorization, Data Privacy, Networking, Policy, SAP Enterprise Portal, Microsoft Office, Web Development, Algorithms, Data Structures, Scrum Master, Scrum Product Owner, Authentication, User Authentication, IT Audits, Back-end Admin Systems, SANs, Business Continuity Planning (BCP), Disaster Recovery Plans (DRP), Cisco Routers, LAN, WAN, Access Control, DNS, Linux Servers, SAP ERP, Customer Support, Solution Design, Presales, Projects, CCNA, CompTIA Network+ Certification, IT Infrastructure, SAP Implementation, SAP Integration, User Roles, IT Support, IT Security, Security, MacBook, System Administration, Monitoring, Procure to Pay, IoT Security, Antivirus Software, Anti-spam Protection, Google, Network Protocols, Google+, L3 Network Protocol, HR Tools, Site Reliability Engineering (SRE), System Service & Hardware Control, IT, IT Networking, Infrastructure, Technical Writing, Technical Documentation, Documentation, FortiGate, DHCP, Universal Router, Dynamic Host Configuration Protocol (DHCP), Wireless Systems, Fortinet Firewall Configuration, Hotspot, PCI, Servers, Architecture, Design, Enterprise Resource Planning (ERP), Active Directory Federation, Excel Expert, CTO, Leadership, Information Security, IT Administration, GoDaddy, Microsoft 365, Windows 11, SAP Testing, IT Management, Reports, Office 365, IT Automation, Solution Architecture, Windows System Administration, Gmail, Email, Google Workspace, Business Services, DNS Configuration, Technical Consulting, Technical Leadership, Windows 10, English, Mail Servers, SMTP, DNS Servers, IMAP, Outlook, Network Administration, DMZ Networks, Network Operation Centers (NOC), Audits, SAP HCM, IP PBX, PBX, VLANs, SAP Warehouse Management System (WMS), Network Management Stations (NMS), APIs, Business to Business (B2B), Data Encryption, eCommerce, IT Project Management, Multiprotocol Label Switching (MPLS), Domain DNS Setup, Cisco Wireless, User Flows, Troubleshooting, Intuit QuickBooks, QuickBooks Point of Sale, QuickBooks Online, QuickBooks Advance Reporting, Excel 365, Mobile Device Management (MDM), iOS Mobile Device Management (MDM), Workflow, HubSpot CRM, MDM

Frameworks

Windows PowerShell

2012 - 2015

Bachelor's Degree in Information Technology

Jomo Kenyatta University of Agriculture and Technology - Nairobi, Kenya

SEPTEMBER 2022 - PRESENT

Privacy and Data Protection for Champions

The Computer Society of Kenya

FEBRUARY 2022 - PRESENT

Scrum Fundamentals Certified

Scrum.org

NOVEMBER 2019 - PRESENT

SAP ADM950: Secure System Management

SAP

NOVEMBER 2019 - PRESENT

SAP ADM940: AS ABAP Authorization Concept

SAP

NOVEMBER 2019 - PRESENT

SAP ADM: 900 System Security Fundamentals

SAP

NOVEMBER 2019 - PRESENT

Salesforce Certified Administrator in Enterprise Linux

SUSE

SEPTEMBER 2010 - PRESENT

CompTia Network + Support Skills

CompTIA

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring