Quantcast

Splunk Systems Engineer Resume Ashburn, ...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Splunk Systems Engineer
Target Location US-VA-Ashburn
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
Ashburn, VirginiaPHONE NUMBER AVAILABLEEMAIL AVAILABLEhttps://LINKEDIN LINK AVAILABLEProfessional Summary:      11 years of substantial experience in Information Technology as System Administration, SIEM, Splunk Administration and Development, Splunk UI toolkit, ITSI, Dashboard Studio, Splunk Version Upgrades, Splunk Cloud, AWS, Azure, M365, Production support, UNIX shells scripting.
      Certified Splunk User & Power User.      Experience in Splunk 6.x, 7.x & 8.x, 9.x product, Distributed Splunk architecture and components including search heads, indexers, Universal forwarders, Heavy Forwarders (HF) etc.
      Prepared, arranged, and tested Splunk search strings and operational strings.
      Moved applications from Splunk v5 to v6, v6 to v7 and v8.      Created and configured management Splunk reports and dashboards for various applications.
      Expert in installing and using Splunk apps for Unix and Linux (Splunk nix) & Linux scripting (SH, BASH, KSH).      Resolved Splunk configuration-based issues in coordination with infrastructure support teams.
      Managed assigned systems, Splunk related issues and admin for an SH cluster and idx cluster environment.      Experience in configuring syslog-ng and rsyslog migrations and upgrading the logging protocol using this.      Strong knowledge of automation, source control, configuration management, deployment automation, and CI/CD pipeline stacks with Azure DevOps.      Validating intrusion detection system/intrusion prevention system (IDS/IPS) alerts by using vulnerability data and other context data about the assets collected in Splunk.      Create and design custom visualizations using Java script, CSS, and D3 JS.      Expertise in creating accurate Splunk reports, Dashboards, Visualizations and Pivot tables for the business users and advance Splunk search and Visualization in Splunk enterprise. Scripting and development skills (Perl, Python, Java) with strong knowledge of regular expressions.      Good Knowledge on Configuration files (CLI) in Splunk (Props.conf, Transforms.conf, Output.config).      Experience in creating Access controls, to user by creating AD groups power and user groups.      Experience using and configuring the Distributed Management Console (DMC).      Installed, tested, and deployed monitoring solutions with Splunk services and deployment Server Topologies.
      Hands on experience in observability tools like Dynatrace, Splunk, CloudWatch, SiteScope, Log Analytics, Log Insight.      Ability to quickly explore, examine and understand complex security problems and how it affects a customer s business.      Working experience on Integrating Splunk with Windows Active Directory and LDAP and Data consolidation for LDAP users.      Extensive hands-on experience with Terraform, including module development, configuration management, and state management, to automate and streamline infrastructure provisioning and management processes.      Experience in deploying and managing Dynatrace OneAgents.      Experience in handling end-to-end process of onboarding a variety of log sources to the Splunk based SIEM.      Experienced as a Web Developer in developing web applications using JavaScript, HTML, CSS, JSP, REST, JSON, AngularJS, Node.js, Backbone, jQuery, WCAG, and Ajax.      Managed daily and weekly data volume in terabytes.      Expert in Installation and configuration of Apache, Tomcat / WebLogic on Linux.
      Hands-on experience with Apache Kafka, including setup, configuration, and management.      Health and availability check of logs and devices in various environments.
      Self-motivated and self-educating, with a sense of professional commitment to deliver quality services with a sense of urgency.
      Proficiency in utilizing Chronicle's features for threat detection, investigation, and response. Strong understanding of security information and event management (SIEM) principles.      Ability to handle multiple tasks concurrently.      Hands on experience in Docker and Kubernetes.      Hands on experience with ticketing tools such as Remedy and Quick base and in big corporation with cluster environment experience.      Large Application Maintenance & Support (L2&L3).      Experience in profiling and analyzing application performance.      Web /Application Server Tomcat, Apache, WebLogic.
      Ability to work in a flexible environment where requirements and procedures continuously evolve.      Good writing and communication skills, self-motivated with a high degree of attention committed to work and have sound leadership qualities.      Experience in configuring, implementing, and supporting Splunk Server Infrastructure across AWS, Windows, UNIX, and Linux.      Experience with Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On s, Dashboards, Clustering and Forwarder Management on AWS Environment.      Strong communication skills regarding active listening, probing, change management and getting results through influencing.TECHNICAL SKILLS:      Log Monitoring Tools :  Splunk, Splunk ITSI, Sysdig, Moogsoft, Dynatrace, DataDog, Solarwinds, Akamai, Grafana, App Dynamics etc.      Operating Systems Red Hat Linux ES 4, 5 and 6,8,9 Solaris 10, Windows 2K, 2008, 2012, AIX 7, HP-UX 11.23.      Windows administration (Windows Server 2012R2, Windows Server 2016).      Scripting Tools Shell, Perl, Python, Ruby.      Office tools like Excel, Visio, PowerPoint, Word, Access, Outlook.      Application servers JBoss AS 5.x, 6.x, 7.x and JBoss EAP 5.x, 6.x.      Tools:  Bit-Bucket, Puppet, JIRA, ServiceNow, Ansible.      Unix - Red Hat Enterprise 6.x & 7.x   Shell & Perl Scripting.      Web Servers Apache(httpd), Apache Tomcat and Apache http server.      E-Mail servers Sendmail, Postfix, Zimbra.      Networking DNS, DHCP, TCP/IP, SMTP, LDAP.      Database Oracle 8i/9i/10g, DB2, MS SQL Server [ ] and Sysbase.      Virtualization tools VMWare, VSphere.Professional Work EperienceTIAA, Charlotte, NC							                        	                  Mar23   Till Date
Role: Sr Splunk Developer/Administrator      Expertise in creating accurate Splunk reports, Dashboards, Visualizations and Pivot tables for the business users and advance Splunk search and Visualization in Splunk enterprise and Splunk Dashboard Studio.
      Scripting and development skills (Perl, Python, Java) with strong knowledge of regular expressions.      Expertise with Splunk UI/GUI development and operations roles.
      Creating Advanced Dashboards using classic, dashboard studio and providing different access levels as per the need, educating the users to use Splunk Search effectively.
      Implemented and managed Splunk Cloud, Splunk ES, and Splunk SOAR solutions on AWS infrastructure.      Helped the client to set up alerts for different types of errors and Threat detections.
      Maintain or bring in industry standards in network and storage solutions.      Integrated Splunk with various legacy & security data sources, utilizing CIM model for field normalization.      Installing, implementing, and configuring Spunk, including the Splunk Enterprise Security module.      Experience in Firewall technologies such as those by Palo Alto, FireEye, ISE, Checkpoint or Cisco.      Health and availability check of logs and devices in various environments.
      Implement, document, configure, write queries, develop custom apps, support Splunk Indexers, Indexing and Field extractions using Splunk IFX, Forwarders, light weight forwarders, HF and Splunk web for Splunk 6.x.      Integrate SOAR with other security tools to automate threat detection, investigation, and response tasks.      Hands on exp with Azure Data Factory, Azure Data Lake, Azure Databricks, MS Purview, and Power BI.      Hands on experience in observability and monitoring technologies and tools, such as Dynatrace, Splunk, Grafana, SolarWinds, Akamai, and Sysdig etc.      Experience with CI/CD tools, preferably GitLab CI/CD/GitHub Actions/Jenkins & knowledge of best practices      Experience installing Dynatrace Agents on Kubernetes clusters.      Implement data retention policy (HOT/WARM/COLD).      Communicate with peers and supervisors routinely, document work, meetings, and decisions.      Developed scripts (Python, JavaScript, etc.) as needed in support of data collection, reporting, and presentation requirements.      Experience in Dynatrace, synthetic URL monitoring, installing agents, Forwarders and Heavy Forwarders, APIs, performance monitoring tool alerts, dashboards and data trend analysis.      Experience working with standard network logging formats, network management systems and network security monitoring systems, security information and event management (SIEM), network packet analysis tools, and forensic analysis tools.      Developed Splunk Dashboards, searches and reports to support various internal clients in Security, IT Operations and Application Development.      Worked on Terraform to develop and run applications and services using cloud technology.      Integrated Splunk with Xmatters for the alert s automations.      Worked on Kafka architecture and its components (brokers, topics, partitions, consumer groups)      Analyze technical diagrams of cloud-hosted solutions to identify areas for improvement and optimization.      Work with stakeholders to provide security solutions that support their business requirements.
      Designing, scaling out, and maintaining our AWS Cloud-based infrastructure and writing code to develop and maintain systems which powers Splunk cloud services hosted in the public cloud.      Integrate Service Now with Splunk to create the Incidents from Splunk.
      Worked on Splunk DB Connect configuration for Oracle, MySQL,MSSQL,DB connect, experience with kvstore and data modeling & experience in writing T-SQL Queries, Joins.      Integrated ServiceNow with Splunk to generate the Incidents from Splunk.      Knowledge on configuration management tools (Cloudwatch, CloudTrail, Ansible, GuardDuty, Chef, Puppet).      Wrote Terraform scripts and managed infrastructure automation using Terraform.      Follow Agile development practices and SDLC; collaboratively work across multiple teams including gathering requirements from business users and implementing Splunk development through Sprints (2 weeks).
      Real time Alerting and dashboard creation/Data analysis on case-to-case basis on Splunk Search Head.      Setting up clustering and pooling of indexers and Search heads Splunk S.O.S. monitors and reports to proactively detect and resolve issues before occurring.      Worked with UNIX and Splunk administrators to deploy Splunk across the UNIX and windows environment.
      Making and overseeing application, Create client, part, Permissions to information object.
Department of Veterans Affairs, Washington, DC				                                    Sep22   Mar23
Role: Sr. Splunk ITSI/System Architect      Experience with Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On s, Dashboards, Clustering.      Created multiple KPI s and tuned up the existing KPI s, made changes to the existing searches and improved the visualizations.      Worked as admin on JIRA tool, customized the dashboard on team s requirement.      Ensuring the use of technology/standard is consistent with VA policies and standards, including Federal Information Processing Standards (FIPS).      Organize and manage Dynatrace management zones and network zones to ensure optimal performance and monitoring coverage.      Ensuring sensitive data is properly protected in compliance with all VA regulations, all instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500.      Administration of Splunk Enterprise instances in both Classified and Unclassified environments.      Create multiple Glass tables to show the health of various applications.      Provide localized governance to ensure consistency and compliance across systems.      Management of organizational log and metrics inputs and associated documentation.      Management of services in Splunk IT Service Intelligence premium add-on.      Proficient in identifying data flows, system thresholds, and data sources to create glass table requirements for visualizing business processes.      Collaborates within the Scaled Agile Framework(SAFe) methodology to support agile development processes.      Knowledge of one or more monitoring tools such as Dynatrace, SolarWinds, AppDynamics and integration with Open Telemetry.      Splunk Enterprise Splunk ITSI with core data management experience.      Provides recommendations for improving technical applications and analyses, while also specifying the necessary materials, and supplies for the successful completion and implementation of technical projects.      Ensure proper configuration of cloud resources to maintain system security and efficiency.      Providing support to organization Splunk users regarding writing searches.      Experience participating in and supporting an Architectural Review Board for systems that operate in a cloud hosted environment.      Assist organization Splunk users with data visualization by creating dashboards when needed.      Troubleshoot issues related to searching, licensing, and errors.Geico, Rockville, Maryland					                                                                Mar22   Aug22
Role: Sr. Splunk/ITSI Architect      Create and configure management Splunk reports and dashboards for various applications, managing users and Implement Change Requests.      Examine and understand complex security problems and how it affects a customer s business.      Splunk Enterprise Splunk ITSI with core data management experience.      Provided L1/L2 training and support for Splunk and ITSI.      Experience in implementation of Glass Tables via ITSI is Needed.      Create multiple Glass tables to show the health of various applications.      Created multiple KPI s and tuned up the existing KPI s, made changes to the existing searches and improved the visualizations.      Triage automated alerts and signals in Datadog Cloud SIEM so we can respond to emergent threats that affect Datadog's security. Work with our Threat Detection team to tune and calibrate these signals so they're maximizing value.      Experience with Infrastructure as Code using Azure Resource Management Templates, AWS Cloud Formation Templates, HashiCorp Terraform.      Worked on automation tools such as Terraform, Ansible, AWS Cloud Formation, Azure Resource Manager.      Monitored Moogsoft AIOps, and other consoles, monitoring tools dashboards to ensure optimum performance within the environment.      Created and monitored dashboards, alerts to compare with other tools.      Stay up-to-date with the latest security trends, threats and technologies to ensure Datadog is prepared to respond to any type of security incident.      Onboarded data from various sources such as (syslog/HEC/UF).      Application Performance Monitoring - Using Dynatrace APM tools to optimize application performance and identify performance bottlenecks in web applications and provide solutions.
      Worked on different dashboards to show the health for the higher-level management.
      Create Dashboard Views, Reports. lookups and Alerts for events and configure alerts.Ally Financial Inc, Detroit, MI						                                                   Mar18 Mar22
Role: Sr. Splunk Admin/Observability Engineer & Prod Support      Architecting and deploying clustered/distributed Splunk Enterprise 7. x implementations to large, complex customers.      Health and availability check of logs and devices in various environments.      Create data retention policies and perform index administration, Data analysis on case-to-case basis on Splunk Search Head, maintenance, and optimization.      Extensive experience in configuring, implementing, and supporting Splunk Server Infrastructure across AWS, Windows, UNIX, and Linux. Experience with a variety of operating systems protocols and tools, depending on the type of platform or application to be administered.      Responsible for on-call prod support, change requests and deploying the changes as requested.      Responsible for administering, maintaining, and configuring a 24 x 7 highly available, Splunk apps for production portal environment.      Experience in cybersecurity, with a focus on SOC operations, incident response, and security engineering.      Created Apps for Security Engineering Team for Dashboards of Dashboard.      Integrating data sources like REST APIs, SOAP, Database and Log files.      Migrated all knowledge objects from on-prem to AWS.      Knowledge of creating and optimizing lookups (automatic/Kvstore) for querying and correlating data.      Engaged with relevant teams within Information Security and Information Technology as required to ensure complete DLP coverage is provided.      Expertise in Azure DevOps including GIT, CI/CD build, and release pipelines.      Implemented Splunk app and add-on development and deploying Splunk architecture.      Upgrade and Optimize Splunk setup with new discharges.      Responsible for administering, maintaining, and configuring 24x7 highly available and provided on-call Support, Splunk apps for production portal environment.      Configuration of AWS resources such as S3 buckets, Load Balancers, Security Groups, and IAM Roles and Policies.      Worked on Role based access controls (RBAC) in Splunk and Active Directory setup and configurations.      Worked on Syslog-ng server to receive logs that are written on a file and then use a Splunk Universal Forwarder to read these files and send them to Indexers.      Utilized cloud technologies, specifically AWS EC2 and Azure virtual instances, for server management.      Experience in Masking techniques for security data (PII) by writing regex in props.conf.      Create Dashboard Views, Reports, lookups and Alerts for events and configure alerts.      Upgraded Splunk Enterprise from 6.x to 7.3.4.      Configured Cribl LogStream to Receive Splunk TCP Data.      Configure Cribl as an Elastic listener & Splunk Outputter.      Installing the Cribl App for Splunk on an SH.      Experience in onboarding Syslog, cloud logs (AWS,GAIA) using HTTP EVENT COLLECTOR (HEC).      Implement data retention policy (HOT/WARM/COLD).      Hands on experience in Grafana development, admin, maintenance.      Utilized Grafana to create dashboards, data visualization and graphs.      Builds and deploys dokerize containers to Kubernates/Openshift 3.2 Pass infrastructure.      Familiarity with data models such as Network Traffic, Web, Endpoint, Certificates, and Alerts      Experience with Splunk db connections to middleware applications like Logstash and Elasticsearch engines.      Worked on Splunk's dashboard and ELK's K for Kibana.      Experience in integrating with application logs and aggregators such as SyslogNG.      Experience in implementation of Glass Tables via ITSI is Needed.      Administering Splunk and Splunk Apps to develop new/custom Apps to perform specialized functionality.      Expertise in onboarding business-critical data, building custom TAs and apps, and expanding indexer clusters.      Streamline troubleshooting and monitoring workflows by sending infrastructure data from Splunk App for Infrastructure (SAI) into Splunk ITSI.
      A reference implantation for running a continuous deployment pipeline with Jenkins and Jenkins workflow on Kubernetes.      Using Docker in Environment variables, Configuration files, Option types and Strings & integers.      Get a holistic view of IT and business performance. Search and analyze across all layers of the IT stack and drill into the raw infrastructure logs or metrics for advanced troubleshooting.      Expertise with Splunk UI/GUI development and operations roles.
      Implemented SSL certs for sending data using secure encryption from one data center to another.      Installation and configuration of Splunk apps to onboard security data sources into Splunk.      Installing and configuring Splunk Forwarder on both Windows and Linux servers.Homesite Insurance Company, Boston, MA                     				                                     July16   Sep17
Role: Hadoop / Splunk developer      Responsible for cluster maintenance, adding and removing cluster nodes, cluster monitoring and troubleshooting, managing, and reviewing data backups and Hadoop log files.      Developing custom web application solutions for internal ticket metrics reporting.      Exploring the application of machine learning algorithms on new computer architecture.      Worked on Big Data Integration and Analytics based on Hadoop, SOLR, Spark, Kafka, Kinesis, Storm, and web Methods technologies.
      Develop and maintain System Security Plans and related documentation for each supported network/system.      Created and configured management Splunk reports and dashboards for various applications.
      Ensure that system security is implemented during all phases of the system s life cycle.      Populated HDFS and Cassandra with huge amounts of data using Apache Kafka.Etica IT, Hyderabad, India							                                      Jun11   Oct14
Role: Web Developer      Interacted with the business users to gather requirements, created User Interface (UI) to gather and validate user requirements and communicate with Business Layer by using HTML, JSP and Servlets.      Experience working with the most recent version of Drupal and external plug-ins available for Drupal.
      Designed/modified Images/Banners as per the client requirement using Adobe Create Suite.      Used JavaScript cookies concept to remember information about the user.
      Developed dynamic e-mails using JavaScript, and hand coding of HTML 5, XHTML, and CSS 3.      Using JIRA to track UI tasks for each sprint iteration.      Developed html views with HTML, CSS, and JSON.      Involved in enhancement of existing application, created HTML navigation menu that is role based wherein menu items changes dynamically based on the values derived from the database in the form of XML.Educational Background:      Bachelor of Technology in Computer Science and Information Technology from JNTU, Hyderabad, India, 2011.      Master of Computer Science & Engineering from NPU, California, 2016.      Master of Science in Information Technology Management, Campbellsville University, KY, 2019.

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise