We provide IT Staff Augmentation Services!

Network Security Sr. Analyst (splunk) Resume

5.00/5 (Submit Your Rating)

Plano, TX

SUMMARY

  • Computer Science Engineer wif previous professional experience.
  • Detail - oriented individual wif patience and flexibility dat thrives in a position dat requires quick learning and great accuracy.
  • Proficient Splunk Engineer wif 4 year of IT experience in client/server applications.

TECHNICAL SKILLS

  • Splunk 6.5/6.6, App dynamics, Wireshark.
  • Windows Server 2012/2008/2003R2, Linux and Unix Servers, ServiceNow, F5 data ASM, TCP/IP.
  • HTML, XML, CSS, JavaScript, JAVA, JQuery, Angularjs, Linux, shell, bash scripting.

PROFESSIONAL EXPERIENCE:

Confidential, Plano, TX

Network Security Sr. Analyst (Splunk)

Responsibilities:

  • Working on Shift basis in SOC, giving client 24/7 service, monitoring.
  • Challenges dealing wif customized threat bypasses security gateways.
  • Loaded skills like understanding security policies, Data & traffic analysis, identifying security events, incident response.
  • Also in incident response team responsible for handling security dat occur wifin organization and correcting and documenting the security issue in a timely manner.
  • Ingesting and working wif various data types like CSV, JSON, XML, Raw Logs, syslogs and parsing them wif custom source types.
  • Great knowledge on computer forensics dealing wif capture and analysis of evidence from computers, servers.
  • Foundation skills like, Device config, traffic capture, performance monitoring, device monitoring.
  • Monitor systems and report the status to client staff.
  • Splunk server configurations (web, indexing retention, authentication, etc.), data onboarding operations, data parsing operations.
  • Creates correlation search rule for the admin activity, indexes for field extractions.
  • Create and manage host values and source types.
  • Manage network, Windows and any other inputs dat may arise (universal forwarders).
  • Composed reports detailing theforensicanalyses performed and the results of the investigations.
  • Identify threats and work to create steps to defend against them.
  • Monitor network traffic for suspicious behavior.
  • Working knowledge on security technologies like Encryption, Data Loss Prevention (DLP), IPS/IDS etc.
  • Actively protects the availability, confidentiality, and integrity of customer, employee, and business identity.
  • Contribute to the Risk Assessment Program including identifying and scoring risk.
  • Collaborate wif the team and architecture on new platforms, IAM roadmap, assess security risks, and identity long-term strategy recommendations.
  • Addressed basic client configuration issues and service alerts.
  • Position requires mentoring and training of SOC Technicians and SOC employees.
  • Monitored and correlated events wif thorough knowledge of principals, methods, and techniques of network and data security.
Environment: Windows Server 2012/2008/2003R2, Linux and Unix Servers,SPLUNK 6.4/6.5, ServiceNow, F5 data ASM, TCP/IP.

Confidential, Chicago, IL

Splunk Consultant

Responsibilities:

  • Design, support and maintain theSplunkinfrastructure on Windows, Linux and UNIX environments.
  • Installation ofSplunkEnterprise,Splunkforwarder,SplunkIndexer, Apps in multiple servers (Windows and Linux) wif automation.
  • Splunk Heavy Forwarder Configuration.Install and maintain theSplunkadd-on including the DB Connect, Active Directory, LDAP for work wif directory.
  • ManageSplunkconfiguration files like input, props, transforms etc.
  • Upgrading theSplunkEnterprise and security patching.
  • Well versed in both remote and on-site userSplunkSupport.
  • On boarded multiple data sources wifinSplunk, creating custom TAs for data parsing.
  • Advised clients on the best practices for aSplunkdeployment.
  • Developed detailed documentation for the installation and configuration ofSplunkandSplunkApps.

Environment: Windows Server 2012/2008/2003R2, Linux RedHat, Linux and Unix Servers,SPLUNK 6.5, ServiceNow, F5 data ASM, wireshark, Jira, TCP/IP, CompTIA Security+.

Confidential, Milwaukee, WI

Network Security Analyst

Responsibilities:

  • Monitor systems and report the status to client staff.
  • Good working knowledge on AWS Environment, Cloudtrail, Cloudwatch, Vpc flow logs, EC2 instance, configuring AWS.
  • Splunk server configurations (web, indexing retention, authentication, etc.).
  • Splunk data onboarding operations (inputs, SQL, index-time configurations).
  • Splunk data parsing operations (search-time field extractions, event types, tags).
  • Manage existing application and create new applications (visual and non-visual).
  • Worked on AWS cloudtrails and F5 data.
  • Deploy, configure and maintainSplunkforwarder in different platforms.
  • Creating Reports, Pivots, alerts, advanceSplunksearch and Visualization inSplunkenterprise.
  • Provide power, admin access for the users and restrict their permission on files.
  • Installed and upgradedSplunksoftware in distributed and clustered.

Environment: Windows Server 2012/2008/2003R2, Linux and Unix Servers,SPLUNK 6.5, ServiceNow, F5 data ASM, wireshark, AWS cloudtrail, cloudwatch, Jira, TCP/IP, CompTIA Security+.

Confidential

Security Analyst

Responsibilities:

  • Analyzesecurityand firewall logs for compromised/infected hosts on thenetwork.
  • Responsible for Disaster Recovery Site Management.
  • Design and develop theSecurityZone diagram for theSecurityMonitoring Team.
  • Member of theSecurityOperations Center (SOC) dat provides 24/7 monitoring, analysis, and remediation ofsecurityevents.
  • In charge of Cyber Attack Response Team including data recovery.
  • Analyzesecurityincidents and escalate as necessary.
  • Create daily, monthly, and adhoc reports for various devices.
  • Identify, monitor, and prepare daily reports ofNetworkthreats, and Vulnerabilities.
  • Prepare reports using the Nagios server monitoring tool.
  • Create new process documents to help theAnalystsin analyzing events.
  • Responsible for vulnerability reporting and vulnerability scan scheduling.
  • Follow up wif asset owners for remediation of vulnerabilities either at OS or application level.
  • Maintain Spam Filter and Web Filter.
  • Work wif vendors to support system maintenance.
  • Keep servers updated wif latestsecurityupdates.
  • Create and migrate virtual servers.

Environment:Windows Server 2012/2008/2003R2, Linux and Unix Servers, Nagios.

We'd love your feedback!