We provide IT Staff Augmentation Services!

Splunk Architect / Linux System Engineer Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • 11 years of Linux and Unix System Administration and 7 years of Splunk Architecture. Experience with Cyber security (information security and Operational). Splunk Certified Architect expert, worked with WebSphere (WAS), Deploying/Monitoring, and Application on servers. VERITAS, Net Back - Up, Cluster Servers, Patch Management, Performance Management, Excellent Technical and Interpersonal Skills. Configure and built Red hat Linux machines, create user accounts, set Kernel Parameters.

TECHNICAL SKILLS

HARDWARE: X86 architecture, E250, E3500, E4500, E5500 and E6500

SOFTWARE: Red Hat Linux and Solaris Unix, OSSEC and NAGIOS/Nimsoft monitoring tools, VERITAS Volume manager, VERITAS netback up, Docker, AWS, Apache, Perl, Shell, MS Access, UNIX, Windows NT, and MYSQL under Windows/Unix, Maven/Jenkins, Git, VMware, KVM (Kernel based virtual machine), Kickstarter, SAN storage. Install and configure Splunk, Hadoop, MySql, Ansible, Chef, Drupal and Puppet

LANGUAGES: Shell Programming, Java, JavaScript, Visual Basic, C/C++, Ruby, Python

PROFESSIONAL EXPERIENCE

Confidential

Splunk Architect / Linux System Engineer

Responsibilities:

  • Install and Configure Linux Systems
  • Knowledge of Red Hat version 6 or 7 (rhel6/rhel7) with the ability to engineer, install, administer and maintain systems.
  • Skilled in Linux-related scripting (Bash, Perl, Python, etc.)
  • Conducting the installation, maintenance and backups of Linux operating systems
  • Conduct Production, QA and Lab server support
  • Install and configured Splunk Enterprise environment on Linux
  • Create and deploy Splunk Data retention policy
  • Create Splunk saved Searches and fixes
  • Develop lookup tables
  • Developed Splunk custom Apps for CDM
  • Configured Universal and Heavy forwarder
  • Install and configured Splunk search head and Indexer
  • Build a Splunk deployment server
  • Experienced in configuration of the Splunk input and output configuration files
  • Mitigating security vulnerabilities on all Linux servers and Splunk instances
  • Perform System Maintenance
  • Write shell scripts as needed to automate administration tasks
  • Configured and maintaining network services
  • Install and configured BigFix, and onboard BigFix data into Splunk
  • Troubleshoot BigFix data
  • Monitor System Performance
  • Provide Technical Support and Guidance
  • Onboard Tenable data into Splunk
  • Carried out Tenable Nessus testing
  • Maintain System Security
  • Conducting administration of VMware environment
  • Extensive troubleshooting experience in a Linux environment
  • Profound knowledge of TCP/IP and networking concepts
  • Sound knowledge of enterprise-level configuration management
  • Proficient in Linux, RedHat, Java, Perl, Ruby, and PHP
  • Wrote Technical Documentation
  • Building, operating, and maintaining Linux servers for all server environments supporting DHS
  • Maintain and support JBoss, VMware, Ansible, Red Hat, Business Objects, applications
  • Experienced with multi-task and adapt to shifting project requirements

Confidential

Splunk Architect / Engineer

Responsibilities:

  • Planned and participated in the Splunk Infrastructural Design
  • Worked hand in hand with DISA
  • Installed and configured all Splunk component including Network configuration
  • Created customized Splunk Dashboards
  • Integrated Splunk to Archer, with Archer Dashboard
  • On boarded Fore Scout Data in to Splunk
  • Install and configure MacAfee (EPO) and integrated to Splunk Dashboard
  • Configured DB connect for Rapid7 to connect Data into Splunk
  • Integrated Tenable, Carbon Black, Cyber ark, sail point, Rabbit MQ with Splunk for Data monitoring
  • Carried out root cause analysis for Data parsing disruption into Splunk
  • Implemented Splunk Best practices
  • Created Customized Splunk app
  • Configured the integration of DB connect with Splunk for Oracle
  • Integrate other application like PeopleSoft, and Qmulos
  • Experienced DevOps, Analytics, Information Security, and networking Concept
  • Use of Splunk Macros
  • Generated reports
  • Configure Search head and Indexer Clustering
  • Install and configure Splunk Deployment and License server
  • Work with Application Developers with log compilation
  • Install and configured puppet
  • Experienced with configuration management tools
  • Integrated Ansible with Splunk in configuring Splunk deployment server
  • Lead a team of Developers and Linux Admin in finalizing application migrations

Confidential

Splunk Architect/Administrator and Linux Engineer

Responsibilities:

  • Design and Implemented enterprise-scale splunk solutions
  • Implemented splunk best practices
  • Install Splunk Enterprise security
  • Implemented Risk management framework
  • Updates website content through Drupal platform
  • Writing Perl scripts for data dump
  • Execute Update.php script to update the database after modules and themes
  • Experience with the Drush command
  • Wrote Basic Python script for splunk installation
  • Edited complex Python script for Splunk advance searches
  • Acted as a Risk advisor to the Security personnel with the guidance of RMF
  • Install and configure splunk Forwarder, search heads, and Indexers
  • Configure splunk load balancers, Heavy forwarders and splunk apps
  • Worked with developers and integrating GitHub scripts through Jenkins
  • Maintain WordPress sites and update WordPress widgets
  • Carried out data searches on splunk search head
  • Able to implement Regex but with Developers help in most cases
  • Build Linux VM servers on VMware platform
  • Co-ordinate IA functions
  • Applied STIGS and followed industry standard benchmark
  • Conduct Access, remediate and report on PCI compliance
  • Co-ordinated AQ (quality assurance) for built Linux VM servers
  • Interact with customers and onboarding, configuration, and optimization in SPLUNK
  • Generated splunk quarries to automate tasks and manipulate data
  • Generated Splunk reports and Dashboards
  • Experienced with Network security and intrusion detection
  • Experienced with SIEM (splunk)
  • Experienced with penetration testing and Incident response

Confidential

Splunk Engineer /Sr Linux Admin / Compliance Analysist

Responsibilities:

  • Install and configured splunk Enterprise environment on linux
  • Configured Universal and Heavy forwarder
  • Install and configured Splunk search head and Indexer
  • Build a splunk deployment server
  • Experienced in configuration of the splunk input and output configuration files
  • Configured ansible
  • Wrote scripts for Ansible with Ruby and some Python
  • Installed, configured and manage Splunk Enterprise Security.
  • ES event processing and normalization
  • Deployed technology add-ons, settings, risk analysis settings, threat intelligence and protocol intelligence configuration, and customizations.
  • Involved in Searching and Reporting with Splunk, Creating Splunk Knowledge Objects and Splunk Administration
  • Architecting and Deploying Splunk and coordinating Enterprise Security with Splunk
  • Created complex dashboards, forms, and visualizations.
  • Edited simple XML to create dashboards that use tokens
  • Created robust searches, reports, and charts.
  • Edited Python scripts for Linux services
  • Used sub-searches, additional statistical commands and functions, formatting and calculating results, charting commands and options, correlating events, and creating advanced lookups.
  • Installed and configure Splunk's app for IT Service Intelligence (ITSI).
  • Wrote basic Ansible playbook for system configuration
  • Worked with HIPPA reps on security controls
  • Updated Configuration files on multiple servers
  • Create Ansible Roles
  • Embedding Modules and Plugins roles in Ansible
  • Understand Ansible Best practices
  • Orchestrated Ansible infrastructure
  • Indexed over 15 application Linux servers
  • Create Knowledge Objects, regex statement and splunk launched splunk instances
  • Create and partition multiple Linux Vm servers
  • Trouble shoot Linux OS issues
  • Worked directly with developers on launching applications
  • Configured containers (Dockers and LXC) for our test environment
  • Coordinate multiple Linux patch
  • Worked with the agile work environments like scrum works.
  • Having good hands on experience in creating, updating and closing tickets.
  • Having good hands on experience in creating and resizing the partition using LVM's
  • Installing configuring and maintaining the KVM switches, VMware and upgrading the Linux OS using rsync.
  • Having expertise in Red Hat, Red Hat Kickstart, Jumpstart, VERITAS Netback and server Disaster Recovery and data Recovery.

We'd love your feedback!