Sr. Splunk Administrator And Developer Resume
TX
SUMMARY:
- Upgrade and Optimize Splunk setup with new discharges. Setup Splunk Forwarders for new application levels brought into environment.
- Created Splunk app for Enterprise Security to identify and address emerging security threats through the use of continuous monitoring, alerting and analytics.
- Created Situational awareness dashboards to give custom views of risk per domain, asset, or identity.
- Experience with Linux and Windows specialists for Splunk organization with a strong comprehension of the Splunk framework.
- Involved in source code organization instruments like CVS, SVN and Git. Presentation to outline organization gadgets like Puppet.
- Hands on association in sending, testing and sponsorship of full life cycle utilization of diverse J2EE/Internet/Intranet and passed on applications.
- Screen the Splunk system (Identify terrible missions, dashboards and general wellbeing of Splunk) and collaborate with individual gatherings to upgrade execution.
- Incident Review provide analysis workflows that reveal the priority of the incident, incident context, and impact on assets and identities.
- Experience in Shell scripting and Python Scripting (Jython).
- Worked broadly on firm wide Enterprise Releases and DR events.
- Correlation tools enable monitoring for new attackers by correlating new domain registration with web activity
- Involved in SiteMinder Web Agent foundation and outlining the Web Agent on Web Server cases.
- Phenomenal working aptitudes in improvement and looking at of Enterprise Applications using gadgets like CA Wily Introscope, Tivoli Performance Monitor/WAS Resource analyzer and Garbage Collector Tool, Tivoli Enterprise server watching.
- Phenomenal aptitudes on examining and issue determination of HTTP/System/ Network related issues including watching, extension arranging and backing by giving 24X7 sponsorship available if the need emerges to all mission essential applications.
- Composed Project Management errands, oversaw and lead WebSphere related system wanders.
TECHNICAL SKILLS:
Log Analysis Tool: Splunk Enterprise Server 4.x.x/5.x.x/6.x.x, Splunk Universal Forwarder 4.xx/5.xx/6.xx
Web/App Servers: Web Sphere Application Server 5.0/6.x/7.x/8.x, Web Sphere MQ Sever 6.x/7.x, WebSphere XD 6.0/6.1, IBM Http Server 6.x/7.x/8.x, Apache Web Server 2.x, Tomcat 5.5, IIS 6/7.x
Operating Systems: IBM AIX (5.1/6.1), RHL Linux, Windows Server 2003/2008 R2, VMWare
Programming: Java, J2EE, C++, C, SQL/PL SQL, HTML, DHTML, XML.
Scripting: JACL, Jython, WSCP, WSADMIN, Korn Shell Script, Perl, JavaScript, CSS, Batch
Databases: Oracle (8i/9i), UDB/DB2, Sybase, MS SQL Server, IBM DB2
Monitoring tools: Wily Introscope 8.x/9.x, Tivoli, BSM Topaz, Tivoli Performance Veiwer, NMON (AIX), IBM Thread and Heap Analyzers
Networking: TCP/IP Protocols, Socket Programming, DNS.
Frame work: MVC, J2EE Design Patterns, Struts.
IDE: Eclipse, RAD 7, Net Beans, Edit plus, TOAD
Others: Site Minder r6/r12/r12.5, Ping Federate 6.X,7.X
PROFESSIONAL EXPERIENCE:
Confidential, TX
Sr. Splunk Administrator and Developer
Responsibilities:
- Designed, deployed and implement SplunkEnterprise for monitoring and alertingfor different servers for SOA team.
- Configured Splunk DB connect v2 application to monitor queries for Siebel team.
- Created educational videos material for review auditing and resolution workflow for Middleware SOA Team on how to use Splunkcustom searches dashboards, alerts, reports field extractions and event types to quickly resolve issues and track workflow of events by analyst.
- Use techniques to optimize searches for better performance, Search time vs Index time field extraction.
- Worked with datapower team to integrate APIM with Splunk using REST API modular inputs and python scripts.
- Field Extraction: Using IFX, Rex Command and REGEX in configuration files, knowledge of EXTRACT keyword, sed
- Configured Splunk WebLogic app to monitor and troubleshoot WebLogic Server (WLS) infrastructure by dynamically collecting data from various sources within your WLS environment and interacts with AdminServer(s) as well as Managed and Unmanaged nodes.
- Used summary indexing to pre - calculate the values that used most in reports. Created scheduled searches accelerated dashboards for searching large data sets.
- Customizing simple XML using custom CSS stylesheets and Javascript files .
- Created Splunk app for Enterprise Security to identify and address emerging security threats through the use of continuous monitoring, alerting and analytics.
- Created Timewrap Command to compare results week-over-week or any given day.
- Created Dashboards to web application Admins to show user flow from beginning to end. Admin will just give input in search field and selects time period.
- Created Search commands like stats, chart, time chart, transaction, strptime, strftime, eval, where, xyseries, table etc. Tag, Event types and difference between event stats and stats. Time chart attributes such as span, bins
- Created Shell Scripts to install Splunk Forwarders on all servers and configure with common configuration files such as Bootstrap scripts, Outputs. conf and Inputs. conf files
- Work closely with Application Teams to create new Splunk dashboards for Operation teams.
- Monitor the Splunk infrastructure (Identify bad searches, dashboards and overall health of splunk) and collaborate with respective teams to improve performance.
- Reduced license costs by sending all unnecessary log events to “nullQueue” configured in props and transforms file.
- Configuration files, precedence and working: Props.conf, transforms. conf, inputs.conf, outputs.conf, Setting up a forwarder, Monitor stanza in inputs.conf and 3 basic fields in Splunk at index time
- Extensively involved in troubleshooting the issues and document the problem resolutions for future references. Experienced in attending the bridge calls for production issues and non-prod issues and involved application teams or database teams or networking teams to resolve the issues and involved in Root cause analysis for the issues encountered. Also provided 24/7 on call support for all the production applications.
Environment: Splunk Enterprise Server 4.x.x/5.x.x/6.x.x, Universal Splunk Forwarder 4.x.x/5.x.x/6.x.x, RedHat Linux, IBM HTTP web server 6.1/7/8, Oracle, HACMP 5.4, HTML, Java Script, XML, Wily Introscope 9.x, IIS 7, Windows 2003, Windows 2008 R2, Python (Jython), Use of Regular expressions.
Confidential, VA
Sr Splunk Administrator and Developer
Responsibilities:
- Construct pursuits, reports and APP's that work towards exploiting Splunk's abilities.
- In charge of concentrated sending, design and administration of Splunk circulated environment comprising of search heads, indexers overwhelming forwarders and all-inclusive forwarders.
- Dissect and associate information, into a proactive summary of operational frameworks wellbeing, perform inconvenience shooting and underlying driver examination of occasions.
- Work with application groups and care groups to dissect, relate information, perform security legal sciences and focus main driver examination of occasions.
- Design, execute and keep up 20 Splunk servers on Linux and Window OS over 3 situations for log accumulation and investigation for different inner groups which included cautions dashboard and reporting.
- Install different Splunk Applications, for example, Cisco for Splunk, Windows for Splunk, VMware for Splunk.
- Supporter and execute arrangements considering a full information lifecycle (Search & Investigate, Add Knowledge, Monitor & Alert, Report & Analyze).
- Add to a six sigma venture to accept well performing Splunk situations and help distinguish and investigate underperformance.
- Plan, measure and send new Splunk situations.
- Guarantee high accessibility & execution trough flat scaling and burden adjusted segments.
- Work towards accomplishing a speedier ROI and keeping up partners persuaded of the worth and undiscovered open doors in Splunk.
- Protracted experience investigating execution issues, blunders, notices, blocked lines, the information pipeline and its processors.
- Gathering different wellsprings of syslog and XML information from different gadgets, applications, and information bases.
- Streamline investigating by recording basic utilization cases and outlining applications and dashboards around them.
- Finished Splunk Architect training camp preparing and booked affirmation.
- Create execution investigating focused application to be shared on Splunk base. Create prescient investigation observing abilities.
Environment: Splunk Enterprise Server 5.1.2, Splunk Forwarder 5.1, 5.4, XML, VMware.
Confidential, FL
Splunk and WebLogic Administrator
Responsibilities
- Extracted complexed Fields from different types of Log files using Regular Expressions.
- Created Search Commands to retrieve multiline log events in the form Single transaction giving Start Line and End Line as inputs.
- Installed, administrated and configured of WebLogic Application Server 8.1.
- Configured and Maintained JDBC, JMS, JNDI and other J2EE Services with WebLogic server.
- Deployed Applications (WAR, JAR, EAR) in Domain and Clustered environments achieving High Availability and Fail-over functionality.
- Configured Secure Sockets Layers (SSL) for data encryption, client authentication and Two Way SSL for Web logic 8.1 using Key tool.
- Configured Apache and Sun ONE web servers as proxy for WebLogic 8.1.
- Performed Load Balancing, Performance Tuning and optimization for WebLogic server.
- Auditing (Performance, Scalability) Applications and Application Servers.
- Configured Node manager for administering Managed Servers.
- Configured of JDBC connection pools and Data sources, Troubleshooting and fixing up issues.
- Monitored BEA WebLogic Server using tools such as Simple Network Management Protocol (SNMP) and Java Management Extensions (JMX).
- Automated the Deployment process of J2EE applications in WebLogic Server 8.1 using WLST, UNIX Shell Scripts and WebLogic Deployed utility.
- Performed Performance tuning of JVM heap size, GC, Java stack trace analysis.
- Designed an entire messaging interface and Message Topics using WebLogic JMS.
- Performance Analysis of WebLogic 8.1 Server using Load Runner.
- Review and modification of Unix Scripts used for batch jobs.
- Shell and Perl Scripting for automation of administration tasks.
- Provided 24/7 on call support in both testing and production environments
Environment: Splunk Enterprise Server 5.x.x, Splunk Forwarder 4.x, 5.x, Shell, Python Scripting, Splunk
Confidential, CT
Java Developer
Responsibilities:
- Involved in the analysis, design, implementation, and testing of the project.
- Implemented the presentation layer with HTML, XHTML and JavaScript.
- Developed web components using JSP, Servlets and JDBC.
- Implemented database using SQL Server.
- Worked on designing the content and delivering the solutions based on understanding the requirements.
- Efficiently dealt with exceptions and flow control.
- Worked on Object Oriented Programming concepts.
- Worked with designers, architects, developers for translating data requirements into the physical schema definitions for SQL sub-programs and modified the existing SQL program units.
- Involved in the designing of the Application, and various design patterns.
- Designed tables and indexes.
- Wrote complex SQL and Stored procedures.
- Involved in fixing bugs and unit testing with test cases using JUnit.
- Developed user and technical documentation.
- Used Eclipse for writing code and CVS for version control.
Environment: Java, JSP, Servlets, JDBC, JavaScript, MySQL, JUnit, Eclipse IDE.