We provide IT Staff Augmentation Services!

Splunk Developer/ Admin Resume

Sanjose, CA

PROFESSIONAL SUMMARY:

  • Overall 7+ years of professional experience in Splunk, Linux, System Admin, Informatic developer
  • Experience in Splunk solution design, and implement and configuration of Splunk components like forwarders, Indexers, Search heads etc.
  • Advanced experience in Splunk DB connects Identities, Database Connections, Database Inputs, Outputs, lookups.
  • Expert in Splunk Development, Configuration and Administration
  • Engineered Splunk to build, configure and maintain heterogeneous environments and in - depth knowledge of log analysis generated by various systems including security products
  • Development experience in customizing Splunk dashboards, reports, visualizations, using splunk search queries and understand of complex IFX, RegEx (regular expressions).
  • Experience developing Splunk queries and dashboards targeted at understanding application performance and capacity analysis.
  • Worked as Splunk developer to setup splunk app for a critical new launch
  • Configured Syslog server for the forwarding the logs to Splunk server via network protocols like TCP and UDP. Helped the client to setup alerts for different type of errors
  • Experience in Operational Intelligence using Splunk.
  • Knowledge about Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model.
  • Time chart attributes such as span, bins, Tag, Event types, creating dashboards, reports using XML. Create dashboard from search, scheduled searches o Inline search vs scheduled search in a dashboard.
  • Various types of charts Alert Settings Knowledge of app creation, user and role access permissions. Creating and managing app, Create user, role, Permissions to knowledge objects
  • Providing all round support for Splunk forwarder logging issues, troubleshoot servers not forwarding events.
  • Knowledge of various search commands like stats, chart, time chart, transaction, strptime, strftime, eval etc.
  • Install and maintain the Splunk add-on including the DB Connect 1, Active Directory LDAP for work with directory and SQL database.
  • Parsing, Searching, Indexing concepts Hot, Warm, Cold, Frozen buckets.
  • Configuring distributed SPLUNK search architecture, auto-load balancing of indexers, forwarding, receiving
  • Knowledge of app creation, user and role access permissions
  • Experience on Splunk Enterprise Server 6.5.1, Universal Splunk Forwarder 6.5.2, Python (Jython), Regular Expressions.
  • Setup and Configuration of Search head cluster with three search head nodes and managing the search head cluster with Deployer
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Troubleshooting Linux network, security related issues, capturing packets using tools such as IPtables, firewall, TCP wrappers.
  • Involved in admin activities and worked on inputs.conf, index.conf, props.conf and transforms.conf to set up time zone and time stamp extractions, complex event transformations and whether any event breaking.
  • Experience in setting up dashboards for senior management and production support- required to use SPLUNK.
  • Develop design of application and Dashboards.
  • Provide regular support guidance to Splunk project teams on complex solution and issue resolution WITH the objective of ensuring best fit and high quality.
  • Provide inputs for identifying best fit architectural solutions - deployment for Splunk project.
  • Hands on SPUNK saved searches, regex functions & complex queries
  • Analyzed FACETS for Group Information, Enrolling Subscribers, adding members, Related Entities, Class/ Plan definition and Premium Rate Tables.
  • Analyzed security based events, risks and reporting instances.
  • Set up of splunk dashboards for continuous monitoring for production support
  • Test Treat web application components for functionality, regression, integration and end-to-end system stability on various test environments and browsers.
  • Knowledge with SIEM(Security Information and Event Management) systems, specifically Splunk, and security event correlation
  • Good Experince at Splunk onboarding with /TCP/UDPLOG4J/JSON/XMl
  • Write automation scripts for APIs, Unit and functional test cases using Selenium WebDriver.
  • Write automation scripts for REST API's using Testing and Java.
  • Enhance the existing scripts for better test coverage.
  • Report and maintain the tasks, acceptance criteria and bugs in the test management system Quality Center (ALM)
  • Involved in testing FACETS for Group Information, Enrolling Subscribers, adding members, Related Entities, Class/Plan definition and Premium Rate Tables.
  • Extracted data from different databases like Oracle and external source systems like flat files using ETL tool.
  • Integrated Splunk with Active directory and LDAP authentication.
  • Carried out the analysis of the Defects and the necessary change to close that bugs.
  • Integrated Service Now with Splunk to generate the Incidents from Splunk.

TECHNICAL SKILLS:

Splunk Modules: Splunk 5.x/6.x, Splunk Cloud, Splunk DB Connect, Splunk on Splunk, Hunk, Splunk IT Service Intelligence.

Operator System: Red Hat Linux 4.x/5.x/6.x, Sun Solaris 2.6/7/8/9,10 HP-UX 10.X/11.X, IBM AIX 4.3, 5.x, Windows NT 4.0/2000/2003/ XP

Scripting Languages: WLST, UNIX Shell Scripting (Bourne, C and Bash), Perl, Python

Web/Application Server: Tomcat, Apache, Web Logic, Squid, Informatica 7.1, Web Sphere application Server, Web Server HIS

Operating Systems: Solaris (8, 9, 10) Red Hat Linux (4, 5) UNIX, win2K/XP/2003, HPUX

Databases: MS - SQL Server, Oracle

PROFESSIONAL EXPERIENCE:

Confidential, Sanjose, CA

Splunk Developer/ Admin

Responsibilities:

  • Knowledge of Extract keyword, Sed, Knowledge objects, Knowledge of various search commands like stats, chart, time chart, transaction, strptime, strftime, eval, where, table etc.
  • Expertise Splunk query language and Monitored Database Connection Health by using Splunk DB connect health dashboards.
  • Used Spunk for IT operations analysis.
  • Used Splunk ES as an SIEM tool.
  • Field Extraction, Using Ifx, Rex Command and Regex in configuration files Designing and maintaining production-quality Splunkdashboard.
  • Experience with Splunk UI/GUI development and operations.
  • Hands on development experience in customizing, visualizations, configurations, reports and search capabilities using customized Splunk queries
  • Created Regular Expressions for Field Extractions and Field Transformations in Splunk
  • Managed Indexer Clusters including security, hot and cold bucket management and retention policies.
  • Helping application teams in on-boarding Splunk and creating Dashboard, Alert, and Reports etc. Experience on use and understand of complex Reg Ex (regular expressions)
  • Various types of charts Alert settings Knowledge of App creation, user and role access permissions. Creating and Managing Apps, Create user, role and Permissions to Knowledge objects
  • Managed Indexer Clusters including security, hot and cold bucket management and retention policies.
  • Worked on Various types of charts, alerts settings, app creations, user and role access permissions.
  • Work closely with Application Teams to create new Splunk dashboards for Operation teams.
  • Knowledge on Splunk DB connect Identities, Database Connections, Database Inputs, Outputs, lookups, access controls.
  • Worked as part of Cyber Security Incident Response team to check on malware virus and threat emails. Developed Splunk Search Processing Language (SPL) queries, created Reports, Alerts and Dashboards and customized them. Implemented Dynamic drilldowns that provide greater flexibility to the end user.

Environment: SPLUNK 6.0, Linux, Universal Splunk Forwarder, RedHat Linux, Oracle, HTML, Perl, Java Script, XMLrex, Splunk Knowledge Objects, DB Connect and other modules, Oracle WebLogic 9.x/10.x, Tomcat 5.x/6.x, Oracle 9i/10g, Solaris 10, LINUX, Sun ONE Directory Server.

Confidential, Snoqualmie, WA

Splunk Consultant

Responsibilities:

  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Regex, Dashboards, Clustering and Forwarder Management
  • Parsing, Searching, Indexing concepts Hot, Warm, Cold, Frozen buckets.
  • Splunk configuration that involves different web application and batch, create Saved search and summary search, summary indexes.
  • Managing indexes and cluster indexes, Splunk web framework, data model and pivot tables
  • Troubleshooting of searches for performance issues by adding lookups, and configuration changes to resolve Splunk integration issues
  • Configured LDAP and provided support for applications
  • Gathering different wellsprings of syslog and XML information from different gadgets, applications, and information bases.
  • Knowledge of app creation, user and role access permissions
  • Basic understanding of Network Firewalls, Load-balancers, LDAP and complex network design.
  • Installation and configuration of Splunk product and Splunk DB connect at different environments.
  • Experience in creating dashboards, report, scheduled searches and alerts
  • Expertise on write, use and understand of complex regular expressions.
  • Prepared, arranged and tested Splunk search strings and operational strings.
  • Created and configured management reports and dashboards.
  • Good Experince at Splunk Enterprise Server 6.5.1, Universal Splunk Forwarder 6.5.2, Python (Jython), Regular Expressions.
  • Worked on large datasets to generate insights by using Splunk.
  • Ability to develop complex Splunk dashboards and visualizations using queries and simple XM
  • Various types of charts Alert Settings Knowledge of app creation, user and role access permissions, creating and managing app, create user role Permissions to knowledge objects.
  • Monitor, contextualize and provide reporting on a wide variety of network data feeds including but not limited to network logs, syslog's, firewall logs, netflow data, and IDS/IPS logs
  • Manage and configure index settings and created event type definitions. Analyzed security based events, risks and reporting instances
  • Integrated Splunk with Active directory and LDAP authentication
  • Manage SIEM solution and integration with other IT-based solutions for increased visibility and correlation Cyber Security incident management Configuring Splunk DB Connect 2.0 in search head cluster environments of Oracle, MySQL
  • Add Roles and Users to Splunk, Configure Splunk to use AD LDAP service for access controls.
  • Configured Syslog server for the forwarding the logs to Splunk server via network protocols like TCP and UDP. Helped the client to setup alerts for different type of errors
  • Setup and Configuration of Search head cluster with three search head nodes and managing the search head cluster with Deployer
  • Good Experince at Splunk onboarding with /TCP/UDPLOG4J/JSON/XML
  • Worked with administrators to ensure Splunk is actively, accurately running, and monitoring on the current infrastructure implementation
  • Basic understanding of Network Firewalls, Load-balancers, LDAP and complex network design.
  • Configure and test Search Head Pooling
  • Doing deeper analysis of data using event correlations across indexes and various source types to generate custom reports for senior management
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms

Environment: SPLUNK 6.0, Linux, UNIX, Oracle 11g, MS SQL Server 2012, SQL Linux, Windows Server 2012, 2008, Splunk Enterprise Security, Applications Development, Analysis, operations analysis, Red Hat Linux 6.x, LDAP, JDBC, JDK1.7, J2EE, JSP, Servlets, TCP/UDP,JSON JMS, XML, Solaris 10, Python (Jython), Regular Expressions.

Confidential, Des Moines, Iowa

Splunk Engineer (Admin & Developer)

Responsibilities:

  • Ingesting logs to geologically distributed Splunk infrastructure & getting data in and Managing Splunk apps
  • Data inputs in detail, Index administration, maintenance and optimization
  • Manipulating raw data and Field extraction
  • Played a major role in understanding the logs, server data and brought an insight of the data for the users.
  • Provide regular support guidance to Splunk project teams on complex solution and issue resolution.
  • Distributed search and Search performance tuning
  • Introduction to large-scale Splunk deployment, Monitoring and troubleshooting
  • Good experience in Installing and maintaining the Splunk adds-on including the DB Connect 1, Active Directory LDAP for work with directory and SQL database
  • Providing all round support for Splunk forwarder logging issues, troubleshoot servers not forwarding events.
  • Good Understanding of configuration files, precedence and daily work exposure to Props.conf, transforms conf Input conf, output conf and Setting up a forwarder information based on the requirement.
  • Manage and configure index settings and created event type definitions. Analyzed security based events, risks and reporting instances
  • Integrated Splunk with Active directory and LDAP authentication
  • Involved in setting up alerts for different type of errors
  • Very Good experience on Splunk Search Language and Regular expressions
  • Knowledge about Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model.
  • Time chart attributes such as span, bins, Tag, Event types, creating dashboards, reports using XML. Create dashboard from search, scheduled searches o Inline search vs scheduled search in a dashboard
  • Experience in developing dashboards and customizing them
  • Helped the client to setup alerts for different type of errors
  • Manage and configure index settings and created event type definitions. Analyzed security based events, risks and reporting instances
  • Used data meter to analyze the transaction data for the client
  • Configuring distributed SPLUNK search architecture, auto-load balancing of indexers, forwarding, receiving
  • Developed, evaluated and documented specific metrics for management purpose
  • Using SPL created Visualizations to get the value out of data.
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management
  • Knowledge with SIEM(Security Information and Event Management) systems, specifically Splunk, and security event correlation
  • Integrated Service Now with Splunk to generate the Incidents from Splunk
  • Various types of charts Alert Settings Knowledge of app creation, user and role access permissions.
  • Creating managing app, Create user, role, Permissions to knowledge objects.
  • Assisted internal users of Splunk in designing and maintaining production-quality dashboard
  • Installation and implementation of several kind of visualizations to Splunk Dashboards
  • Good knowledge about Indexer and Search head clustering
  • Created many of the proof-of-concept dashboards for IT operations, and service owners used to monitor application and server health
  • Additional responsibilities include Knowledge management, Providing KTs, Documentation and communications on future upgrades.

Environment: Linux RHEL, Splunk … Splunk Universal forwarder, Splunk 5.x, Splunk on Splunk, Splunk modules, Web Logic 8.1/9.x/10.x, Tomcat 6.0, JBoss 5.0,JSON, iPlanet4.1, Apache Tomcat 6.0, SUN Solaris 9/10, Windows 2003/2008, Shell Scripting, UNIX/AIX/Solaris/Window,LOG4NJ.

Confidential, Dallas, Texas

Splunk Admin

Responsibilities:

  • Knowledge about Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model
  • Created Dashboards, report, scheduled searches and alerts
  • Having experience in understanding of Splunk 5.x and 6.x product, Distributed Splunk architecture and components including search heads, indexers, forwarders, etc.
  • Experience in Extraction on Search time vs Index time field extraction.
  • Good Understanding of configuration files, precedence and daily work exposure to Props.conf, transforms. conf, inputs. Conf, output.conf and Setting up a forwarder information based on requirement.
  • Maintenance of Splunk Environment with multiple Indexers.
  • Provide Regular support guidance to Splunk project teams on complex solution and issue resolution
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows and other platforms
  • Integrate Service Now with Splunk to generate the Incidents from Splunk
  • Created many of the proof-of-concept dashboards for IT operations, and service owners which are used to Monitor application and server health.
  • Expertise in Actuate Reporting, development, deployment, management and performance tuning of Actuate Reports
  • Indexing, searching concepts Hot, Warm, Cold, Frozen, Fish bucketing
  • Knowledge of app creation, user and role access permissions
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management
  • Field Extraction, Using Ifx, Rex Command and Regex in configuration files
  • Configured Syslog server for the forwarding the logs to Splunk server via network protocols like TCP and UDP. Helped the client to setup alerts for different type of errors
  • Experienced Server administration including setting up Active Directory users and groups, giving appropriate permissions for viewing published dashboards and scheduling data refresh instances.
  • Add Roles and Users to Splunk, Configure Splunk to use AD LDAP service for access controls.
  • Map LDAP groups to Splunk roles
  • Use techniques to optimize searches for better performance, Search time vs. Index time field extraction and understanding of configuration files, precedence and working
  • Knowledge with SIEM(Security Information and Event Management) systems, specifically Splunk, and security event correlation
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management
  • Integrated Splunk with Active directory and LDAP authentication
  • Create dashboard from search, scheduled searches Inline search vs. scheduled search in a dashboard
  • Various types of charts Alert Settings Knowledge of app creation, user and role access permissions.
  • Configured LDAP and provided support for applications
  • Manage SIEM solution and integration with other IT-based solutions for increased visibility and correlation Cyber Security incident management
  • Basic understanding of Network Firewalls, Load-balancers, LDAP and complex network design
  • Creating and managing app, Create user, role, Permissions to knowledge objects

Environment: SPLUNK 6.1.3, Linux, UNIX, Oracle 11g, MS SQL Server 2012, SQL, Windows 2007 server, Unix

Confidential, Fort Worth, Texas

System/ Linux Administrator

Responsibilities:

  • Created logical volumes file systems in Linux and SVM volumes in Solaris 10.
  • Collaborated with Storage Team to create NFS volumes and setup host access to specific shared NFS and CIFS
  • Used LDAP centralized access tool to manage Authentication for Unix Application Accounts, LINUX /UNIX groups and LINUX/UNIX hosts
  • Set up standard rules in UNIX sudoers file for Unix Applications
  • Implemented file level security controls to protect Application from unauthorized read/write/update/delete operations
  • Maintained current server infrastructure, provided recommendations and fixed technical problems in a cost- effective manner.
  • Preformed both hardware and software implementation, configured and test of network components (servers, switches, routers,) troubleshooting, test and maintenance of UNIX LAN/WAN,
  • Demonstrated expertise in configuring, managing and troubleshooting variations of DNS, DHCP, TCP/IP and Networking
  • Provided support to IT systems including day-to-day operations, monitoring and problem resolution for
  • Client /server/storage/network devices
  • Optimized system operations and resource utilization and performed system capacity analysis and planning
  • Troubleshooting Linux network, security related issues, capturing packets using tools such as IPtables, firewall.
  • Designing Firewall rules for new servers to enable communication with application, Oracle 10g servers

Environment: Red Hat Linux (RHEL 5), Oracle 10G, TCP/IP, DNS, DHCP, NFS, SAMBA, Apache, POSTFIX, POP3, SMTP, MySql, Oracle, JBoss, IBM AIX 5.x, Red Hat Enterprise Linux 4.x/5.x, Red Hat Linux 8/9, VMware ESX Server4.0, JBoss4.0.x, Apache2.0, SAN/NAS, Web Logic

Confidential

Informatica Developer

Responsibilities:

  • Resolving if any issues in transformations and mappings during the development of unit and system testing phases
  • Involved in debugging Informatica mappings, testing of Stored Procedures and Functions, Performance and Unit
  • Testing of Informatica Sessions, Batches and Target Data
  • Worked on tickets raised and fix existing issues.
  • Implemented SCD Type1, Type2 mappings based on user requirements.
  • Worked with Caches like Persistence cache, Dynamic cache.
  • Responsible for creating Reusable transformations and Mapplets
  • Extensively worked with incremental loading mappings
  • Involved in creating new table structures and modifying existing tables and fit into the existing Data Model
  • Extracted data from different databases like Oracle and external source systems like flat files using ETL tool
  • Developed Mapplets, Reusable Transformations, Source and Target definitions, mappings using Informatica 9.1.0
  • Generated queries using SQL to check for consistency of the data in the tables and to update the tables as per the Business requirements
  • Involved in Performance Tuning of mappings in Informatica
  • Good understanding of source to target data mapping and Business rules associated with the ETL processes.

Environment: Informatica 7.1, Oracle 11g, SQL server 2008 R2, SQL, T-SQL, PL/SQL, Toad 10.6, SQL LoaderTidal Enterprise Scheduler 5.3.1, UNIX, Flat files

Hire Now