We provide IT Staff Augmentation Services!

Splunk Sme/content Developer Resume

3.00/5 (Submit Your Rating)

Edison, NY

PROFESSIONAL PROFILE:

  • Splunk Certified User with 5+ years of experience in Information Technology field with strong experience as Splunk Developer/Admin, Enterprise Security (ES)
  • Strong experience with Splunk 5.x and 6.x/7.x product, distributed Splunk architecture and components including search heads, indexers and forwarders.
  • Experience in Operational Intelligence using Splunk.
  • Headed Proof - of-Concepts (POC) on Splunk Enterprise Security App implementation, mentored and guided other team members on understanding the use cases in Splunk.
  • Expertise in customizing Splunk for Monitoring, Application Management and Security as per customer requirements and industry best practice.
  • Analyzed security based events, risks and reporting instances. Implementation of medium scale Splunk ES architectures.
  • Implemented workflow actions to drive troubleshooting across multiple event types in Splunk.
  • Expert in installing and configuring Splunk forwarders on Linux, UNIX and Windows.
  • Expert in installing and using Splunk apps for UNIX and Linux (Splunk nix) .
  • Dashboard creation for various use cases required for real time monitoring of various infrastructure & the cyber security of the organization on Splunk.
  • Knowledge on all Configuration files in Splunk (props.conf, Transforms.conf, Outputs.conf)
  • Worked on large datasets to generate insights by using SPLUNK.
  • Production error monitoring and root cause analysis using SPLUNK.
  • Automation of day to day Cyber Security Operations task using Python, PowerShell & Shell Scripting
  • Debug Splunk related and integration issues.
  • Build, customize and deploy Splunk apps as per internal customers
  • Splunk UI experience and able to debug expensive search queries.
  • Configured Clusters for load balancing and fail over solutions.
  • Designed, developed and implemented multi-tiered Splunk log collection solutions.
  • Worked on Splunk Cloud as well as On Premise Splunk configuration clustered infrastructure
  • Design, Deploy, and Support enterprise Splunk logging application. Assist other enterprise instances as Splunk Subject Matter Expert SME.
  • Creating accurate reports, Dashboards, Visualizations, Elastic search and Pivot tables for the business users.
  • Experienced in SHELL scripting, BASH scripting, PYTHON and Splunk apps like dbconnect
  • Performed Splunk queries by Splunk Search Processing Language (SPL) and Regular expressions
  • Performed Field Extractions and Field Transformations using the Regular Expressions in Splunk
  • Implemented a Log Viewer Dashboard as a replacement for an existing tool to view logs across multiple applications hosted on a PaaS setup.
  • Time chart attributes such as span, bins, & Tags, Event types, Scheduled searches - inline search vs scheduled search in a dashboard.

TECHNICAL SKILLS:

Splunk: Splunk 5.x and Splunk 6.x/7.x, Splunk Enterprise, Splunk on Splunk, Splunk DB Connect, Splunk IT Service Intelligence, Splunk Web Framework, Splunk UBA

Operating Systems: Windows, Unix/Linux.

Web technologies and frameworks: JAVASCRIPT, JQUERY, PHP, HTML, CSS Security tools Port scanning tools, Vulnerability and penetration tools, ArcSight, Snort, kali, NGFW, WebInspect, Burp-suite, ZAP

Computer Networking and Protocols: CISCO IOS, VLAN, Firewalls, IDS/IPS, TCP/IP, Routing protocols, VoIP protocols

Programming Languages: C, Python, UNIX shell scripts.

Database: Oracle, MySQL, SQL queries, SQL Procedures.

Standards: Confidential, ISO 270001,270002, HIPPA

PROFESSIONAL EXPERIENCE:

Splunk SME/Content Developer

Confidential, Edison, NY

Responsibilities:

  • Worked on Multiple Production Roles and Created Alerts with Using of Splunk, Also Created Multiple dashboards and Alerts at a time.
  • Involved in Installation, Administration and Configuration of Splunk Enterprise and integration with local legacy systems.
  • Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Created Splunk Search Processing Language (SPL) queries, Reports, Alerts, and Dashboards.
  • Created KV stores optimized for Splunk real time performance and responsible for managing & troubleshooting MongoDB to model the data for correlation searches.
  • Created a dynamic lookup with a python scripting in Splunk.
  • Workaround Implementation and automation of Shell and Python scripts.
  • Created alerts and calling a python script when that alert gets triggered.
  • Responsible to map the data fields as per the respective technology/domain into compatible field formats & knowledge objects using Common Information Model.
  • Responsible for correlation of data from different domains to derive inference & correlation analytics as a part of this job activity.
  • Writes the REGEX expressions for extractions etc
  • Created EVAL Functions where necessary to create new field during search run time. Used Ifx, Rex and Regex commands for field extraction
  • Troubleshooting and resolve the Splunk performance, search poling, log monitoring issues, role mapping, dashboard creation etc.
  • Established indexes and retention policy of buckets; developed user roles to complement operational and security utilization. Set-up common source types using pre-trained datasets and constructed source types of unique data.
  • Created custom built Splunk App & Add-ons include multiple custom-built client-oriented dashboards, reports, visualizations, data models, summary indexes and Alerts.
  • Creating Regular Expressions for Field Extractions and Field Transformations in Splunk.
  • Experience in WebLogic Application Server, Administration including installing, configuring, migrating, load balancing, deploying applications, performance tuning, upgrading, and maintenance of WebLogic Server.
  • Create policies, alerts and configure using Splunk
  • Uses security measures and information collected to identify, analyse and report system events in Splunk that occur within the network.
  • IPS/ IDS monitoring and analysis, analyse network traffic, log analysis, prioritize and differentiate between potential intrusion attempts and false positives.
  • Involved in Performing all upgrades and hot patches for McAfee SIEM (Nitro).
  • Upgrading the Splunk Enterprise and security patching. Installed and configured different Splunk apps and add-ons on Splunk platform.
  • Scripted SQL Queries in accordance with the Splunk.
  • Splunk technical implementation, planning, customization, integration with big data.
  • Knowledge about Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model.
  • Splunk configuration that involves different web application and batch, create Saved search and summary search, summary indexes.
  • Worked on python scripting for Rest API's.
  • Worked on log parsing, complex Splunk searches, including external table lookups.
  • Use techniques to optimize searches for better performance, Search time vs Index time field extraction. And understanding of configuration files, precedence and working.
  • Worked on configuration files inputs. conf, indexes. conf, props. conf, serverclass. conf, transforms. conf and limit.conf.
  • Created dashboards and reports performance optimization. Working knowledge of scripting languages
  • Expertise on most of the Linux command-line commands and shell scripting. And scripting for automation, and monitoring using Shell, Python scripts.
  • Upgrading and Migrating the Splunk Components and setting up the Retention Policy for the indexes.
  • Configuring LDAP and Single Sign-On for User Authentication in the organization.
  • Configured Splunk for all the mission critical applications and using Splunk effectively for Application troubleshooting and monitoring post go lives.
  • Designing and maintaining production-quality Splunk dashboards.
  • Parsed, Indexed, Searched concepts Hot, Warm, Cold, Frozen bucketing.
  • Created tags, Event types, field lookups, using regular expressions, aliases etc. for search-time outputs and visualizations.
  • Created Saved searches and summary search, summary indexes. Managing indexes and cluster indexes, Splunk web framework, data model and pivot tables.
  • Performed troubleshooting and/or configuration changes to resolve Splunk integration issues.

Splunk Content Developer/Admin

Confidential, New Jersey

Responsibilities:

  • Developed Splunk infrastructure and related solutions as per automation toolsets.
  • Implemented forwarder configuration, search heads and indexing.
  • Created Dashboards, report, scheduled searches and alerts, SIEM searches and alerts Metrics.
  • Use Splunk Enterprise Security to configure correlation search, key indicators and risk scoring framework.
  • Created Splunk app for Enterprise Security to identify and address emerging security threats using continuous monitoring, alerting and analytics.
  • Created Compliance Security Baseline dashboard for Tripwire and compliance with Storage, Database Server, Workstation and Server.
  • Created Compliance dashboard for HP-NA and Compliance with Network Devices.
  • Created Compliance Security Baseline and Vulnerability Assessment dashboard for IBM Guardium Security for Database Server and Database Instances.
  • Creating Vulnerability Assessment dashboard using Rapid7, Joval that aggregates data across multiple services to identify critical threats and proactively mitigate risks.
  • Integrate Service Now with Splunk to generate the Incidents from Splunk and extracts all CMDB Data from ITAM.
  • Created Apps for Security Engineering Team for Dashboards of Dashboard.
  • Created Service Account for compliance check.
  • Prepared, arranged and tested SPLUNK search strings and operational strings.
  • Analyzed RSA (Netwitness) security based events, risks and reporting instances.
  • Developing custom web application solutions for internal ticket metrics reporting.
  • Onboard new log sources with log analysis and parsing to enable SIEM correlation.
  • Analyzed large datasets to identify metrics, drivers, performance gaps and opportunities for improvement.
  • Worked on large datasets to generate insights and communicate insights to guide strategic roadmap.
  • Created many of the proof-of-concept dashboards for IT operations, and service owners which are used to monitor application and server health.
  • Performed field extraction using IFX in an event action.
  • Involved in setting up alerts for different type of errors.
  • Analyzed security based events, risks and reporting instances. Implementation of medium scale Splunk ES architectures.
  • Integration of different devices/applications/databases/operating systems with SIEM through smart connectors, Wincollect, forwarders and other agents.
  • Use Case development, testing and documentation.
  • SIEM and Security operation center audit and assessment.
  • Coordinate with Guardium team to analyze DAM activities and configured rules to generate offenses Design, create, schedule & distribute and document in Splunk reports
  • Tuning of false positives and less important events in Splunk environment
  • Establish and document processes and procedures with the vendor to achieve seamless work relationship and workflow
  • Prepared, arranged and tested Splunk search strings and operational strings.
  • Indexing and creating devices types for all AWS cloud trail logs in splunk
  • Worked on Cloud Splunk as well as On Premise Splunk configuration clustered infrastructure
  • Involved in interacting with business owners, developers and business analysts in improving the application.
  • Create dashboard from search, Scheduled searches o Inline search vs scheduled search in a dashboard..
  • Involved in handling various Incident and request related to the application.
  • Involved in monitoring the ticketing tool and taking the ownership of the tickets.
  • Worked on various defects analysis and fixed them.
  • Problem record analysis and solution providing.
  • Worked closely with Platform Owner in addressing their queries.

Splunk Developer/Admin

Confidential, Boston

Responsibilities:

  • Splunk implementation, planning, customization, integration with Application servers and statistical and analytical modeling.
  • Administer Splunk as well as create, test and deploying operational search strings.
  • On boarded new data into a multi-tiered Splunk environment.
  • Troubleshoot and tune Splunk deployment for servers, applications and network devices
  • Create and optimize Alerting, Reporting and advanced dashboards
  • Experience with Splunk forwarders and intermediate forwarders as well as index and search head clusters.
  • Create data retention policies and perform index administration, maintenance and optimization
  • Splunk dashboard creation and advanced searching and reporting.
  • Standardize Splunk forwarder deployment, configuration and maintenance in Linux and windows platforms
  • Create role based AD access for Splunk
  • Assist internal customers for creating and maintaining quality dashboards, alerts and reports
  • Configured Node manager to remotely administer Managed servers
  • Experience in handling network resources and protocols such as TCP/IP, Ethernet, DNS
  • Ability to troubleshoot Splunk infrastructure components in highly available, multi-site design.
  • Created Splunk applications and deploy using Splunk Deployment Server.
  • Configuration and administration of Connection pools for JDBC connections
  • Experience in handling Java and Sun Hotspot JVM tuning
  • Created Splunk Search Processing Language (SPL) queries, Reports, Alerts and Dashboards.
  • Configured LDAP and provided support for applications.
  • Experience with Splunk DBConnect application and Splunk forwarder deployment.
  • Installing and configuring Oracle Access Manager, Policy Manager, and Oracle Virtual Directory for Authentication, and User Authorization.
  • Worked on new indexers and search head in Cluster environment on Linux platform
  • Queries using calculated and restricted key figures, filters, exceptions, conditions and exit variables.
  • Configured and deployed applications in various work environments like Development, System Test, QA and Production.
  • Experience with performance testing tools such as web load and load runner.
  • Supported on call 24x7 schedule for Production Support.
  • Testing and profiling to measure the performance of the applications.
  • Experience on use and understand of complex RegEx (regular expressions).

Security Analyst

Confidential

Responsibilities:

  • Monitored security controls post authorization to ensure continuous compliance with the security requirements
  • Assessed security control to ensure implementation of HIPAA privacy and security rules inline with Confidential
  • Assisted in staff training for the proper understanding and implementation of HIPAA rules.
  • Ensured that the health records are maintained on each inmate per HIPAA and company guidelines.
  • Assisted with the review of policy, security alerts, guidance and regulations and adhere to HIPAA standards.

We'd love your feedback!