| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address Home: PHONE NUMBER AVAILABLE EMAIL AVAILABLEExperienced call center agent looking to join a well-established company or firm.Lake Mary, FLTRANSFORM HOME IMPROVMENTS/SEARS02/2020-PRESENTAnswered inquiries by clarifying desired information; researching, locating, and providing informationDocumented call informationMaintained call center database by entering informationResolved problems by clarifying issues; researching and exploring answers and alternative solutions; implementing solutions; escalating unresolved problemsIT tech support for customers with websiteCALL CENTER AGENT APPLE/ CONCENTRIX01/2018 02/2020 Identified service opportunities for every customerConvert every inbound customer call to a scheduled appointment to increase dealership profitability and service-drive trafficFollowed up on all inquiries to ensure resolution satisfies customer, dealership, and company expectationsAdvised customers on service scheduled maintenance and service campaignsHandled status inquiries and communicated with service advisors and other dealership personnel regarding progress of customers vehiclesHad knowledge of all products, services and pricing for all domestic, foreign and luxury brands with Group 1 dealership networkAssisted call center in achieving or exceeding service level objectives and key operational initiativesTrouble shooting Apple MacBook pro, IPhones, tabletsMaitland, FLREP 1, STAPLES CALL CENTER12/2016 01/2018Answered inquiries by clarifying desired information; researching, locating, and providing informationDocumented call informationMaintained call center database by entering informationResolved problems by clarifying issues; researching and exploring answers and alternative solutions; implementing solutions; escalating unresolved problemsOrlando, FLSPRINT, QUAILITY CONTROL09/2013 11/2016Ensure security controls for digital assets by performing security risk assessment of J&J mobile and web applicationsOversee and guide a technical team in performing security risk assessmentsVerifying digital assets are developed and managed according to the Information Asset Protection Policies Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threatsAnalyze test results, draw conclusions from results, and develop targeted exploit examplesAssess and correlate true business risk based on test resultsReview calls for complianceEDUCATIONROLLINS COLLEGE 2014-2018 A.A. DEGREE COMMUNCATIONS/PUBLIC RELATIONSSKILLSMicrosoft word, Excel, PowerPoint, QuickBooks, Type 35wpm |