We provide IT Staff Augmentation Services!

Splunk Developer Resume

2.00/5 (Submit Your Rating)

OBJECTIVE:

  • To obtain a challenging and responsible position on Splunk/Information Security to contribute my work experience and technical skills in protecting sensitive data of the organization.

SUMMARY

  • Overall 7+ years of experience in Information Technology field with strong 5 years experience in Splunk Developer/Admin,Cyber - Ark and Enterprise Security ES.
  • Audit existing SolarWinds implementation and suggest areas for improvement in addition to training and directing client personal in the configuration, management, and use of NPM, NTA, SAM, and WPM
  • Trained in SolarWinds (NPM - Network performance monitoring) and App Dynamics (APM - Application performance monitoring)
  • Expert in build custom searches and visualizations in both Splunk Core and Splunk ITSI.
  • Created and configured KPI's in Splunk IT Service Intelligence (ITSI).
  • Experience in installing and configuration of Dynatrace applications monitoring components.
  • Monitored and administrated multiple monitoring tools like AppDynamics, Dynatrace, New relic and CA APM.
  • Developed XML parser for extracting data from Dynatrace server profile Python
  • Extensive experience in designing and implementing AWS Cloud Services.
  • Experience in ITSI Modules process data collected using Splunk Add-ons and create Multiple KPI's.
  • Used Splunk Hunk for splunk analytics with Hadoop.
  • Exposed the metadata to the end users using the Splunk Analytics for Hadoop.
  • Knowledge on configuration files in Splunk(Pros.conf, Transforms.conf, output.conf).
  • Worked with SIEM team monitoring notable events through Splunk ES.
  • Supports, Monitors and manages the SIEM environment.
  • Expertise in Splunk SPL as well as python and several other languages.
  • Installation and configuration of Cyber-Ark vault, PVWA, CPM and PSM in Prod and DR.
  • Migrated Splunk 6.5 from bare metal servers to AWS
  • Installation and capacity management of Cyber-Ark Privilege Session.
  • Configurations including AD integration and Management of Cyber Ark Enterprise Password vault.
  • Resolved issues in Cyber Ark’s Central Password Manager to communicate with hosts to reconcile credentials
  • Good Experience on Splunk IT Service Intelligence and worked Splunk ITSI Glass Table.
  • Installing and configuration Splunk multisite indexer cluster for data replication.
  • Debug Splunk related and integration issues.
  • Hands on Experience with RPA tool UiPath.
  • Create well-structured query’s using SQL.
  • Assist in prioritization of automation/RPA opportunities across identified functions.

PROFESSIONAL EXPERIENCE

Splunk Developer

Confidential, CO

Responsibilities:

  • Experience in creating Splunk dashboards and visualizations to operational enablement and Geo Map.
  • Perform analysis, design, build, testing, and deployment of RPA applications.
  • Demonstrate understanding of RPA methodologies and tools, such as UIPath, Blue Prism, or Automation Anywhere.
  • Responsible for Privileged Account Management with Cyber Ark PIM suite
  • Administration experience of Cyber Ark vault with Safe creation, integration with LDAP and other authentication methods.
  • Creating safes and adding users and groups to them for privileged access in Cyber Ark
  • Monitor Cyber Ark reports and respond to failed password verification alert stand work with system account owners to resolve failure alerts
  • Create and Manage Private Lab with Dell PowerEdge and AWS to host Splunk Clustered Environment
  • Developed KSH/ZSH application and gained expertise on Agile Software delivery.
  • Monitor and respond to follow best practices in agile and QA.
  • Involved in Splunk GUI development creating Splunk apps, searches, Data models, dashboards, and Reports using the Splunk query language.
  • Assisted in implementing and integrating Dynatrace APM to feed alerts into CA Spectrum's correlation engine.
  • Installed Dynatrace managed cluster, Active gateways and instrumented more than 500 + applications using Dynatrace managed
  • Worked in ingesting the data from DB using DB Connect app.
  • Monitoring data in Splunk index and SQL database and configuration of backup.
  • Implemented Cipher feeder using a KV store coupled with db queries against the Orchestrator SQL server db.
  • Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT Operations and Application Development.
  • Built dashboards, views, alerts, reports, saved searches using XML, Advanced XML and Search Processing language (SPL) as and when required.
  • Splunk search construction with ability to create well-structured search queries that minimize performance impact.
  • Create Script to save old data into AWS Glacier
  • Install and configure the following applications: DbConnect, Hunk, Microsoft Exchange App, AWS splunk App, Cisco Network App.
  • Involved in creating Dynatrace dashboards and reports using built-in and/or custom measures to present testing and analysis results effectively
  • Maintained and managed assigned systems, Splunk related issues and administering.
  • Mentored users and super-users in using Splunk and creating reports & alerts.
  • Assist to design, configure, manage, and maintain the deployment and operations in Amazon EC2, AWS, VPC, S3, Elastic Search services and creating security groups.
  • Extensive experience in Installation, Configuration, and Migration, Troubleshooting and Maintenance of Splunk, Apache Web Server on different UNIX flavors like Linux.
  • Worked on Splunk DB Connect configuration for Oracle, MySQL and MSSQL.

Environment: Splunk 7.x, Splunk 6.3, Splunk 6.2 Redhat Linux, Windows Server, SPL, Unix, Linux, SQL server, XML,, Dynatrace Managed/SSAS, Splunk DB connect 2.2,Cloud,AWS, MS SQL Server, SQL server,, Search processing language (SPL)

Splunk Admin/Developer

Confidential, GA

Responsibilities:

  • Experience in creating Splunk dashboards and visualizations to drive security, business, and operational enablement.
  • Developed customized python for dev and Shell scripts for production environments to install, manage, and configure multiple instances of Splunk forwarders, indexers, search heads and deployment servers.
  • Designs and develops RPA solutions using UiPath.
  • Designs, configures, deploys, and integrates new, modified and/or enhanced UiPath automation solution.
  • Identify processes and workflows that can be enhanced by a Robotics Process Automation (RPA).
  • Critically evaluate workflows with a view to improve efficiency and enhance the usage of RPA and workflow automation.
  • Extensive experience designing, deploying, and managing clustered Splunk Enterprise systems - Clustered Indexers, Search Heads, HTTP Event Collectors, and Forwarders
  • Experience in developing END to END planning & Implementation of Various Network Devices and Business Application with the SIEM Device-QRADAR/SPLUNK
  • Experience managing data retention policies and performing index administration, maintenance and optimization, and configuration backups.
  • Onboard new log sources with log analysis and parsing to enable SIEM correlation.
  • Create Cyber Ark Safe's and add system and application id's to specified Safe vaults
  • Retrieve Cyber Ark system/application password's and assist Database, Linux Wintel, and Core Application Support teams when passwords are needed.
  • Administration experience of Cyber Ark vault with Safe creation, integration with LDAP and other authentication methods.
  • Responsible for Privileged Account Management with Cyber-Ark PIM suite
  • Creating safes and adding users and groups to them for privileged access in Cyber-Ark and Creation of policies and Reports in PVWA.
  • Installation and configuration of Cyber-Ark Private Ark client and Private Ark server and CPM, PVWA, PSM, PSMP, DR.
  • Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources
  • Monitoring the Network performance, CPU utilization, Server capacity, Garbage and Heap collection for distributed applications using the Solarwinds and AppDynamics tool.
  • Extensive experience Implement SPLUNK service and app monitoring for new applications, devices, and platform components.
  • Developed Splunk Search Processing Language (SPL) queries, created Reports, Alerts and Dashboards and customized them.
  • Troubleshoot Splunk indexers, search heads and forwarder problems.
  • Wrote Splunk Queries, Expertise in searching, monitoring, analyzing and visualizing Splunk logs.
  • Experience on Splunk lookups, macros, Pivot, data models, lookup files and their publication into Splunk.
  • Configured DB data sources to ingest data into Splunk using DB Connect App.
  • Worked in implementation and management of the Splunk SIEM solution.
  • Worked in SIEM environment Implemented security systems to computer networks in compliance with company's security policies.
  • Experience in configuring, implementing, analyzing and supporting Splunk server infrastructure across Windows, UNIX and Linux.
  • Worked on DB Connect configuration for Oracle and MySQL.

Environment: Splunk 7.x, Splunk 6.x, Unix, Linux, SQL server, XML, Web Services, Splunk DB connect App, Unix, Oracle 11g, MS SQL Server 2012, SQL server, Java scripting and Python Scripting.

Splunk Developer

Confidential, FL

Responsibilities:

  • Splunk tool configuration and its functionality to prepare Splunk Query for application call flow.
  • Expertise in Operations with Artificial Intelligence (AIOps) using Splunk.
  • Responsible for the day-to-day development, maintenance and operations of the Splunk tool and the development of user content (e.g. rules, reports, and basic connector configuration).
  • Expertise in Splunk Searching and Reporting modules, Knowledge Objects, Administration, Dashboards, Clustering and Forwarder Management.
  • Experience with log parsing, complex Splunk searches, including external table lookups.
  • Splunk search construction with ability to create well-structured search queries that minimize performance impact.
  • Experience with Splunk Apps for interfacing with infrastructure and tools (DB Connect, Jenkins App)
  • Experience on Generate Splunk Dashboards, Reports, and Alerts.
  • Experience in Unix/Linux commands, bash.
  • Splunk DB Connect 2.0 in search head cluster environments of Oracle.
  • Maintained and managed assigned systems, Splunk related issues and administering.
  • Mentored users and super-users in using Splunk and creating reports & alerts.

Environment: Splunk 6.x, Unix, Linux, SQL server, XML, Web Services, Splunk DB connect 2.0, Unix, Oracle 11g, MS SQL Server 2012, SQL server, Java scripting.

We'd love your feedback!