Senior Splunk Admin Resume
0/5 (Submit Your Rating)
Washington D, C
TECHNICAL SKILLS
- Splunk Enterprise 7.2, 8.0
- Splunk system administration
- Splunk Data administration
- Splunk visualization and reporting
- Statistics
- Data
- Syslog - ng analysis
- Linux
- Windows
- Solaris
- MS office stack
- Service Now
- Oracle SQL Developer
- SQL
- PL/SQL
- Python scripting
- Splunk ITSI
PROFESSIONAL EXPERIENCE
Confidential, Washington, D.C
Senior Splunk admin
Responsibilities:
- Administer Splunk Enterprise Security
- Design, support, and maintain Splunk infrastructure for high availability and disaster recovery configuration
- Support and maintain complete logging infrastructure including, but not limited to, log storage, syslog and Windows Event Collector servers, and database connections
- Troubleshoot Splunk server and forwarder issues
- Tune search and indexer performance
- Create and manage Splunk knowledge objects (field extractions, macros, event types, etc.)
- On - board new data sources into Splunk, analyzed the data for anomalies and trends, and built dashboards highlighting key trends
- Perform data mining and analysis, utilizing various queries and reporting methods
- Monitor and troubleshoot existing input (file monitoring, http, modular)
- Map customer data to the Splunk Common Information Model (CIM)
- Implement KV stores, lookups, and data model acceleration to optimize search performance and reporting
- Build and integrated contextual data into notable events
- Interact with end users to gather requirements
- Develop security use cases within Splunk Enterprise Security for SOC consumption
- Mentor users and other groups on their use of Splunk
- Technical writing/creation of formal documentation such as architecture diagrams, technical designs, and SOPs
- Monitor the agent and server infrastructure for capacity planning and optimization
- Monitor license consumption/make recommendations based on trends in license usage
Confidential, Annapolis, MD
Senior Splunk Engineer/admin
Responsibilities:
- Expertise with Splunk 6.x, Involved in the Splunk Upgrade from 6.x to 7.x
- Created EVAL Functions where necessary to create new field during search run time.
- Installed Forwarders for MDT and involved in data grooming to check that data is arriving clean in Splunk.
- Setup Splunk Forwarders for new application tiers introduced into environment and existing application.
- Conducted and automated Splunk configuration files such as Props.conf, transforms.
- Conf, inputs. Conf, outputs. conf setting, Props file management for event breaking and time stamp matching.
- Extensive experience on setting up the Splunk to monitor the customer volume and track the customer activity.
- Played a major role in understanding the logs, server data and brought insight of the data for the users.
- Installed Splunk on nix for monitoring the health of the clusters.
- Created set of user roles to in LDAP and single sign on implementation.
- Very good understanding of software development life-cycle (SDLC) process, Followed Agile scrum and story maps for dev tracking.
- Employed DB connect to connect to different databases like sql.
- Created alerts to be triggered to ensure data onboarding was successful.
- Created splunk use cases and corresponding searches using various data source .
- Created a list of items and in corporate it in either a new or existing search for use case.
- Troubleshoot existing use cases to determine root causes and provide issue resolution.
- Develop and schedule Alerts for Use cases that failed to run.
- Ingested new data sources to implement Use cases, dashboards, and automated reports(via file monitors, DB connect, scripted inputs).
- Employed CIM to help normalize data.
Confidential, Durham, NC
Senior Splunk Engineer /splunk developer
Responsibilities:
- Installation and configuration of Splunk product at different environments.
- Configured Splunk Searching and reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
- Designing and maintaining production-quality Splunk dashboards.
- Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT Operations and Application Development.
- Created tags, Event types, field lookups, using regular expressions, aliases etc. for search-time outputs and visualizations.
- Created the reports and saved searches for the development environment.
- Developed various dashboards, reports for IT Infrastructure, IT Security, Leadership and other relevant stakeholders.
- Dealt with Splunk Utilities (bucket rolling, User index creation and management, Sourcetype, forwarder log monitoring input and output configuration).
Confidential, Charlotte, NC
Data Analyst
Responsibilities:
- Wrote complex SQL queries
- Created visualizations (KPIs/KRIs) using Excel
- Performed data analysis for the business requirements
- Automated daily SQL runs using python scripting
- Worked on java programming to cluster / index large amounts of datasets
- Created dashboards using Table
- Performed root cause analysis / optimizations