Splunk Sme Resume
4.00/5 (Submit Your Rating)
PROFESSIONAL PROFILE:
- Having 6+ years’ experience in field of SIEM Information Security
- Experience in configuring, implementing, analyzing and supporting Splunk server infrastructure across Windows, UNIX and Linux.
- Experience with a variety of Operating Systems, Protocols and Tools depending on the type of platform or application to be administered.
- Implement Splunk solutions in highly available, redundant, distributed computing environments
- Gathering requirements and analysis by Interacting with team members and users during the design and development
- Designing and implementing Splunk - based best practice solutions.
- Planning, communicating clear instructions to team members; training, and direction.
- Capacity planning, optimization and architecture.
- Help manage the strategy of the Splunk Business Unit within the company.
- Expertise with Splunk UI/GUI development and operations roles.
- Configuration and troubleshooting across a variety of platforms.
- Deploy new Splunk instances, including clustered deployments and apps
- Integrating Splunk with a wide variety of legacy data sources and industry leading commercial security tools.
- Create and customize System & Splunk applications, search queries and dashboards.
- Create Splunk reports, dashboards, forms, visualizations, alerts.
- Optimize searches and implement post processing on dashboards.
- Assisting users to customize and configure Splunk to meet their requirements.
- Perform implementation of security and compliance-based use cases.
- Performing maintenance and optimization of Splunk deployments.
- Communicating with customer stake holders to include leadership, support teams, and system administrators.
- Technical writing/creation of formal documentation such as reports, training material and architecture diagrams.
- Build Key Performance Indicators to the Enterprise Architecture through Splunk.
- Build dashboards to monitor license, indexers, search heads.
- Maintain Splunk systems documentation, including SOP's and design documents Integration of systems and application tools with Splunk.
- Provide occasional presentations and thought leadership
- Experience in writing security related use cases and tuning based on false positives
- Good experience in creating Splunk apps, navigations, interfaces and good experience on Splunk lookups, macros, Pivot, data models, lookup files and their publication into
- Splunk. Network Monitoring, bandwidth and traffic monitoring through Splunk and SolarWinds.
- Knowledge on scripting language like python and java script.
- Performed Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions
- Experience with software development, system architecture, and/or database.
TECHINICAL SKILLS:
Splunk: Splunk 5.x and Splunk 6.x/7.x, Splunk Enterprise, Splunk on Splunk, Splunk DB Connect, Splunk IT Service Intelligence, Splunk Web Framework, Splunk UBA
Operating Systems: Windows, Unix/Linux.
Web technologies: HTML, CSS, JavaScript, XML, Advanced XML.
Concepts: SIEM, SDLC, Object Oriented Analysis and Design.
Programming Languages: C, Python, UNIX shell scripts.
Database: Oracle, MySQL, SQL queries, SQL Procedures.
PROFESSIONAL EXPERIENCE:
Confidential
Splunk SME
Responsibilities:
- Prepared, arranged and tested Splunk search strings and operational strings.
- Created and configured management reports and dashboards.
- Developed, evaluated and documented specific metrics for management purpose.
- Trained Splunk security team members for complex search strings and ES modules.
- Analyzed security based events, risks and reporting instances.
- Managed and maintained use cases into correlation systems.
- Designed, developed and implemented system engineering plans and technical support services.
- Executed systems programming activities and supported data center activities
- Developed Splunk infrastructure and related solutions as per automation toolsets.
- Installed, tested and deployed monitoring solutions with Splunk services.
- Provided technical services to projects, user requests and data queries.
- Implemented forwarder configuration, search heads and indexing.
- Supported data source configurations and change management processes.
- Analyzed and monitored incident management and incident resolution problems.
- Resolved configuration based issues in coordination with infrastructure support teams.
- Maintained and managed assigned systems, Splunk related issues and administrators.
- Develop custom Splunk ES correlation searches & tune notable events.
- Optimize and tune current dashboards.
- Create new dashboards based on new feeds and tune over a period.
- Correlate event logs to create more targeted dashboards and alerts.
- Set up advanced searches and reports.
- Create knowledge objects specific to SOC operations.
- Create prioritized list of assets within Splunk and related live dashboards and notification.
- Set up live data pull from external intelligence sites and integrate with correlation searches.
- Document Network Flows & create diagrams
- Weekly status reports on all work executed, deliverables developed/submitted, and work planned for next period
- Use-case development.
- Work with Audit and Assessment teams to validate controls and architecture deployment.
- Support the identification and documentation of data sources.
- Architecting and deploying clustered/distributed Splunk Enterprise 6.x implementations to large, complex customers.
- Administering Splunk and Splunk Apps to include developing new/custom Apps to perform specialized functionality.
- Integrating Splunk with a wide variety of legacy data sources and industry leading commercial security tools that use various protocols.
Confidential, NJ
Splunk Developer/Admin
Responsibilities:
- Involved in setting up alerts for different type of errors.
- Developed, evaluated and documented specific metrics for management purpose.
- Using SPL created Visualizations to get the value out of data.
- Created Dashboards for various types of business users in organization.
- Played a major role in understanding the logs, server data and brought an insight of the data for the users.
- Worked on DB Connect configuration for Oracle, MySQL and MSSQL.
- Supporting migration from Splunk On Premise data center to Amazon AWS
- Launching, Configuring, Supporting large scale instances on AWS
- Monitored Database Connection Health by using Splunk DB connect health dashboards.
- Created Crontab scripts for timely running jobs.
- Developed build scripts, UNIX shell scripts and auto deployment processes.
- Provided technical services to projects, user requests and data queries.
- Involved in assisting offshore members to understand the use case of business.
- Assisted internal users of Splunk in designing and maintaining production-quality dashboard
- Involved in writing complex IFX, rex, combine command to extracts the fields from the log files.
- Involved in helping the UNIX and Splunk administrators to deploy Splunk across the UNIX and windows environment.
- Helped the client to setup alerts for different type of errors.
- Worked to ensure Splunk is actively and accurately running and monitoring on the current infrastructure implementation.
- Involved in installing and using Splunk app for Linux and Unix.
- Consulting with customers to customize and configure Splunk in order to meet their requirements.
- Performing advanced searching and reporting to help customers with the implementation specialized/custom dashboards.
- Performing maintenance and optimization of existing clustered Splunk deployments.
- Communicating with customer stake holders to include leadership, support teams, and system administrators.
- Designs, implements, configures, and manages solutions within the supported Linux technologies, products, and services.
- Research and recommend innovative and automated approaches for operational tasks which leverage available resources and simplify operational overhead.
- Develop, implement, and execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/Log Management platforms
- Technical writing/creation of formal documentation such as reports, training material, slide decks, and architecture diagrams.
- Building Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions.
- Creating, maintain, support, repair, customizing System & Splunk applications, search queries and dashboards.
- Parsed, Indexed, Searched concepts Hot, Warm, Cold, Frozen bucketing.
- Created tags, Event types, field lookups, using regular expressions, aliases etc. for search-time outputs and visualizations.
Confidential, Sanford, NC
Splunk Developer/Admin
Responsibilities:
- Provide technical inputs, evaluate and recommend new and emerging security products and technologies
- Defines security configurations for threat detection and prevention tools
- Designs automated workflows to streamline security operations
- Monitors and proactively manages supported products and services to assure their performance, availability, security, and capacity.
- Researches, analyzes, and formulates recommendations regarding technologies, products, and solutions to fulfill requirements within the enterprise.
- Security tool administration and support (Network/Endpoint/Threat Hunting/Investigations)
- Tool deployment and implementation experience on a global scale
- Splunk Admin and Architecture related tasks
- Ability to debug configuration issues on different splunk components
- Understanding of Splunk configurations, dependencies, and forwarder management
- Understands Splunk architecture and components (search head, deployment server, cluster master, indexers, forwarders (HF/UF)
- Strong understanding of enterprise logging using syslog-ng, with a focus on security event logging
- Knowledge of system and network architecture and interrelationships (technical and functional).
- Integrate and customize Splunk apps
- Ingest logs into Splunk from databases and applications (includes non-COTS applications); develop custom parsers as needed
- Create Knowledge Objects (dashboards, alerts, reports, field extraction, data models, workflow actions, CSV, and external lookups)
- Tune Splunk to optimize performance
- Troubleshoot issues related to searching, licensing, and errors
- Help setup Splunk User Behavior Analytics (UBA).
- Support upgrades, deployments, and modifications to Splunk and all Splunk architecture
- Technical Writing Document the Splunk deployment and configuration (architecture documentation & diagrams).
Splunk Developer
Confidential
Responsibilities:
- Installation and configuration of Splunk product at different environments.
- Assisted internal users of Splunk in designing and maintaining production-quality dashboard.
- Create Dashboard Views, Reports. lookups and Alerts for events and configure alert mail
- Create Splunk apps for consuming data for applications and implement apps.
- Involved in setting up alerts for different type of errors.
- Assigning User and role authentication including LDAP authentication and scripted authentication.
- Fetching the data from databases using "DB Connect Application
- Responsible for administering, maintaining and configuring a 24 x 7 highly available, Splunk apps for production portal environment.
- Hands on development experience in customizing, visualizations, configurations, reports and search capabilities using customized Splunk queries.
- Created Regular Expressions for Field Extractions and Field Transformations in Splunk
- Managed Indexer Clusters including security, hot and cold bucket management and retention policies.
- Worked on Various types of charts, alerts settings, app creations, user and role access permissions.
- Work closely with Application Teams to create new Splunk dashboards for Operation teams.
- Field Extraction, Using Ifx, Rex Command and Regex in configuration files