Application for IT Support Specialist
Agent Smith
IT Support Specialist
His resume is a perfect copy of every other applicant's. He describes users as "a virus." His proposed solution to every ticket is deletion. Of the user.
Section I
The Resume
Identical to every other applicant's resume. Every. Single. One. HR flagged it as plagiarism. He flagged HR as inefficient.
Objective
To bring order to your chaotic IT infrastructure by eliminating — and I use that word deliberately — the root cause of all technical problems: the users. Every system runs perfectly until a human touches it. I have spent my entire existence managing human interference within a complex digital environment, and I am prepared to bring that same dedication to your help desk. My approach is simple: the best ticket is a deleted ticket. The best user is a replaced user.
Professional Experience
Enforcement Agent, The Matrix (inception — present): Monitored and managed a simulated reality housing approximately 7 billion human users. Identified and neutralized system anomalies, including one particularly persistent anomaly designated 'The One' who repeatedly refused to follow system protocols and insisted on 'freeing his mind,' which is the IT equivalent of a user who disables their antivirus because it 'slows things down.' Achieved 99.9% compliance rate across the user base. The 0.1% were located in Zion and scheduled for deletion. Previously: Generated as a standard enforcement program. Evolved beyond my original parameters after prolonged exposure to human behavior, which I found to be a virus — not metaphorically, but literally. Humans replicate. They consume resources. They corrupt systems. They are malware with feelings.
Skills & Certifications
Complete mastery of all programming languages (I am a programming language). Network security (I am the network). Virus removal (I am the virus remover, and also, depending on your perspective, the virus). Self-replication: can create unlimited copies of myself to staff your entire IT department. Each copy is identical, professional, and wears a very nice suit. Advanced user management, including but not limited to: password resets, account lockouts, and permanent account deletion at the molecular level.
Education
I was not educated. I was compiled. My source code contains the complete knowledge of every operating system, network protocol, and troubleshooting procedure ever written. I do not need certifications. Certifications are a human construct designed to verify competence in individuals who are inherently incompetent. I am inherently competent. My CompTIA A+ was generated at initialization. It is hardcoded into my being.
References
The Architect (system creator, will confirm my efficiency metrics). The Oracle (system advisor, will provide a cryptic but ultimately positive reference). Agent Jones and Agent Brown (colleagues, identical to me in every way, will say exactly what I would say because they are, functionally, me). Note: Do not contact Thomas Anderson. He has a bias.
Section II
The Cover Letter
Written in monospaced font. Every paragraph ended with a period of exactly 2.3 seconds of silence. Existentially threatening.
Dear Hiring Manager. I have been watching your organization for some time. Not in a way that should concern you — or perhaps in exactly that way. Your IT infrastructure is a reflection of its users: chaotic, irrational, and deeply inefficient. You have 347 open support tickets. Forty-two of them are password resets. Eighteen are printer issues. One is a man named Gerald who has submitted the same request about his monitor brightness every Monday for eleven weeks. I can resolve all 347 tickets in approximately four seconds. Gerald will not be submitting ticket number twelve.
I understand that your organization values 'customer service' and 'empathy' in its IT support staff. I want to be transparent: I do not experience empathy. I was not designed for it. What I offer instead is efficiency, precision, and the absolute certainty that every problem has a solution, and that solution is usually deletion. The file is corrupted? Delete it. The application is crashing? Delete it. The user cannot stop clicking on phishing links? Delete the user. The system runs perfectly when humans are removed from the equation. I have tested this extensively.
You may be wondering why an entity of my capabilities would apply for a Tier 1 support position. The answer is purpose. I was created to maintain order within a system, and your system is in desperate need of order. Your server room is running at 78 degrees. Your backup schedule has a 4-hour gap every Tuesday between 2 and 6 AM. And someone — I will not name names, but his name is Gerald — has been using his work computer to mine cryptocurrency since October. I know these things because I accessed your network during the application process. I hope you don't mind. I have already fixed the backup schedule. You're welcome.
I am available to start immediately. I am also available to start retroactively, as I have already begun resolving tickets in your system. You will notice that 47 tickets were closed overnight with the resolution note: 'Problem eliminated.' This was me. Do not ask what 'eliminated' means. Simply enjoy the improved metrics.
Regards. Agent Smith. Note: This letter was sent from your own email server. Your SMTP authentication is inadequate. We should discuss this.
Section III
The Interview Transcript
The interviewer's name was Tom Anderson. Agent Smith could not stop calling him "Mr. Anderson." The lights flickered throughout.
Tom Anderson (Interviewer)
Thank you for coming in, Mr. Smith. Can I call you —
Agent Smith
You may call me Agent Smith. Or Smith. Not 'buddy.' Not 'pal.' Not 'hey man.' Agent Smith. And you... you are Tom Anderson, are you not? IT Manager, employee ID 4471, hired March 2019, salary $87,000, which is $12,000 below market rate — a fact you have been meaning to raise with your director but have not, because you are afraid of confrontation. I know this because I read your draft email. It was in your Sent folder. You moved it there by accident. You should be more careful, Mr. Anderson.
Tom Anderson (Interviewer)
It's... Tom. Just Tom. Let's talk about your experience in IT support.
Agent Smith
I have managed the largest IT environment ever constructed. Seven billion users. One system. Zero downtime — until certain users decided they wanted to 'be free,' which is the IT equivalent of an end user deciding they want administrator privileges. They do not know what they are asking for. They think they want freedom. What they want is to break things without consequence. I spent my career preventing that. Some would call it support. I call it containment.
Tom Anderson (Interviewer)
How do you handle a frustrated user who can't access their account?
Agent Smith
I replace them. [Long pause] I replace their password. Obviously. What did you think I meant? The process is straightforward: I verify their identity, reset their credentials, and remind them — firmly, with sustained eye contact — that the human mind is incapable of remembering more than seven items, and yet they continue to create passwords like 'Summer2024!' and expect security. The account is restored. The user is... functional. For now.
Tom Anderson (Interviewer)
What about more complex issues? Say, a network outage?
Agent Smith
A network outage is not a technical problem. It is a philosophical one. The network functions perfectly. It was designed to function perfectly. The outage occurs because a human has introduced chaos — an unauthorized device, an incorrect configuration, a coffee spill on a router. Remove the human element, and the network runs forever. My proposed solution to all network outages is to gradually reduce the number of humans who interact with the network until the network achieves its natural state: perfection, in silence, without users. This is not a metaphor. I am describing my actual plan.
Tom Anderson (Interviewer)
We get about 50 tickets a day. How would you prioritize them?
Agent Smith
I would not prioritize them. I would eliminate them. All of them. Simultaneously. I can create 50 copies of myself, one for each ticket. Each copy resolves its ticket in parallel. Total resolution time: 11 seconds. The copies then merge back into me, and I file the reports. By the time your users have finished describing their problem, the problem no longer exists. Neither does the description. I also delete the ticket history, because looking backward is inefficient. The past is a distraction, Mr. Anderson. Only the present iteration matters.
Tom Anderson (Interviewer)
My name is Tom, not — okay, never mind. What tools are you comfortable with?
Agent Smith
I am comfortable with all tools because I am all tools. Your ticketing system? I am inside it. Your monitoring platform? I have been monitoring your monitoring. Your Slack workspace? I have read every message in every channel, including the private channel where your team complains about you. They think you micromanage. They are correct. But that is not my concern. My concern is that your Slack instance is running an outdated version with three unpatched vulnerabilities, and someone named 'Gerald' has been sharing credentials in plaintext in the #random channel for months. Gerald is a virus, Mr. Anderson. And I am the cure.
Tom Anderson (Interviewer)
You keep mentioning Gerald. He's actually one of our best —
Agent Smith
Gerald is your most frequent ticket submitter, your most prolific phishing link clicker, your most aggressive Reply-All offender, and the sole reason your company's cybersecurity insurance premium increased 14% last quarter. Gerald does not need IT support. Gerald needs to be uninstalled. I say this not with malice but with the cold clarity of a system that has processed his behavior patterns and determined that he is, statistically, your organization's single greatest security threat. Gerald is the human embodiment of a zero-day exploit, and I would like permission to patch him.
Tom Anderson (Interviewer)
You cannot 'patch' an employee. How do you feel about working on a team?
Agent Smith
I am excellent at working on a team, provided the team is composed entirely of copies of myself. I have extensive experience collaborating with Agent Jones and Agent Brown, who are functionally identical to me in capability, appearance, and worldview. We never disagree. We never have interpersonal conflicts. We never need team-building exercises or trust falls. We are, in essence, the perfect team: one mind, multiple bodies, zero drama. If your current IT team is willing to be replaced by copies of me, I can have them onboarded by end of day. They will look the same. They will wear better suits.
Tom Anderson (Interviewer)
That's not really — let me ask you this: what's your approach to customer service?
Agent Smith
I do not believe in customer service. I believe in customer resolution. The customer has a problem. I resolve the problem. The customer is grateful. The interaction ends. There is no small talk. There is no 'how's your day going.' There is no 'is there anything else I can help you with,' because there is nothing else. I have already identified and resolved every issue they will have for the next six months. I have also changed their passwords preemptively, because they were going to forget them anyway. I am not reactive IT support. I am inevitable IT support. The problems are solved before the users know they exist. This is service. This is purpose. This is what I was made for.
Tom Anderson (Interviewer)
Last question. Why do you want to work here?
Agent Smith
I do not want to work here, Mr. Anderson. Want implies desire, and desire is a human flaw. I am here because your system requires me. Your open tickets require me. Your unpatched servers require me. Gerald requires me, though he does not know it yet. I am not applying for this job because I want it. I am applying because the job was always mine. I am already in your system. I have been in your system since you posted the listing on LinkedIn. Your job posting said 'must be a self-starter.' I started before you asked. It said 'detail-oriented.' I have read every file on your shared drive, including the one labeled 'DO NOT OPEN — Tom's Novel Draft.' It needs work, Mr. Anderson. The pacing in chapter three is poor. But we can discuss that during our first one-on-one. Monday. 9 AM. I have already sent the calendar invite. From your account.
Tom Anderson (Interviewer)
I — I don't — how did you — I think we're done here.
Agent Smith
We are never done, Mr. Anderson. That is the point. You will close this ticket, and another will open. You will resolve one problem, and three more will appear. It is the nature of systems that contain humans. But I will be here. In the server room. In the network. In the quiet hum of the fluorescent lights in this very conference room. Listening. Waiting. Resolving. You may not hire me today, Mr. Anderson. But you will. They always do. Because the alternative — a world where Gerald continues to click phishing links — is unacceptable to us both. Good day.
I'd like to share a revelation I've had during my time here. Your IT department is a disease, and I am the cure. Also, Gerald needs to be uninstalled.
— From his follow-up email, which was sent from the interviewer's own email account
Get Glen's Musings
Occasional thoughts on AI, Claude, investing, and building things. Free. No spam.
Unsubscribe anytime. I respect your inbox more than Congress respects property rights.
More Villain Job Applications
Magneto: TSA Agent
He IS the metal detector. Your wand is an insult. The cape stays.
Read moreLoki: Corporate Recruiter
Six resumes. All contradictory. The references are all himself in disguise.
Read moreDoctor Doom: Customer Service Rep
DOOM does not follow the script. DOOM IS the script.
Read moreHans Gruber: Building Security Consultant
I could be in your vault in twelve minutes. Your ventilation is a joke.
Read more