Splunk Consultant Resume
5.00/5 (Submit Your Rating)
SUMMARY
- 4 years of administration, architecture and upgrades for distributed Splunk environments on Linux RHEL/CentOS systems heavy forwarders, deployment servers, indexers, indexes, cluster masters, clusters and search heads
- Dashboards and alerts for operational visibility
- Indexer Cluster management including security, hot and cold bucket management and retention policies
- Secure Splunk using LDAP integration with security groups and Splunk role mapping
- Field extractions through complex regex
- Data filtering for index volume management with regex data filtering
- Mask sensitive data with Props and Transforms configurations
- Troubleshoot Splunk
- Load data sources into Splunk including Syslog and log files
- System administration, application administration, centralized logging and data mining
TECHNICAL SKILLS
- Splunk
- Syslog - NG
- Puppet git svn
- Opsview
- SiteScope
- Linux
- SQL 2005
- 2008
- VMWare
- Servers
- Active Directory
- Windows Server
- Microsoft Office
PROFESSIONAL EXPERIENCE
Confidential
SPLUNK CONSULTANT
Responsibilities:
- Consult client to satisfy their reporting needs
- Configure indexes for data retention and security roles
- Migrate Splunk instance from x32 Operating System to x64 Operating System
- Upgrade Splunk from 6.1 to 6.2
- Configure Deployment Server for application deployments of data ingestion
- Data collection for multiple data sources
- Advise client on Splunk base apps and configured and installed applications
Confidential
SPLUNK CONSULTANT
Responsibilities:
- Designed multi-site infrastructure architecture
- Migrated Splunk from legacy to new production infrastructure
- Syslog-NG configuration management and Syslog relay
- Secure Splunk with LDAP and Splunk roles
- Implementation plans used by support teams to execute releases
- Development lifecycle builds in QA infrastructure prior to production changes
- Data collection for multiple data sources
- Scaled Splunk and Syslog-NG infrastructure following application best practices
- Administered and upgraded Splunk applications using Splunk best practices
Confidential
SPLUNK ENGINEER
Responsibilities:
- Lead System Engineer responsible for building and troubleshooting IT Security Splunk instance
- Gather business requirements for project
- Present changes to review boards for project approval at project gates
- Build infrastructure for QA and production environment
- Performance, stress and endurance test infrastructure
- Manage configuration files via Puppet and Fabric with git repository
- Create dashboards and alerts for operation teams
- Create change requests with detailed deployment steps for production release
- Architect storage solution for indexer management and hot and cold bucket retentions
Confidential
NOC MANAGER
Responsibilities:
- Managed 5 direct reports providing 24x7x365 operations support
- Architected and administered Splunk in redundant data centers
- Configured Splunk settings including indexes, field extractions, dashboards and alerts
- Collaborated with development and operations application monitoring
Confidential
NOC MANAGER
Responsibilities:
- Managed 11 direct reports responsible for Incident Management 24x7x365
- Responded to high severity and high impact incidents
- Architected and administered monitoring systems including Splunk, Opsview and SiteScope
- Created Root Cause Analysis for partners
- Directed remediation efforts in Problem Management identified by Incident Management outputs
Confidential
SYSTEM ENGINEER
Responsibilities:
- Built transaction processing environment and migrated services to new datacenter
- Managed DR data center and performed annual readiness tests
- Administered server environments for software development lifecycle
- Upgraded SQL 2005 to SQL 2008 in test, QA and production environments
- Procured and deployed UPS infrastructure
- Converted physical servers to VM infrastructure (P2V)