We provide IT Staff Augmentation Services!

Splunk Admin/ Siem Consultant / Information Security Resume

3.00/5 (Submit Your Rating)

Fort Lauderdale, FL

PROFESSIONAL SUMMARY:

  • Certified and Experienced SIEM Engineer and Splunk Analyst with more than eight years of IT experience with a focus on designing, deploying and analyzingsecurity solutions.
  • Experience in Security Incident handling, SIEM using Splunk and IBM Q - radar products
  • Involved in Integration of Q-radar SIEM with RSA Envsion, Splunk and HP Arc Sight.
  • Project involves security event monitoring, analysis, triage incident alerting and reporting using Q-radar, Splunk,HP Arc Sight and more SIEM tools.
  • Knowledge on cleaning up log auto-discovered sources in Q-radar by identifying duplicates, correcting mis-identified log sources, and identifying log sources from their logs.
  • Expert Understanding to develop the complex Use Cases, Universal device support Modules on the Q-radar SIEM
  • Proven ability in identifying various network security vulnerabilities and explain in detail how to remediate the identified vulnerabilities.
  • Strong troubleshooting, reasoning, problem-solving skills, flexible and able to deliver quality results.
  • Hands-on experience writing correlation rules based on business use cases independently.
  • Experience in developing the complex Use Cases, Universal device support Modules (UDSM) for non-supportable logs on the Q-radar SIEM.
  • Good experience in handling security incident response.
  • Experience developing strategic plans for agency-wide implementation to address the operations of client services, product support, and quality assurance.
  • Expertise in conducting investigations of Security violations and breaches and recommending solutions; preparing reports on intrusions as necessary and providing analysis summary to management.
  • Proven ability in identifying various network security vulnerabilities and explain in detail how to remediate the identified vulnerabilities.
  • Maintained up-to-date procedures and documentation to support IT security processes.
  • Strong troubleshooting, reasoning, problem-solving skills, flexible and able to deliver quality results.
  • Monitored and responded to network intrusions and vulnerability alerts raised by automated detection systems, internal and external reports and manual investigation, using tools such as snort IDS.
  • Expertise in conducting investigations of Security violations and breaches and recommending solutions; preparing reports on intrusions as necessary and providing analysis summary to management.

TECHNICAL SKILLS:

SIEM Tool: IBM Q-radar, Splunk, IBM Guardium, Tripwire., HP ArcSight, Nessus, WebSense

Windows based Operating Systems: Windows 2000, XP,7,8,10, Windows Server 2008. 2012

Unix/Linux based operating Systems: Red Hat, Ubuntu, Kali Linux, VM Ware

Security / Vulnerability Tools: Snort, Wireshark, Websense, Bluecoat, Palo Alto, Checkpoint, Symantec, Qualys Vulnerability Manager, FireEye HX, Sophos, Sourcefire

PROFESSIONAL EXPERIENCE:

Splunk Admin/ SIEM Consultant / Information Security

Confidential, Fort Lauderdale, FL

Responsibilities:

  • Designed and implemented various enterprise level UNIX - based systems
  • Designed and implemented Server management tools for monitoring system and network performance, file integrity, and IDS policy management
  • Conduct periodic network, system, application, and physical security audits
  • Maintain a set of policy documents, security standards, and process and procedure documents for the Technologies Division
  • Responsible for monitoring and, providing analysis in a 24x7x365 Security Operation Center (SOC) using various SIEM(Splunk), IDS/IPS software tools.
  • Responsible for Data loss prevention (DLP) and service interruptions.
  • Exposure to wild fire advance malware detection using IPS feature of Palo Alto.
  • Monitor critical infrastructure including firewalls, IDS/IPS devices, virtual networks, vulnerability scanners, VPNs, WANs, and disaster recovery sites
  • Managed and maintained various network security systems including firewalls, IDS systems, central authentication systems, application proxies, and general support systems
  • Engineering, configuring and deploying Enterprise SIEM/SEM solutions.
  • Manage Splunk (SIEM) configuration files like inputs, props, transforms, and lookups. Upgrading the Splunk Enterprise and security patching.
  • Initiated projects to create disaster recovery plans for identified gaps.
  • Established disaster recovery plan testing and auditing cadence.
  • Create policies, alerts and configure using SIEM tools (Splunk )
  • Assisted Intelligence Team with indicators associated with different Actor groups to combat cyber-attacks.
  • Uses security measures and information collected to identify, analyze and report system events in Splunk(SIEM) that occur within the network.
  • IPS/ IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false positives.
  • Monitoring network traffic for security events and perform triage analysis to identify security incidents.
  • Investigate meta data using RSA Netwitness.
  • Leveraged Cisco ThreatGrid sandbox to analyze and collect behavior indicators for suspicious URL and files.
  • Manage Splunk(SIEM) configuration files like input, props, transforms etc.
  • Upgrading the Splunk(SIEM) Enterprise and security patching.
  • Well versed in both remote and on-site user Splunk (SIEM) Support
  • Centralizing the storage and interpretation of logs using Splunk(SIEM) System.
  • Maintained Standard Operating Procedures (SOPs) and training documentation
  • Served as the primary technical support for tier3 analyst(Security patching, TAC cases)
  • Tested new security tools/products and make recommendations of tools to be implemented in the SOC environment.
  • Monitored Security Management Console for Security Operation Centre (SOC) for ensuring confidentiality, Integrity and Availability of Information systems.
  • Work on task assigned by leadership that involves coordination with other departments.
  • Create procedures and Knowledge Base documents.

Splunk Developer/Admin

Confidential, Seattle, WA

Responsibilities:

  • Install, configure and administer Splunk Enterprise Server 6.x.x and Splunk Forwarder6.x.x on Red hat Linux.
  • Setup Splunk Forwarders for new application tiers introduced into environment and existing applications.
  • Work closely with Application Teams to create new Splunk dashboards for Operation teams.
  • Troubleshooting and resolve the Splunk - performance, search poling, log monitoring issues; role mapping, dashboard creation etc.
  • Worked with McAfee products to maintain the environment, determine new deployment opportunities and provide feedback to other operational teams.
  • Designing and implementing Splunk-based best practice solutions. Requirement gathering and analysis. Interacted with team members and Business users during the design and development of the application.
  • Expertise with Splunk UI/GUI development and operations roles.
  • Data collection from various systems/servers, Forwarder Management, creating and managing Splunk apps.
  • Worked on data model relationships in underlying raw data and making it more meaningful and useful to quickly generate charts, visuals and dashboards using pivot.
  • Building Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions.
  • Implemented Agile (Scrum) QA methodologies.
  • Responsible for verifying business requirements, ETL Analysis, ETL test and design of the flow and the logic for the Data warehouse using Informatica and Shell Scripting.
  • Extensively worked on creation of range maps for various SLA conditions by using all kinds of Splunk 6.x Dashboard Examples.
  • Wrote different SQL queries based on ETL mapping to verify ETL process between different Environments as well as different Stages of ETL process.
  • Publishing data into Splunk through configurations such as inputs.conf, severclass.conf, server.conf, apps.conf and Outputs.conf configurations
  • Configurations with deployment server, indexers, search heads, serverclass.conf, server.conf, apps.conf, props.conf, transform.conf, forwarder management configurations.
  • Created and triggered various dropdowns and drilldowns by using Splunk static Lookups.
  • Installed, Configured, implemented various visualization Add-ons to the developed and developing dashboards.
  • Created a drilldown of navigations from one Splunk app to the other app.
  • Review and apply any newly available and applicable SPLUNK software or policy updates routinely.
  • Assist with design of core scripts to automate SPLUNK maintenance and alerting tasks.
  • Support SPLUNK on UNIX, Linux, and Windows-based platforms. Assist with automation of processes and procedures.
  • Maintain current functional and technical knowledge of the SPLUNK platform and future products.
  • Help to document best practices in developing and using SPLUNK.
  • Implemented Post processing method for searches in dashboards.
  • Extensively worked on building of range maps for various SLA conditions by using all kinds of Splunk 6.x Dashboard Examples.
  • Monitor the applications and server infrastructure for optimization, performance and Utilization metrics.
  • Configured Alerts and notifications on various thresholds, SLAs for Personal Insurance Architecture team.
  • Doing Team leading, deeper analysis of data using event correlations across indexes and various source types to generate custom reports for senior management.
  • Providing Training to senior management, developers and Splunk Object End-users, Documentation, and communications on future upgrades.

Splunk Engineer

Confidential, Norwalk, CT

Responsibilities:

  • Performed Splunk administration tasks such as installing, configuring, monitoring and tuning.
  • Install and maintain the Splunk add-on including the DB Connect 1, Active Directory LDAP for work with directory and SQL database.
  • Installed and configured Splunk DB Connect in Single and distributed server environments.
  • Configure the add-on app SSO Integration for user authentication and Single Sign-on in Splunk Web.
  • Automating in Splunk using Perl with Service-Now for event triggering.
  • Deployed Splunk updates and license distribution over multiple servers using a deployment server.
  • Create Dashboard Views, Reports and Alerts for events and configure alert mail.
  • Monitor the Splunk infrastructure for capacity planning and optimization
  • Server monitoring using tools likes Splunk, Solarwinds-Orion, HP BSM and HP Open View.
  • Integrated Service Now with Splunk to generate the Incidents from Splunk.
  • Active monitoring of Jobs through alert tools and responding with certain action logs, analyses the logs and escalate to high level teams on critical issues.
  • Configured and administered Tomcat JDBC, JMS and JNDI services.
  • Configured Node manager to remotely administer Managed servers
  • Experience in handling network resources and protocols such as TCP/IP, Ethernet, DNS
  • Splunk configuration that involves different web application and batch, create Saved search and summary search, summary indexes.
  • Splunk search construction with ability to create well-structured search queries that minimize performance impact.

Information Security

Confidential

Responsibilities:

  • Investigated potential or actual security violations or incidents to identify issues and areas that required new security measures or policy changes.
  • Investigated and identified multiple attack vectors, like malware, brute force, SQL injection, ransomware attack.
  • Collected, analyzed and preserved the evidence related to ATA.
  • Collected the logs of all the network devices and analyzed the logs to find the suspicious activities.
  • Investigated the security logs, mitigation strategies and responsible for preparing Generic Security incident report.
  • Ensured that the IT Security guidelines were effectively implemented to protect or identify threats and took appropriate counteractions.
  • Handled tickets with Resilient and co-relating them to provide good incident response system.
  • Worked as a part of Security Operations Centre in Intrusion Analysis Team for managing and monitoring IPS/IDS devices across corporate locations.
  • Monitored various event sources for possible intrusion and determine the severity of the threat.
  • Monitored intrusion attempts on internal/external network and devices, analyzing and responding to security incidents in a proactive manner.
  • Identified vulnerabilities and security threats, using various tools and provided a complete fix.
  • Conducted network vulnerability assessments to identify system vulnerabilities.
  • Collaborated with other departments in investigations for HIPPA and PCI violations.
  • Installed and configured Symantec Enterprise Anti-Virus.
  • Logged, monitored response concepts and technologies for cloud networks, corporate networks, and hosts in all environments.
  • Worked with SOC team to ensure in corporation of security activities in an ongoing project and to identify security impact of new releases.
  • Developed, implemented, and maintained employee database for multiple departments.
  • Worked with global security team for the Server Compliance and risk management.
  • Maintained and developed key documentation and reports in alignment with company standards.

We'd love your feedback!