Highly skilled professional with extensive expertise in technical support, project management, and client relationship management. Adept at managing high-stress environments while maintaining exceptional service desk performance.
Overview
7
7
years of professional experience
5
5
years of post-secondary education
Work History
Deputy Chief Security Officer
OZZY GROUP
Chernivtsi
02.2022 - 05.2024
Development and implementation of security strategies for all restaurants
Management of a team of security specialists
Monitoring and assessing security risks in restaurants
Creating and maintaining security policies and procedures
Training restaurant staff on security issues
Ensuring that restaurants are compliant with regulatory requirements
Interacting with restaurant managers to improve security
Responding to and investigating security incidents
Conducting security audits and preparing reports
Maintain physical security of restaurants, including video surveillance and access control
Assistant Chief Information Officer
OZZY GROUP
Chernivtsi
09.2019 - 02.2022
Assist in the implementation and support of technology across all of company's restaurants
Manage the IT infrastructure, including accounting and cash management systems
Monitoring technology performance and ensuring its reliability and security
Working with restaurant managers to understand their technology needs
Organise staff training on the use of IT systems
Implementing new technologies to improve restaurant operations
Supporting the integration of new restaurants into the holding's overall IT system
IT Technician
OZZY GROUP
Chernivtsi
07.2017 - 09.2019
Offering help and troubleshooting in issues such as hardware and/or software issues to customers
The daily tasks include setting up and supporting computer hardware and software devices, and networks
All virtual operations support and maintenance of operating systems or contained applications
The identification and solving of problems relating to the infrastructure of IT
Control the accounts of users and security through access control
Carrying out of data and systems backups in the case of system malfunction
Requiring and preserving the functionality of the local area networks (LANs) or other types of networks
Recording of various processes and parameters, as well as instructions on how to use equipment