Splunk Developer/ Security Engineer Resume
Tampa, FL
SUMMARY
- 7 years of work experience in IT Industry in Analysis, Architecture, Design, Development and Maintenance of various software applications in system design, implementation, unit, integration and system maintenance.
- 4+ years of experience at Splunk, in Splunk developing dashboards, forms, SPL searches, reports and views, administration, upgrading, alert scheduling, KPIs, Visualization Add - Ons and Splunk infrastructure.
- Hands on experience in enterprise Deployments and enabled continuous integration on as part of configuration management.
- Expertise in Actuate Reporting, development, deployment, management, and performance tuning of Actuate reports.
- Expertise in customizing Splunk for Monitoring, Application Management, and Security as per customer requirements and industry best practice.
- Experience in responding to requests and incident tickets within defined Service Level Agreements.
- Install and maintain the Splunk adds-on including the DB Connect 1, Active Directory LDAP for work with directory and SQL database.
- Experience with creating disaster recovery plans and testing.
- Work as part of a team to provide excellent customer experience. Provide emergency or scheduled support out of hours as required.
- Install, configure, and troubleshoot Slunk. Use Splunk to collect and index log data.
- Experience with regular expressions and using regular expressions for data retrieval.
- Work with application owners to create or update monitoring for applications.
- Experience creating and maintaining Splunk reports, dashboards, forms, visualizations, alerts.
- Strong knowledge of Windows, Linux, and UNIX operating systems.
- Manage and support change in the environment. Experience of working.
- Splunk SPL (Search Processing Language) and Dashboarding/Visualization. Setup dashboards for network device logs.
- Good experience in working with SNMP traps and Syslog NG in onboarding the security devices on Splunk.
- Experience with creating disaster recovery plans and testing.
- Work as part of a team to provide excellent customer experience. Provide emergency or scheduled support out of hours as required.
- Install, configure, and troubleshoot Slunk. Use Splunk to collect and index log data.
- Experience with regular expressions and using regular expressions for data retrieval.
- Work with application owners to create or update monitoring for applications.
- Experience creating and maintaining Splunk reports, dashboards, forms, visualizations, alerts.
- Strong knowledge of Windows, Linux, and UNIX operating systems.
- Experience with Splunk technical implementation, planning, customization, integration with big data and statistical and analytical modeling.
- Machine learning experience and Experience deploying and managing infrastructure on public clouds such as AWS.
- Risk and Threat Analysis. IT security monitoring and analysis, vulnerability analysis by using Guardium, QRadar, Idenfense, wildfire, Sourcefire, fireeye.
- Expertise knowledge in optimize searches for better performance, Search time vs Index time field extraction. And understanding of configuration files, precedence and working.
- Developed specific content necessary to implement Security Use Cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow.
- Ability to write/create custom dashboards, alerts, searches, and reports to meet requirements of various user groups.
- Experience in dashboards and reports performance optimization.
- Working knowledge of scripting languages (e.g. Python, bash, etc.).
- Excellent knowledge of TCP/IP networking, and inter-networking technologies (routing/switching, proxy, firewall, load balancing etc.).
- Train and mentor for team towards solution development and POC, KPI, Metrics Monitoring execution in SPLUNK.
- Handling tickets through Remedy and Service now and addressing them promptly. Following ITIL best practices.
TECHNICAL SKILLS
Splunk Modules: Splunk 6.1.3, Splunk on Splunk, Splunk Enterprise, Splunk DB Connect, Splunk Cloud, Splunk Web Framework
Languages: SQL, PL/SQL, Perl (Korn shell) Unix Shell Scripts, JSP, C, C++, java, J2EE, CSS, HTML, XML.
RDBMS: Oracle 11g/10g/9i/8i, MS-SQL Server 2000/2005/2008 , Sybase, DB2 MS Access.
Tools: APEX 4.2,3.2, Pentaho 4.2/45.0/50/5.2/5.3 Power Center Oracle Forms 10g,9i,6i and Reports 10g,9i, 6i, ERWIN,VISIO.
Security Tools: Palo Alto, Imperva, IBM Security Guardium Vulnerability, OpenVAS, MBSA, Nexpose
Operating Systems: Red Hat Enterprise Linux 7.x/6.x, Sun Solaris 9/10, ES3/4, HP-UX 11.11,11.23, AIX5.3/6.1, Windows 2010/2008/OS X 10.6/10.7/10.8/10.9
PROFESSIONAL EXPERIENCE
Confidential, Tampa, FL
Splunk Developer/ Security Engineer
Responsibilities:
- Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
- Experience in setting up dashboards for senior management and production support- required to use SPLUNK.
- Splunk Engineer/Dashboard Developer responsible for the end-to-end event monitoring infrastructure of business-aligned applications.
- Prepared, arranged and tested Splunk search strings and operational strings. Created and configured management reports and dashboards.
- Maintained and managed assigned systems, Splunk related issues and administrators.
- Optimized the search performance of Splunk queries and reduced the time for loading the dashboards.
- Experienced in Troubleshooting Splunk search quotas, monitor Inputs, WMI Issues, Splunk crash logs and Alert scripts.
- Create and maintain documentation related to Architecture and Operational processes for Splunk.
- Implemented Splunk to analyze the patterns of the customers and all the data generated from various web and server logs to analyze the behavioral pattern of the customers.
- Splunk configuration that involves different web application and batch, create Saved search and summary search, summary indexes.
- Installation of Splunk indexer and forwarders in multiple servers with 2 head servers, Search Head and node servers.
- Design and implement Splunk Architecture (Indexer, Deployment server, Search heads, and Forwarder management), create/migrate existing Dashboards, Reports, Alerts, on daily/weekly schedule to provide the best productivity and service to the business units and other stakeholders.
- Splunk Architecture/Engineering and Administration for SOX monitoring and control compliance.
- Built Utilization and Monitoring Analytics for Various Work environments of Personal Insurance sector
- Created a drilldown of navigations from one Splunk app to the other app.
- Review and apply any newly available and applicable SPLUNK software or policy updates routinely.
- Assist with design of core scripts to automate SPLUNK maintenance and alerting tasks.
- Support SPLUNK on UNIX, Linux and Windows-based platforms. Assist with automation of processes and procedures.
- Maintain current functional and technical knowledge of the SPLUNK platform and future products.
- Help to document best practices in developing and using SPLUNK.
- Experience with Splunk UI/GUI development and/or operations roles
- Work with business/IT and create the next steps plan and implement the same.
- Implemented Post processing method for searches in dashboards.
- Extensively worked on building of range maps for various SLA conditions by using all kinds of Splunk 6.x Dashboard Examples .
- Implementing new apps to the Splunk and license distributing across the servers.
- Integrating the Splunk with Single Sign-On authentication and Service now ticketing tool.
- Performing investigation, analysis, reporting and escalations of security events from multiple sources including events like intrusion detection, Firewall logs, Proxy Logs, Web servers.
- Experience in Information Security Platform by providing support on known/ unknown vulnerabilities/ threats found via security devices/ product.
- Experience in developing & creating SIEM Procedures (SOP) documentation.
- Created and debugged Snort Intrusion Detection System (IDS) and Sagan Security Information event management (SIEM) rules.
- Created subroutines for Quadrant’s IDS Graphic User Interface (GUI).
- Headed Proof-of-Concepts (POC) on Splunk ES implementation, mentored and guided other team members on Understanding the use case of Splunk.
- Creating Vulnerability Assessment dashboard using Rapid7, Joval that aggregates data across multiple services to identify critical threats and proactively mitigate risks.
- Parsing, Indexing, Searching concepts Hot, Warm, Cold, Frozen bucketing and splunk clustering.
- Setup and configuration of search head cluster with three search head nodes and managing the search head cluster with deployer.
- Created Compliance dashboard for HP-NA and Compliance with Network Devices.
- Created Compliance Security Baseline and Vulnerability Assessment dashboard for IBM Guardium Security for Database Server and Database Instances.
- Creating Vulnerability Assessment dashboard using Rapid7, Joval that aggregates data across multiple services to identify critical threats and proactively mitigate risks.
- Created Compliance dashboard for HP-NA and Compliance with Network Devices.
- Created Compliance Security Baseline and Vulnerability Assessment dashboard for IBM Guardium Security for Database Server and Database Instances.
- Creating Vulnerability Assessment dashboard using Rapid7, Joval that aggregates data across multiple services to identify critical threats and proactively mitigate risks.
- Risk and Threat Analysis. IT security monitoring and analysis, vulnerability analysis by using Guardium, QRadar, Idenfense, wildfire, Sourcefire, fireeye.
- Developed specific content necessary to implement Security Use Cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow
- Supports, Monitors and manages the SIEM environment. Splunk Administration and analytics development on Information Security, Infrastructure and network, data security, Splunk Enterprise Security app, Triage events, Incident Analysis.
- Developed Splunk Objects and reports on Security baseline violations, Non-authenticated connections, Brute force attacks and many use cases.
- Splunk Administration and analytics development on Information Security, Infrastructure and network, data security, Splunk Enterprise Security app, Triage events, Incident Analysis.
- Experience in operating and monitoring AWS instances. Experience with Splunk Enterprise Security (Splunk ES).
- Administering Splunk and Splunk; Integrating Splunk with a wide variety of legacy data sources and industry leading commercial security and other tools.
- Assisting users to customize and configure Splunk in order to meet their requirements.
- Perform implementation of security and compliance-based use cases. Performing maintenance and optimization of existing Splunk deployments.
- Communicating with customer stake holders to include leadership, support teams, and system administrators.
- Technical writing/creation of formal documentation such as reports, training material and architecture diagrams.
- Ability to write/create custom dashboards, alerts, searches, and reports to meet requirements of various user groups.
Confidential, Englewood, OH
Splunk Developer
Responsibilities:
- Designing and implementing Splunk-based best practice solutions.
- Requirement gathering and analysis. Interacted with team members and users during the design and development of the applications and Splunk Objects.
- Receiving promptly, handling, gathering requirements through remedy tickets and resolving at on time.
- Communicating and collaborating with hundreds of customers, Splunk users.
- Data collection from various systems/servers, Forwarder Management, creating and managing Splunk apps.
- Building Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions.
- Creating, maintain, support, repair, customizing System & Splunk applications, search queries and dashboards.
- Splunk Administration and analytics development on Information Security, Infrastructure and network, data security, Splunk Enterprise Security app, Triage events, Incident Analysis.
- Developed Splunk Objects and reports on Security baseline violations, Non-authenticated connections, Brute force attacks and many use cases.
- Good experience in working with SNMP traps and Syslog NG in onboarding the security devices on Splunk.
- Design, support and maintain large Splunk environment in a highly available, redundant, geographically dispersed environment.
- Install, configure, and troubleshoot Splunk. Experience with regular expressions and using regular expressions for data retrieval.
- Work with application owners to create or update monitoring for applications.
- Experience creating and maintaining Splunk reports, dashboards, forms, visualizations, alerts.
- Good experience in building SplunkSecurity Analytics. Lead logging enrollments from multi-tier applications into the enterprise logging platforms.
- Developed specific content necessary to implement Security Use Cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow
- Strong knowledge of Windows, Linux, and UNIX operating systems.
- Experience in responding to requests and incident tickets within defined Service Level Agreements.
- Supports, Monitors and manages the SIEM environment
- Integration of Splunk with a wide variety of legacy and security data sources that use various protocols.
- Installation and configuration of Splunk apps to onboard data sources into Splunk
- Experience with creating disaster recovery plans and testing.
- Work as part of a team to provide excellent customer experience.
- Provide emergency or scheduled support out of hours as required.
- Manage and support change in the environment. Experience of working on a very large enterprise environment
- Splunk SPL (Search Processing Language) and Dashboarding/Visualization. Setup dashboards for network device logs.
- Developed alerts and timed reports Develop and manage Splunk applications. Have done many POCs.
- Implemented maps integration and dynamic drill downs extensively.
Confidential, Richmond, VA
Splunk Developer
Responsibilities:
- Planning, communicating clear instructions to the team members; training, guiding and directing the team.
- Requirement gathering and analysis. Interacted with team members and Business users during the design and development of the application.
- Ingesting logs to geologically distributed Splunk infrastructure.
- Getting data in and create & managing Splunk apps
- Developed robust, efficient queries that will feed custom Alert, Dashboards and Reports.
- Worked on Splunk search processing language, Splunk dashboards and Splunk dB connect app.
- Publishing data into Splunk through configurations such as inputs.conf, severclass.conf, server.conf, apps.conf and Outputs.conf configurations
- Design and customize complex search queries, and promote advanced searching, forensics and analytics
- Developed dashboards, data models, reports and optimized their performance.
- Provided engineering expertise and assistance to the Splunk user community
- Developed Splunk dashboards, data models, reports and applications, indexing, tagging and field extraction in Splunk
- Created Splunk knowledge objects (e.g. fields, lookups, macros, etc.)
- Experience in dashboards and reports performance optimization.
- Developed Dashboards for Business Activity Monitoring, Enterprise Architecture
- Built KPIs dashboards on Patient Enrollment transactions and other business activities
- Built Key Performance Indicators to the Enterprise Architecture team through Splunk
- Created Alerts on different SLAs and thresholds through Splunk.
- Manipulating raw data and Field extraction
- Built KPIs, alerts on SLAs of filesystem services project.
- Business Activity Monitoring and troubleshooting Maintain current functional and technical knowledge of the SPLUNK platform and future products.
- Help to document best practices in developing and using SPLUNK.
- Experience with Splunk UI/GUI development and/or operations roles
- Work with business/IT and create the next steps plan and implement the same.
- Doing deeper analysis of data using event correlations across indexes and various source types to generate custom reports for senior management.
Confidential, Englewood, CO
Java Developer
Responsibilities:
- Involved in developing the application using Java/J2EE platform. Implemented the Model View Control (MVC) structure using spring.
- Involved in Analysis, Design, Coding and testing phases of the project management.
- Responsible for maintaining, supporting, enhancing and developing the applications.
- Followed Agile Software Development with Scrum methodology.
- Implemented the Design Patterns like Session Façade, Data Transfer Object (DTO), Service Locator and Data Access Object (DAO).
- Designed UML diagrams like Use Case, Class and Activity diagrams based on the requirements.
- Involved in writing Controller Classes and DAO Classes using Spring MVC Framework.
- Used iBATIS framework with Spring Framework for data persistence and transaction management
- Used Spring Frameworks IoC Dependency Injection to inject Service Object into Action Classes.
- Responsible to enhance the web application UI using HTML, JavaScript, Angular JS, XML,JSP, CSS as per the requirements and providing the client side using java script validations.
- Used Hibernate as persistence framework mapping the ORM objects to table using Hibernate annotations.
- Implemented application level persistence using Hibernate.
- Hands on implementation of continuous service testing and service virtualization with the help of different tools like SOAP UI and POSTMAN.
- Developer brokers for credit card payment gateways.
- Exposed various capabilities as web services using SOAP/WSDL.