Splunk Architect / Linux System Engineer Resume
SUMMARY
- 11 years of Linux and Unix System Administration and 7 years of Splunk Architecture. Experience with Cyber security (information security and Operational). Splunk Certified Architect expert, worked with WebSphere (WAS), Deploying/Monitoring, and Application on servers. VERITAS, Net Back - Up, Cluster Servers, Patch Management, Performance Management, Excellent Technical and Interpersonal Skills. Configure and built Red hat Linux machines, create user accounts, set Kernel Parameters.
TECHNICAL SKILLS
HARDWARE: X86 architecture, E250, E3500, E4500, E5500 and E6500
SOFTWARE: Red Hat Linux and Solaris Unix, OSSEC and NAGIOS/Nimsoft monitoring tools, VERITAS Volume manager, VERITAS netback up, Docker, AWS, Apache, Perl, Shell, MS Access, UNIX, Windows NT, and MYSQL under Windows/Unix, Maven/Jenkins, Git, VMware, KVM (Kernel based virtual machine), Kickstarter, SAN storage. Install and configure Splunk, Hadoop, MySql, Ansible, Chef, Drupal and Puppet
LANGUAGES: Shell Programming, Java, JavaScript, Visual Basic, C/C++, Ruby, Python
PROFESSIONAL EXPERIENCE
Confidential
Splunk Architect / Linux System Engineer
Responsibilities:
- Install and Configure Linux Systems
- Knowledge of Red Hat version 6 or 7 (rhel6/rhel7) with the ability to engineer, install, administer and maintain systems.
- Skilled in Linux-related scripting (Bash, Perl, Python, etc.)
- Conducting the installation, maintenance and backups of Linux operating systems
- Conduct Production, QA and Lab server support
- Install and configured Splunk Enterprise environment on Linux
- Create and deploy Splunk Data retention policy
- Create Splunk saved Searches and fixes
- Develop lookup tables
- Developed Splunk custom Apps for CDM
- Configured Universal and Heavy forwarder
- Install and configured Splunk search head and Indexer
- Build a Splunk deployment server
- Experienced in configuration of the Splunk input and output configuration files
- Mitigating security vulnerabilities on all Linux servers and Splunk instances
- Perform System Maintenance
- Write shell scripts as needed to automate administration tasks
- Configured and maintaining network services
- Install and configured BigFix, and onboard BigFix data into Splunk
- Troubleshoot BigFix data
- Monitor System Performance
- Provide Technical Support and Guidance
- Onboard Tenable data into Splunk
- Carried out Tenable Nessus testing
- Maintain System Security
- Conducting administration of VMware environment
- Extensive troubleshooting experience in a Linux environment
- Profound knowledge of TCP/IP and networking concepts
- Sound knowledge of enterprise-level configuration management
- Proficient in Linux, RedHat, Java, Perl, Ruby, and PHP
- Wrote Technical Documentation
- Building, operating, and maintaining Linux servers for all server environments supporting DHS
- Maintain and support JBoss, VMware, Ansible, Red Hat, Business Objects, applications
- Experienced with multi-task and adapt to shifting project requirements
Confidential
Splunk Architect / Engineer
Responsibilities:
- Planned and participated in the Splunk Infrastructural Design
- Worked hand in hand with DISA
- Installed and configured all Splunk component including Network configuration
- Created customized Splunk Dashboards
- Integrated Splunk to Archer, with Archer Dashboard
- On boarded Fore Scout Data in to Splunk
- Install and configure MacAfee (EPO) and integrated to Splunk Dashboard
- Configured DB connect for Rapid7 to connect Data into Splunk
- Integrated Tenable, Carbon Black, Cyber ark, sail point, Rabbit MQ with Splunk for Data monitoring
- Carried out root cause analysis for Data parsing disruption into Splunk
- Implemented Splunk Best practices
- Created Customized Splunk app
- Configured the integration of DB connect with Splunk for Oracle
- Integrate other application like PeopleSoft, and Qmulos
- Experienced DevOps, Analytics, Information Security, and networking Concept
- Use of Splunk Macros
- Generated reports
- Configure Search head and Indexer Clustering
- Install and configure Splunk Deployment and License server
- Work with Application Developers with log compilation
- Install and configured puppet
- Experienced with configuration management tools
- Integrated Ansible with Splunk in configuring Splunk deployment server
- Lead a team of Developers and Linux Admin in finalizing application migrations
Confidential
Splunk Architect/Administrator and Linux Engineer
Responsibilities:
- Design and Implemented enterprise-scale splunk solutions
- Implemented splunk best practices
- Install Splunk Enterprise security
- Implemented Risk management framework
- Updates website content through Drupal platform
- Writing Perl scripts for data dump
- Execute Update.php script to update the database after modules and themes
- Experience with the Drush command
- Wrote Basic Python script for splunk installation
- Edited complex Python script for Splunk advance searches
- Acted as a Risk advisor to the Security personnel with the guidance of RMF
- Install and configure splunk Forwarder, search heads, and Indexers
- Configure splunk load balancers, Heavy forwarders and splunk apps
- Worked with developers and integrating GitHub scripts through Jenkins
- Maintain WordPress sites and update WordPress widgets
- Carried out data searches on splunk search head
- Able to implement Regex but with Developers help in most cases
- Build Linux VM servers on VMware platform
- Co-ordinate IA functions
- Applied STIGS and followed industry standard benchmark
- Conduct Access, remediate and report on PCI compliance
- Co-ordinated AQ (quality assurance) for built Linux VM servers
- Interact with customers and onboarding, configuration, and optimization in SPLUNK
- Generated splunk quarries to automate tasks and manipulate data
- Generated Splunk reports and Dashboards
- Experienced with Network security and intrusion detection
- Experienced with SIEM (splunk)
- Experienced with penetration testing and Incident response
Confidential
Splunk Engineer /Sr Linux Admin / Compliance Analysist
Responsibilities:
- Install and configured splunk Enterprise environment on linux
- Configured Universal and Heavy forwarder
- Install and configured Splunk search head and Indexer
- Build a splunk deployment server
- Experienced in configuration of the splunk input and output configuration files
- Configured ansible
- Wrote scripts for Ansible with Ruby and some Python
- Installed, configured and manage Splunk Enterprise Security.
- ES event processing and normalization
- Deployed technology add-ons, settings, risk analysis settings, threat intelligence and protocol intelligence configuration, and customizations.
- Involved in Searching and Reporting with Splunk, Creating Splunk Knowledge Objects and Splunk Administration
- Architecting and Deploying Splunk and coordinating Enterprise Security with Splunk
- Created complex dashboards, forms, and visualizations.
- Edited simple XML to create dashboards that use tokens
- Created robust searches, reports, and charts.
- Edited Python scripts for Linux services
- Used sub-searches, additional statistical commands and functions, formatting and calculating results, charting commands and options, correlating events, and creating advanced lookups.
- Installed and configure Splunk's app for IT Service Intelligence (ITSI).
- Wrote basic Ansible playbook for system configuration
- Worked with HIPPA reps on security controls
- Updated Configuration files on multiple servers
- Create Ansible Roles
- Embedding Modules and Plugins roles in Ansible
- Understand Ansible Best practices
- Orchestrated Ansible infrastructure
- Indexed over 15 application Linux servers
- Create Knowledge Objects, regex statement and splunk launched splunk instances
- Create and partition multiple Linux Vm servers
- Trouble shoot Linux OS issues
- Worked directly with developers on launching applications
- Configured containers (Dockers and LXC) for our test environment
- Coordinate multiple Linux patch
- Worked with the agile work environments like scrum works.
- Having good hands on experience in creating, updating and closing tickets.
- Having good hands on experience in creating and resizing the partition using LVM's
- Installing configuring and maintaining the KVM switches, VMware and upgrading the Linux OS using rsync.
- Having expertise in Red Hat, Red Hat Kickstart, Jumpstart, VERITAS Netback and server Disaster Recovery and data Recovery.