We provide IT Staff Augmentation Services!

Sr. Splunk Admin/developer Resume

Palm Beach, FloridA

SUMMARY

  • Experienced SPLUNK, ETL & Shell Scripts Developer with 6 years of experience in designing, developing and delivering automation projects.
  • Experience with requirement gathering, requirement Analysis, environment set - up, designing technical approach and complete development includes programming and scheduling scripts and automating process
  • Experienced in SIEM (Security Information and Event Management) of Splunk and sound knowledge on other offering Technologies in the market like Sumo Logic.
  • Involved in requirements gathering and "Kick-Off meeting" with Stakeholders for Product selection of SIEM.
  • Monitoring Splunk Infrastructure (Identify bad searches, dashboards and overall health of Splunk) and collaborate with respective teams to improve performance.
  • Played key role in the Splunk SIEM project and worked with Splunk Sales in determining the log size and suggest Client for estimation of licensing cost.
  • Experienced professional in analyzing data, correlating trends, building reports and report writing
  • Experienced in Preparing, arranging and testing Splunk search strings and operational strings.
  • Experience with Development, evaluation and documentation of specific metrics for management purpose.
  • Experience with Installation and Maintenance of Splunk Universal Forwarders, Solving Forwarder Issues, Deployment Server Classes and Apps through Deployment Server.
  • Knowledge on monitoring and logging tools like ELK Stack (Elastic search, Log stash, and Kibana).
  • Configured, Installed and managed monitoring tools such as Nagios, Dynatrace, and iCinga for Resource Monitoring, Network Monitoring and Log Trace Monitoring.
  • Set up Splunk to capture and analyze data from various layers Load Balancers, Web servers and application servers.
  • Using Chef deployed and configured Elasticsearch, Logstash and Kibana (ELK) for log analytics, full text search, application monitoring in integration with AWS Lambda and CloudWatch.
  • Experience in System Administration, System Builds, Server builds, Installs, Upgrades, Patches, Migration, Troubleshooting, Security, Backup, Disaster Recovery, Performance Monitoring and Fine-tuning on UNIX Red Hat Linux Systems.
  • Worked on AppDynamics Controller administrative activities like user management, application management, monitoring controller performance.
  • Involved in the functional usage and deployment of applications in WebLogic, WebSphere, IIS and Apache Tomcat Server/JBOSS.
  • Knowledge on implementation and maintenance of Apache Httpd, SMTP, DHCP, NFS, NIS, NIS+, LDAP, DNS, Active Directory, SAMBA, SQUID, Postfix, Send mail, FTP, Remote Access, Security Management & Security troubleshooting skills.
  • Application deployment using Configuration management of AWS (Amazon Web Services) like VPC, EC2, S3 Buckets, Route53 DNS, RDS, EBS, ELB etc.
  • Worked in infrastructure team on installation, configuration and administration of CentOS 5.x/6.x/7, RHEL 5.x/6.x/7, Windows Server 2008-R2/2012-R2 and SUSE Linux 10.x/11.
  • Well versed with SQL Server, Oracle, DB2 and MySQL as back-end Databases. Extensively used database tools like TOAD and SQL Developer. Knowledge in Database Programming with Stored Procedures, Triggers, Functions using SQL, PL/SQL and Oracle.
  • Good working knowledge in IDE tools such as Eclipse (Indigo, Juno) NetBeans, RAD, JBuilder.
  • Experience NIC bonding/NIC Teaming configuration in Linux/UNIX/Windows/VMware systems to increase the bandwidth or redundancy based on requirement by the application.
  • Experienced in performing Functional Testing, Backend Testing, Regression Testing, System Testing, Acceptance Testing and Integration Testing.
  • Involved in writing JUnit test cases and System Test Cases.
  • Extensive use of Version Controls like CVS, SVN and GIT subversions.
  • Having Good experience in resolving production issues.

TECHNICAL SKILLS

  • SPLUNK 6.0.1, Splunk 6.2,6.3, Splunk 4.2.0, AppDynamics, Nagios, Dynatrace, iCinga, TFS, GIT, SVN
  • Windows NT, Unix/Linux (Red Hat), Windows 2000/XP,07, Red Hat Enterprise Linux, CentOS7, Ubuntu/Debian/FedoraWeb Technologies
  • HTML, CSS, DHTML, JavaScript, XML, XSL, XSLT
  • SQL, ORACLE, MySQL, SQL Server, DB2,PL/SQL, Oracle 11g
  • Java, UNIX shell scripting
  • SOAP and Restful
  • Jenkins

PROFESSIONAL EXPERIENCE

Confidential, Palm Beach, Florida

Sr. Splunk Admin/Developer

Responsibilities:

  • Installation and configuration of Splunk product at different environments. Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Install and maintain the Splunk adds-on including the DB Connect, Active Directory LDAP for work with directory and SQL database design.
  • Use the Search capability, configure App Dynamics to communicate with Splunk Server.
  • Create Splunk Search Processing Language (SPL) queries, Reports, Alerts and Dashboards.
  • Creating Reports, Pivots, alerts, advance Splunk search and Visualization in Splunk enterprise.
  • For Secure Network, we use VPN technology for developing to allow remote users and branch offices to securely access corporate applications and other resources. Provided technical services to projects, user requests and data queries.
  • Performed data conversions from flat files to a normalized database structure.
  • Created and maintained Indexes for various fast and efficient reporting processes.
  • Import & Export of data from one server to other servers using tools like Data Transformation Services (DTS) and bulk copy. Periodic monitoring of the system for bottlenecks.
  • Worked on Cloud Splunk as well as On Premise Splunk configuration clustered infrastructure
  • Worked on Amazon AWS, configuring, launching linux and windows server instances for splunk deployment
  • Updated security software to prevent database security threats.
  • Implemented system recovery procedures to minimize losses should an attack occur.
  • Reviewed system access data and monitored database access.
  • Updated cyber security protocol and developed effective training procedures.
  • Analyzed database growth, space requirement and User/Login Roles.
  • Managed test data and their updates between development and production databases and migrated stored procedures and database objects.
  • Compared the Logs in networking devices take them in to Splunk for find issues quickly.
  • Participated in Tools tribe meetings and gathered requirements from all SME's and developed dashboards for WIB, Bill pay, Navv app, www app.
  • Worked for getting data in managing Splunk apps. Assisted internal users of Splunk in designing and maintaining production-quality dashboards.
  • Knowledge on Parsing, Indexing, Searching concepts Hot, Warm, Cold, Frozen bucketing.
  • Maintained Splunk Environment with multiple indexers; managed and configured settings.
  • Created EVAL Functions where necessary to create new field during search run time.
  • Used Ifx, Rex and Regex commands for field extraction.
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Regex, Dashboards, Clustering and Forwarder Management
  • Identify pattern and trends that are indicators of routine problems.
  • Implemented forwarder configuration, search heads and indexing.
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Regex, Dashboards, Clustering and Forwarder Management.
  • Built dashboards, views, alerts, reports, saved searches using XML Search Processing language (SPL).
  • Analyzed and monitored incident management and incident resolution problems. Involved in transformation of IRS ETI user requirements into Splunk ITSI Use cases.
  • Created ITSI Dashboards/ Glass-Tables
  • Resolved configuration based issues in coordination with infrastructure support teams.
  • Created many Splunk ITSI Log Analytics artifacts describing IEP Services.
  • Maintained and managed assigned systems, Splunk related issues and administrators.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Splunkd process,using pipelines threads configured with XML. using cluster master component, it manages a cluster of indexers that multiple copies of data.
  • In Splunk Enterprise Security, Traffic search dashboard assists in searching network protocol data and using Network production domain for routers, switches and firewalls.
  • In SDLC process by correlating a task with DevOps teams for document changes and tasks. correlating this data with data from the planning process and build system security teams of a planned change. By correlating tickets with commits, pairing the data with the build system protects the business.
  • By using a data-driven approach to gain visibility into environment.
  • Using network, generating traffic shows results from the vulnerability scanners on the network.

Environment: Splunk 6.0.1, ITSI,Linux, UNIX, Oracle 11g, MS SQL Server 2012, SQL, XML, Java Script, MS Excel, MS Power Point.

Confidential

Sr. Splunk Admin/Developer

Responsibilities:

  • Installation and configuration of Splunk product at different environments.
  • Upgraded Splunk Enterprise from v 6.2 to v 6.5.2 in clustered environments and non-clustered environments.
  • Monitoring or analyzing the real-time events for the security devices like Firewall, IDS, Anti-Virus etc., using SIEM tools.
  • Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT operations and Application Development.
  • Analyzed security based events, risks and reporting instances correlating events from a Network, OS, Anti-Virus, IDS/ IPS, Firewalls or Proxies and analyzing them for possible threats.
  • Understand and interpret customer requirements for Splunk implementation for an enterprise solution.
  • Analyzed AWS configuration logs, AWS Cloud watch flow logs.
  • Worked on building data center with AWS. Installed SVN, GIT, Jenkins images on AWS.
  • Also worked in Installing, Configuring and Monitoring using Nagios.
  • Deployment automation, AWS EC2 instance mirroring, WebLogic domain creations and several proprietary middleware installations.
  • Designed an ELK (Elastic Logstash Kibana) system to monitor and search enterprise alerts.
  • Deployed and configured Elastic search, Log stash and Kibana (ELK) for log analytics, full text search, application monitoring in integration with AWS Lambda and X-Ray.
  • Provide deployment strategies with the understanding of affordable risk based on customer acceptance.
  • Develop dashboards with visual metrics for stakeholders.
  • Maintain the overall Splunk solution to include maintenance, enhancements and integration.
  • Created and configured management reports and dashboards.
  • Planned, implemented, and managed Splunk for log management and analytics
  • Monitor security violations, flag potential violations and logging security incidents in Service Now.
  • Handle issues with AppDynamics controller, agents or configurations.
  • Controller administrative activities like user management, application management, monitoring controller performance etc.
  • Validate the existing rules and provide recommendation on fine tuning the rules.
  • Weekly/Monthly incident analysis report. Analyzing the events and providing solutions for the incidents.
  • Involved in setting up alerts for a different type of errors, Data Enrichment using the lookups and Data
  • Interpretation using the Fields and Fields Extraction and performing Data Normalization using the tags.
  • Worked on Splunk architecture and various components (indexer, forwarder, search head, deployment Server), Heavy & Universal forwarder, and License model.
  • Maintained Splunk Environment with multiple indexers; managed and configured settings.
  • Improved search performance by configuring to search heads for all Indexes in production.
  • Analyzed security based events, risks and reporting instances.
  • Developed Splunk queries and dashboards targeted at understanding application performance and capacity analysis.
  • Worked for getting data in managing Splunk apps.
  • Assisted internal users of Splunk in designing and maintaining production-quality dashboards.
  • Splunk DB Connect 2.0 in search head cluster environments of Oracle.
  • Installation and implementation of several kinds of visualizations to Splunk dashboards.
  • Continuous monitored of the alerts received through emails to check if all the application servers and webservers are up.
  • Knowledge on Parsing, Indexing, Searching concepts Hot, Warm, Cold, Frozen bucketing.
  • Assisted in various projects related to Bay Dynamics and CASB and ingested splunk into their environment.
  • Conducted surveillance on various phishing emails and created alerts from future spam.
  • Worked as part of Cyber Security Incident Response team to check on malware virus and threat emails.
  • Developed Splunk Search Processing Language (SPL) queries, created Reports, Alerts and Dashboards and customized them.
  • Providing assistance from AppDynamics side for multiple application teams to troubleshoot production issues
  • Implemented Dynamic drilldowns that provide greater flexibility to the end user.

Environment: Splunk 6.x, Splunk DB Connect and other modules, Oracle WebLogic 9.x/10.x, Tomcat 5.x/6.x,AppDynamics, Oracle 9i/10g, Solaris 10, LINUX, Nagios, Sun ONE Directory Server 6, AWS, Sun One Web Server 6.0, Apache 2.x, Python.

Confidential - Bloomington, IL

Splunk Admin /Developer

Responsibilities:

  • Installing, Configuring and Administering Splunk Enterprise Server 6.0/6.3.2 and Splunk Forwarder 6.0 on Red hat Linux and Windows severs.
  • Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT Operations and Application Development.
  • Assisted with on boarding relevant data sources as needed, including inputs, SQL, index-time configurations, search-time field extractions, event types, and tags.
  • Troubleshooting and monitoring of various proprietary Acxiom and 3rd party applications using Splunk and Cloud Watch in the Amazon Web Services (AWS) environment.
  • Worked on Creating new EC2 instances on AWS (Amazon web services)
  • Installed, configured and managed the ELK (Elastic Search, Log stash and Kibana) for Log management within EC2 / Elastic Load balancer for Elastic Search.
  • Onboarding performance monitoring tools for GCRM applications.
  • Build performance dashboards through Splunk, Extra hop, writing Java script and customized scripts
  • Worked with internal clients to develop requirements, relationships and value metrics.
  • Expertise in Installation, Configuration, Migration, Trouble-Shooting and Maintenance of Splunk, Passionate about Machine data and operational Intelligence.
  • Developed best of breed performance and capacity planning metrics.
  • Managed existing application and created new applications (visual and non-visual).
  • Maintaining Data repository Data correlation and trending.
  • Involved in setting up and customizing AppDynamics for iVu and SFT modules
  • Created custom business transactions, data collectors, infopoints for iVu application in AppDynamics to monitor the performance of image search and retrievals
  • Maintain documentation of applications including what work has been done, what is left to do and site-specific procedures documenting the Splunk environment.
  • Work with application team and production support team to troubleshoot production performance and reliability issues
  • Developed scripts (Python Scripting, Java Scripting, Shell scripting, Perl Scripting) as needed in support of data collection, reporting and presentation requirements.
  • Independently identified opportunities to improve operational and other performance for Security, IT Operations and other clients.
  • Very good understanding of software development life-cycle (SDLC) process, followed Agile Scrum and story maps for dev tracking.
  • Involved in interacting with business owners, developers and business analysts in improving the application.
  • Involved in helping the UNIX and Splunk administrators to deploy Splunk across the UNIX and windows environment.
  • Helped the client to setup alerts for different type of errors.
  • Parsing, Indexing, Searching concepts Hot, Warm, Cold, Frozen bucketing.
  • Analyzed large datasets to identify metrics, drivers, performance gaps and opportunities for improvement.
  • Worked on large datasets to generate insights and communicate insights to guide strategic roadmap.
  • Used Splunk tool in order to analyze the logs in the applications.
  • Involved in handling various Incident and request related to the application.
  • Involved in installing and using Splunk app for Linux and UNIX.
  • Involved in developing complex scripts to automate batch jobs.
  • Manage Splunk configuration files like inputs, props, transforms, and lookups.
  • Worked on T SQL queries and altering and defining for related data bases.

Environment: Splunk 6.2, Splunk 6.1, Pivotal HD, Datameer, AppDynamics, Linux, Bash, Perl, Oracle 11g, Splunk Knowledge Objects.

Confidential

Splunk Admin /Developer

Responsibilities:

  • Maintained and administered GIT source code tool.
  • Created Branches, Labels and performed Merges in GIT.
  • Developed processes, tools, automation for Jenkins based software for build system and delivering SW Builds.
  • Troubleshooting and monitoring of various proprietary Acxiom and 3rd party applications using Splunk and Cloud Watch in the Amazon Web Services (AWS) environment.
  • Worked on Creating new EC2 instances on AWS (Amazon web services)
  • Implemented continuous integration using Udeploy.
  • Established Puppet Best practices approaches to systems deployment with other tools and managing Puppet as a unit of software deployment and independently version controlled.
  • Hosting and securing web pages using Apache (httpd) web server and ssl.
  • Installation and configuration of Linux for new build environment.
  • Managed build results in Jenkins and deployed using workflows.
  • Worked on building data center with AWS. Installed SVN, GIT, Jenkins images on AWS.
  • Also worked in Installing, Configuring and Monitoring using Nagios and GRAPHITE.
  • Deployment automation, AWS EC2 instance mirroring, WebLogic domain creations and several proprietary middleware installations.
  • Delivered specific versions of various components of an application into target environments.
  • Maintain and track inventory using Jenkins and set alerts when the servers are full and need attention.
  • Worked closely with developers and managers to resolve the issues during the deployments to different environments.

Environment: Git, Puppet, AWS, Windows Solaris, UNIX, Java, Eclipse 3.20, Ant, Maven, Jenkins, Apache, JBoss Application Server, CVS, Nagios, Splunk, MySQL.

Hire Now