We provide IT Staff Augmentation Services!

Splunk Engineer Resume

4.00/5 (Submit Your Rating)

NY

SUMMARY

  • Over all 8 + years of experience in Architecting and deploying various components within Splunk (indexer, forwarder, search head, deployment server) and security delivering innovative solutions to fix around and automation
  • Upgrade and Optimize Splunk setup with new discharges.
  • Extensive experience in deploying, configuring and administering Splunk clusters.
  • Expertise in Actuate reporting, development, deployment, management and performance tuning of Actuate reports
  • Created Splunk app for Enterprise Security to identify and address emerging security threats through the use of continuous monitoring, alerting and analytics.
  • Helping application teams in on - boarding Splunk and creating dashboards, alerts, reports etc.
  • Experience working on Splunk 5.x,6.x, Splunk Enterprise Security 4.1, Splunk DBConnect 1.x,2.x on distributed Splunk Environments and Clustered Splunk Environments on Linux and Windows operating systems.
  • Setup Splunk Forwarders for new application levels brought into environment.
  • Develop custom app configurations (deployment-apps) within SPLUNK in order to parse, index multiple types of log format across all application environments.
  • System Administration familiar with Windows Servers, Red Hat Linux Enterprise Servers.
  • Good Understanding of configuration files, precedence and daily work exposure to Props.conf, transforms.conf, inputs.conf, outputs.conf and Setting up a forwarder information based on requirement.
  • Experience in Optimized search queries using summary indexing.
  • Experience in Designing and implementing Trend Micro
  • Enabling the Radius Authentication to administer the SSL VPN Box
  • Excellent skills on troubleshooting and problem determination of HTTP/System/ Network related problems including monitoring, capacity planning and maintenance by providing 24X7 support on call for all mission critical applications. Strong background in a disciplined software development life cycle (SDLC).
  • Excellent analytical and interpersonal skills and ability to learn new concepts and supported 24/7 on call in production and development environment.
  • Understanding of Network Firewalls, Load-balancers, LDAP and complex network design.
  • Experience in optimizing searches for better performance, Search time vs. Index time field extraction and understanding of configuration files, precedence and working.
  • Gathered various sources of syslog and XML data from devices, applications, and data bases.
  • Involved in writing complex IFX, Rex and Multi kv command to extracts the fields from the log files. X.
  • Strong organizational skills to work independently and prioritize a heavy workload under the pressure of competing tasks.
  • A very good team player and self-starter with Strong analytic, writing, communication skills and quick learner with ability to work independently and as part of a team.

PROFESSIONAL EXPERIENCE

Splunk Engineer

Confidential, NY

Responsibilities:

  • Developed Splunk infrastructure and related solutions as per automation toolsets
  • Experience in Splunk GUI development creating Splunk apps, searches, Data models, dashboards, and Reports using the Splunk query language
  • Provide regular support guidance to SIEM operational teams on complex solution and issue resolution
  • Worked with Client engagements and data onboarding and writing alerts, dashboards using the Search Processing Language (SPL)
  • Analyzed security based events, risks and reporting instances
  • As part of SIEM, monitored notable events through Splunk Enterprise Security (Using V3.0)
  • Generated Shell Scripts to install Splunk Forwarders on all servers and configure with common Configuration Files such as Bootstrap scripts, Outputs.conf and Inputs.conf files
  • Onboard new log sources with log analysis and parsing to enable SIEM correlation
  • Configuration of inputs.conf and outputs.conf to pull the XML based events to splunk cloud indexer
  • Various types of charts alert settings Knowledge of app creation, user and role access permissions
  • Created Compliance Security Baseline and Vulnerability Assessment dashboard for IBM Guardium Security for Database Server and Database Instances
  • Parsing, Indexing, searching concepts Hot, Warm, Cold, Frozen bucketing and splunk clustering
  • Setup and configuration of search head cluster with three search head nodes and managing the search head cluster with deployer
  • Interact with the data warehousing team regarding extracting the data and suggest the standard data format such that Splunk will identify most of the fields
  • Worked on setting up Splunk to capture and analyze data from various layers Load Balancers, Webservers and application servers
  • Write automation scripts for APIs, Unit and functional test cases using Selenium WebDriver
  • Write automation scripts for REST API's using TestNG and Java
  • Worked on DB Connect configuration for r, MySQL and MSSQL
  • Splunk DB Connect 3.0 in search head cluster environments of Oracle, MySQL
  • Designed and implemented a NoSQL based database and associated RESTful web service that persists high-volume user profile data for vertical teams
  • Created many of the proof-of-concept dashboards for IT operations, and service owners which are used to monitor application and server health
  • Created Dashboards, report, scheduled searches and alerts
  • Create dashboard from search, scheduled searches and Inline search vs scheduled search in a dashboard
  • Field Extraction, Using IFX, Rex Command and Regex in configuration files
  • Splunk administering in environments like Window Servers, Red Hat Linux Enterprise Servers

Environment: SPLUNK 7.2*, Linux, UNIX, Oracle 11g, MS SQL Server 2012, SQL Bluecoat, IBM Guardium,,VMF, Tripwire, Resilient, Service Now (ITAM)

Splunk Admin/Developer

Confidential, NJ

Responsibilities:

  • Installation and configuration of Splunk product at different environments. Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Monitoring or analyzing the real-time events for the security devices like Firewall, IDS, Anti-Virus etc., using SIEM tools.
  • Upgraded Splunk Enterprise from v 6.2 to v 6.5.1 in clustered environments and non-clustered environments.
  • Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT Operations and Application Development.
  • Analyzed security based events, risks and reporting instances. Correlating events from a Network, OS, Anti-Virus, IDS/ IPS, Firewalls or Proxies and analyzing them for possible threats.
  • Understand and interpret customer requirements for Splunk implementation for an enterprise solution.
  • Provide deployment strategies with the understanding of affordable risk based on customer acceptance.
  • Created and configured management reports and dashboards. Planned, implemented, and managed Splunk for log management and analytics
  • Monitor security violations, flag potential violations and logging security incidents in Service Now.
  • Splunk DB Connect 2.0 in search head cluster environments of Oracle, MySQL.
  • Involved in writing complex IFX, Rex and Multikv command to extracts the fields from the log files
  • Created Dashboards for various types of business users in the organization and worked on creating different Splunk Knowledge objects like Macros, IFX, Calculated fields, Tags, Event Types, and Lookups.
  • Field Extraction, Using IFX, RexCommand and RegEx in configuration files
  • Use techniques to optimize searches for better performance, Search time field extractions. And understanding of configuration files, precedence, and working.
  • Troubleshooting of searches for performance issues by adding lookups, correct joints and using summary indexes.
  • Scripting and development skills (Perl, Python) with strong knowledge of regular expressions.
  • Various types of charts Alert settings Knowledge of app creation, user, and role access permissions. Creating and managing app, Createauser, role, Permissions to knowledge objects.
  • Responsible for maintaining the Splunk UBA.
  • Helped the client to setup alerts for different kind of errors.
  • Configure and Install Splunk Enterprise, Agent, and Apache Server for user and role authentication and SSO.
  • Monitored and resolved the Different kind of Health Issues of Splunk.
  • Parsing, Indexing and concepts of Hot, Warm, Cold and Frozen bucketing.
  • Install and maintain the Splunk add-on including the DB Connect 1, Active Directory LDAP for work with directory and SQL database.

Splunk Admin/Developer

Confidential, FL

Responsibilities:

  • Provide deployment strategies with the understanding of affordable risk based on customer acceptance.
  • Created and configured management reports and dashboards. Planned, implemented, and managed Splunk for log management and analytics
  • Monitor security violations, flag potential violations and logging security incidents in Service Now.
  • Validate the existing rules and provide recommendation on fine tuning the rules. Creating and sending Risk Advisories to our clients.
  • Suppress false positive alerts. Weekly/Monthly incident analysis report. Analyzing the events and providing solutions for the incidents.
  • Involved in setting up alerts for a different type of errors, Data Enrichment using the lookups and Data Interpretation using the Fields and Fields Extraction and performing the Data Normalization using the Tags.
  • Good Understanding of configuration files, precedence and daily work exposure to Props.conf, transforms.conf, inputs.conf, outputs.conf and Setting up a forwarder information based on requirement.
  • Maintained Splunk Environment with multiple indexers; managed and configured settings.
  • Improved search performance by configuring to search heads for all Indexes in production.
  • Analyzed security based events, risks and reporting instances. Developed Splunk queries and dashboards targeted at understanding application performance and capacity analysis.
  • Work with SIEM tool QRadar by tuning security events, creating building block, search for reports and search security events.
  • Worked for getting data in managing Splunk apps. Assisted internal users of Splunk in designing and maintaining production-quality dashboards.

Environment: Splunk 6.x, Splunk DB Connect and other modules, Oracle WebLogic 9.x/10.x, Tomcat 5.x/6.x, Oracle 9i/10g, Solaris 10, LINUX, Sun ONE Directory Server 6, Sun One Web Server 6.0, Apache 2.x, Python

System Admin

Confidential, GA

Responsibilities:

  • Configuration & troubleshooting of switches, routers and Firewall.
  • Installation and Implementation of PFSence and Sophos XG Firewall
  • Cisco Identity Services Engine (ISE), VPN, working with Firewall with Panorama Servers to create / modify rules and policies.
  • Involved in medium level Design and creating sequence diagram for site to site Tunnel configuration,
  • Checking firewall logs, Net flow and functionality by using different network monitoring tools.
  • Network experience using TCP/IP, DHCP, DNS, Ethernet, Network security tools, packet analyzers
  • DMZ Configuration off-shore and on-shore
  • Install Applications servers and Configure the Databases like MySQL and MongoDB and responsible for data backup
  • Create Nodes and Clusters
  • Maintaining Ovirt clusters and create Datacenters and Generate VM’s
  • Installation, configuration and maintenance of Linux/Unix servers
  • Deploying new Linux servers, Configuring the servers, Install Apache tomcat, Apache Webserver, Java installation on the servers, GIT, ANT, MAVEN
  • Created and configured clusters for high availability of the servers
  • Deploying the Ansible automated configuration and managing Ansible Playbooks
  • Troubleshooting issues in the server and Resolve issues on Disk, CPU and memory performance issues.
  • User administration, Enabled and Disabled Administrative security, Application Security, Global Security.
  • Configure Big data components in our Clusters as a Hadoop and Kafka - zookeeper servers.
  • Configure Lightweight Directory Access Protocol in our cluster .
  • Configure Map reduce & spark in Eclipse in order to connect to the Distrusted File System.
  • Maintaining Physical servers off shore and on shore.

We'd love your feedback!