We provide IT Staff Augmentation Services!

Splunk Security Engineer Resume

0/5 (Submit Your Rating)

SUMMARY

  • Splunk certified professional with around 6+ years of experience in the IT industry comprising of Splunk Installation and UNIX management, Splunk architecture and components including search heads, indexers and forwarders.
  • Experience in implementation of Splunk premium applications, application management, and data security as per customer requirements and industry best practice.

TECHNICAL SKILLS

Splunk: Splunk 7.x, 8.x and 9.x, Splunk Enterprise, Splunk DBConnect, Splunk Machine Learning tool kit 3.0.0, Splunk ITSI.

Tools: Splunk Enterprise,Zoom,MS Project,Excel,Tenable tool,Trend Micro,Vagrant,Centos,Vulnerability Scanner, PowerPoint

PROFESSIONAL EXPERIENCE

Confidential

Splunk Security Engineer

Responsibilities:

  • Responsible for leading enterprise - wide efforts to reduce organizations exposure to cyber attacks through monitoring, analysis, and assessment of the threat landscape, asset health, and adversary activity data.
  • Involved in the verification, tracking, and remediation of technology defects by determining the root cause of anomalies and track them through remediation.
  • Experience in app interface development, using REST API’s
  • Enterprise Security event monitoring computer security incident response, DDoS support.
  • Served as the focal point for evolving threats, and assists with development and tuning of tools, to detect these threats.
  • Created Sources, Routes, Pipelines, and Destinations to ingest data from source applications to Splunk using Cribl.
  • Providing IT Security solutions by using splunk has a SIEM tool to explore critical initiatives
  • Worked with platform and source SMEs, architects, and team on technical approaches
  • Performed feed-source typing, event-line breaking, timestamp extractions, field parsing, (custom extractions), Common Information Model (CIM) normalization, and created both event types and tags for Splunk data models.
  • Provide engineering support for Splunk components such as Splunk Cloud, Splunk ES, Splunk SOAR, Splunk Deployment Server, Splunk Heavy Forwarders
  • Creation of knowledge objects and configuration files
  • Develop knowledge objects include saved searches, event types, tags, field extractions, lookups, reports, alerts, data models, workflow actions, and fields.
  • Performed Splunk different configuration, validation of boarded data, regex, Event parsing, and data transformation
  • Experienced in using Splunk IT Service Intelligencebrings a unique approach to monitoring and troubleshooting
  • Standardize and implement Splunk Infrastructure deploying from universal forwarder, deplorer deployment and configuration and maintenance in Linux and windows servers
  • Maintain, monitor, and identify bad searches, dashboards and health of Splunk
  • Perform index administration, maintenance and optimization and create data retention
  • Create Splunk applications, Splunk dashboard and visualizations
  • Manage and troubleshooting and solving Splunk problems through the front end and from the backend
  • Selection, testing, and integration of add-ons and applications
  • Writing and verification of queries and code to satisfy requirements
  • Technical feasibility evaluations
  • Extensive experience in AWS Amazon cloud service platform and its features
  • Extensive experience and managed Security Operations team with a clear understanding of Incident Response, Incident Analysis, Endpoint Protection, Threat Intelligence, Threat Hunting, Vulnerability Management, Cloud Security best practices.
  • Provide visibility into organizations cybersecurity related events of interest using data, security tool signatures, advanced correlation, visualization, and alerting.
  • Enhanced visibility by augmenting security tools by customization, and helped prioritize vendor signatures related to emergency vulnerabilities.
  • Performed security analysis on sourcetype feeds in order to find valuable search time extractions.
  • Performed data quality analysis, security analysis, and CIM compliance to ensure data feed is ingested and configured correctly.

Environment: Splunk 8.x, Linux, Splunk Enterprise Security 7.x

Confidential

Splunk Admin/Developer

Responsibilities:

  • Daily Splunk administration maintenance.
  • Established On-boarding of Web and database server logs into Splunk by the DBConnect Application.
  • Achieved hands-on experience in clustering, deploying apps through Splunk deployment server, Splunk version upgrades and creating roles and authentication.
  • Utilized the Splunk Machine Learning concepts, algorithms to write complex queries using SPL and visualize data into dashboards and reports.
  • Hands-On experience on multiple configuration file (.conf) settings.
  • Configured the heavy forwarder to send the logs from QRadar server to Splunk indexers and customized the reports and dashboards.
  • Created Sources, Routes, Pipelines, and Destinations to ingest data from source applications to Splunk using Cribl.
  • Involved in ingesting the data from multiple appliances into the cluster and analyze data with SPL queries.
  • Extensive experience in AWS Amazon cloud service platform and its features: EC2, VPC, SNS, EBS, Cloud watch, Cloud trail, Cloud formation AWS configuration, Load Balancing, Lambda, S3, IAM, Security Groups.
  • Performed Splunk administration and analytics development on Information Security, Infrastructure, network logs.
  • Provide engineering support for Splunk components such as Splunk Cloud, Splunk ES, Splunk SOAR, Splunk Deployment Server, Splunk Heavy Forwarders
  • Developed specific content necessary to implement Security Use Cases and transform into correlation queries, templates, reports, rules, alerts, dashboards, and workflow
  • Deployed Splunk enterprise package and forwarder package in multiple instances.
  • Involved in standardizing Splunk forwarder deployment, configuration, and maintenance on all Windows and Linux platforms.
  • Real-time monitoring of enterprise endpoints for signs of malicious activity by Carbon Black (CB).
  • Analyzed threat patterns by Carbon Black (CB) and investigated SIEM alerts with endpoint context.
  • Participated in client requirements meetings and presented the visual presentations of possible outcomes.
  • Developed the use cases for different business requirements.
  • Executed daily vulnerability assessments, threat assessment, and mitigation and reported activities in order to safeguard information assets and ensure protection had been put in place on the systems.
  • Designed the Correlation searches for multiple end client requirements.
  • Extensive knowledge in creating accurate knowledge objects using XML, Dashboards, visualization, reports, alerts and pivot tables for the business users.
  • Hands-on experience with indexer clustering and search head clustering in both test and production environment.
  • Assisted the privileged user access management team to solve the daily encountered problems.
  • Customized dashboards, reports and scheduled searches.
  • Experience with working on Service now ticketing tool.
  • Worked on User access roles and capabilities.

Environment: Splunk 6.5.3, Linux, Windows 2008,2012, IBM AIX, Oraclel1g, MS SQL Server 2012, SQL, Symantec Endpoint (SEP), Tripwire IP-360, Service Now (ITAM), Carbon

Confidential

IT Auditor

Responsibilities:

  • Develop audit scope, plan, conduct fieldwork, draft initial report and champion follow up if needed based on testing results.
  • Lead audit results discussion with appropriate stakeholders, internal senior management and colleagues, present observations and cascade identified control weaknesses.
  • Assess key risks and internal controls, develop target audit programs and risk and control matrices to ensure projects meet management expectations.
  • Conduct walkthroughs, detailed testing to determine risks and evaluate controls put in place by management to mitigate all identified risks.
  • Prepare documentation of business/IT processes and sub-processes in the form of walkthroughs, flow charts and narratives for the controls in scope of the audit project.
  • Perform pre and post SDLC review, ensuring the seven phases are properly followed, and all implemented controls are design adequately and operating effectively.
  • Conduct SOC audits - SOC I, II, III and SOC 1 Type I, SSAE 18 & SOC 1 Type II reports review.
  • Follow-up on status of management efforts to ensure that adequate controls are timely implemented to fix identified gaps.

We'd love your feedback!