Splunk Resume Samples

4.5 (82 votes) for Splunk Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the splunk job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
LR
L Ruecker
Libbie
Ruecker
3341 Johnson Well
Phoenix
AZ
+1 (555) 663 3050
3341 Johnson Well
Phoenix
AZ
Phone
p +1 (555) 663 3050
Experience Experience
Detroit, MI
Splunk Developer
Detroit, MI
Stehr LLC
Detroit, MI
Splunk Developer
  • Develop alerts and timed reports Develop and manage Splunk applications
  • Provide leadership and key stakeholders with the information and venues to make effective, timely decisions
  • Provide backup support for other solutions network security solutions
  • Ensuring support tickets are fully updated with the most current data. Provide proper escalations and handoffs to management and support staff
  • Establish and ensure adoption of best practices and development standards
  • Communicate with peers and supervisors routinely, document work, meetings, and decisions
  • Work with multiple data sources
Dallas, TX
Splunk Security Engineer
Dallas, TX
Zieme Inc
Dallas, TX
Splunk Security Engineer
  • Provide security consulting to project and development teams in the area of information security
  • Develop and organize standard toolkits and tool development repositories, and custom content
  • Provide regular scheduled metrics and reporting to all stakeholders
  • PKI internal and external CA’s and Venify management would be a plus
  • Support testing of new integrations for infrastructure and production performance
  • Develop dashboards with visual metrics for stakeholders
  • Standardize and implement Splunk Universal Forwarder deployment, configuration and maintenance in Linux and Windows platforms
present
Boston, MA
Splunk Administrator
Boston, MA
Douglas-Denesik
present
Boston, MA
Splunk Administrator
present
  • Create presentation layers for Technical, Business and Executive Management showing environment operational health based on Key Performance Indicators
  • Manage existing application and create new applications (visual and non-visual)
  • Manage SPLUNK user accounts (create, delete, modify, etc.)
  • Create data retention policies and perform index administration, maintenance and optimization
  • Work with third party application, hosting and CDN providers to integrate data feeds to a centralized Splunk platform
  • Provide overall management of the SPLUNK platform
  • Assist with design of core scripts to automate SPLUNK maintenance and alerting tasks. Support SPLUNK on UNIX, Linux and Windows-based platforms. Assist with automation of processes and procedures
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Washington
Bachelor’s Degree in Computer Science
Skills Skills
  • JavaScript
  • HTML/DOM
  • CSS
  • Scripting Language - PowerShell, Perl, or Python
  • Frameworks: Google Charts, D3, other charting libraries
  • Splunk
  • SVG
  • Virtual Infrastructure Experience
  • Windows Infrastructure Experience
  • Performance Tuning
Create a Resume in Minutes

15 Splunk resume templates

1

GIS Shared Services Splunk Analyst Resume Examples & Samples

  • Capacity and performance management
  • Monitoring initiatives
  • Reporting and documentation
  • Maintain the Splunk infrastructure and Service Model (30%)
  • Act as Subject Matter Expert, using deep experience to mentor more junior team members
  • Maintain Disaster Recovery strategy and coordinate DR testing
  • Plan and coordinate lifecycle and capacity management of Splunk service (software version upgrades, hardware upgrades and migrations, deployment of new infrastructure etc.)
  • Deep knowledge of the Splunk, including managing Splunk infrastructure, Data Extraction and Application and UI development. Solid knowledge of the Linux Server platform
  • Ability to troubleshoot and resolve complex technical issues successfully
  • Ability to review business problems / requirements (particularly Audit related) and propose innovative solutions
  • Scripting, particularly in Python and Perl
  • Knowledge of the networking concepts and troubleshooting
  • Knowledge of PGP Universal and RSA Authentication Manager (or any other two factor authentication product)
2

Splunk Administrator / Developer Resume Examples & Samples

  • Design, support and maintain the Splunk infrastructure in a highly available configuration
  • Standardize Splunk forwarder deployment, configuration and maintenance across a variety of UNIX and Windows platforms
  • Leverage programming skills in Perl or Python to automate various aspects of the Splunk environment
  • Create user interfaces that will allows customers to manage their own Splunk instances
  • Troubleshoot Splunk server and forwarder problems and issues
  • Monitor the Splunk infrastructure for capacity planning and optimization
  • Support Splunk on Unix, Linux and Windows-based platforms
  • Minimum 3 years of experience using Splunk in a 24x7 environment
  • Qualified candidate must know one programming language extremely well (ideally Perl or Python) in addition to shell scripting
  • Experience with the automation of operational tasks in a fast growing environment
  • Prior experience in the Financial Services industry is a plus
  • Good understanding of Unix and Windows operating systems
  • Excellent verbal and written communication is a must
  • Ability to work in a fast-paced, enterprise environment
3

Splunk Administrator Resume Examples & Samples

  • Design, build, support and maintain Splunk infrastructure in a highly available configuration
  • Perform installation, configuration management, license management, data integration, data transformation, field extraction, event parsing, data preview, and Apps management of Splunk platform
  • Standardize Splunk forwarder deployment, configuration and maintenance in Linux and Windows platforms
  • Work with third party application, hosting and CDN providers to integrate data feeds to a centralized Splunk platform
  • Collaborate with other internal teams such as Engineering, Security, and Compliance etc…
  • Troubleshoot Splunk indexers, search heads and forwarder problems
  • Build, customize and deploy Splunk apps as per internal customer needs
  • Create data retention policies and perform index administration, maintenance and optimization
  • Develop and maintain production quality dashboards, custom views, saved searches and alerts for Splunk Operations and for other clients as per their requirements
  • Create role based access and SAML based SSO authentication for Splunk
  • Create and maintain architectural diagrams and other relevant documentations for the Splunk platform
  • Assist internal users of Splunk in designing and maintaining production quality dashboards
  • Arrange necessary trainings to Splunk internal customers
  • Design core scripts to automate Splunk maintenance and alerting tasks
  • Create presentation layers for Technical, Business and Executive Management showing environment operational health based on Key Performance Indicators
  • Minimum 3 years of administration experience with Splunk or any similar log management tool
  • Experience with automation of operational tasks in a fast growing environment
  • Basic administrative skills in Linux and Windows environments
  • Strong quantitative and problem solving skills
  • Experience in at least one scripting language preferably Python
  • Experience in creating and customizing Splunk application searches and dashboards
  • Experience in integrating with application logs and aggregators such as SyslogNG
  • Experience with Microsoft Visio
  • Understanding of Network Firewalls, Load balancers, and complex network designs
  • Experience in Regular expressions
  • Experience in cloud based technologies such as S3, Redshift and with NoSql stores such as MongoDB
  • Exposure to Chef or puppet
  • Experience with stats, probability and machine learning
  • Expert understanding in data analytics, Hadoop, MapReduce, R, and visualization
4

Lead Analyst Splunk & Securonix Resume Examples & Samples

  • Designs, develops, modifies, adapts, and implements short - long terms solutions to IT needs through new and existing applications, system architecture, network systems and applications infrastructure
  • Reviews system requirements and business processes, codes, tests, debugs
  • May implements software solutions as necessary
  • Evaluates new IT developments and evolving business requirements and makes recommendations for continuous improvement in operations
  • Develop and support new solutions, apps and scripts using Splunk and Securonix
  • Troubleshoot problems with any existing Splunk/Securonix solutions, apps and scripts
  • Maintain documentation of all configurations
  • Assist in putting together the global strategy for Splunk services and execute on it
  • Partner with the corporate teams to deliver Splunk services to the Capital businesses
  • Provide operational support for the infrastructure components hosting monitoring tools (Linux, MySQL, tomcat)
  • Assist the Operations leader in driving operational improvement programs
  • Lead your projects independently
  • Bachelor's Degree (or minimum 4 years of equivalent work experience) with minimum 2 years of IT experience Eligibility Requirements
  • Must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act
  • Must be willing to work out of an office in Van Buren Township, MI or New Orleans, LA
  • Working knowledge of current technologies
  • Experience developing and executing project plans
  • Demonstrated success at project management
  • Possesses project management skills and presentations skills
  • Minimum 5 years of experience working on Splunk or other monitoring technologies
  • Working knowledge of HQL, Java, MySQL and tomcat
  • Working knowledge of database connectivity and data integration methods
  • Knowledge in security and compliance areas
  • Ability to embrace emerging technologies and stay up to the new technology trend
  • Understanding of how the authentication, authorization and access management systems work
  • Good understanding of the IT systems event logs
  • Strong communication skills and experience working in a global, multicultural environment with flexible working hours
  • Highly motivated self-starter #DTR
5

System Management Tools Support Services Technician for Splunk Resume Examples & Samples

  • Ownership of the log & data mining service based on the Splunk product including
  • Create and maintain documentation to support and enable Operational Readiness of new services or major product releases. This includes documentation for known incidents, patching, new versions and new / enhanced functionality as well as processes like backup, usage and scheduled maintenance tasks
  • Validation of minor & major and new versions for Splunk
  • Driving the RFP process for new or existing solutions by mapping the requirements to the product capabilities, designing upon that a solution framework and finally prepare a proposal that also includes the financial aspect of the solution (cost benefit)
6

Splunk Architect Resume Examples & Samples

  • Support the client as a Splunk product domain expert
  • Design and implement Splunk infrastructure, deployment, products, apps, reports, alerts, and dashboards
  • Manage Splunk knowledge objects (Apps, Dashboards, Saved Searches, Scheduled Searches, Alerts)
  • The ability to de-code and debug complex Splunk queries
  • Ensuring the Splunk environment continuously meets specification in terms of business requirements (SLA’s), application design (standards), and infrastructure performance (KPI’s)
  • Build strong relationships with internal technology partners, and provide coaching & mentorship to technology teams
  • Provide technical expertise and consultancy to the Splunk implementation team(s)
  • Governance of change to ensure solution integrity and platform stability
  • Partnership with the Service Management teams to develop solution roadmaps for the various functions that the platform supports
  • Execute a plan to educate Service Managers and Shared-service leaders on the benefits and use cases for the Splunk platform
  • Engagement with avenues of influence (Splunk product managers, user groups, etc.) to align platform capabilities with business requirements
  • 3-5 years of current experience in big data analytics, data warehousing and/or business intelligence domains
  • Advanced knowledge and experience with Splunk architecture
  • Ability to troubleshoot core software platform and infrastructure components
  • Ability to perform complete Splunk environment installs, filter data, and manage indexes
  • Experience creating, and maintaining Splunk applications
  • Experience writing documentation, procedures and best practices in technical environments
  • Experience and understanding of virtualized servers and SAN storage
  • Experience working with industry standard authentication and permissions models
  • Experience working with REST APIs, and web development
  • Moderate knowledge of networking protocols, OSI stack, and basic network troubleshooting
  • Experience with Unix, Windows, VMWare, AWS environments, as well as be comfortable with command line interfaces
  • A working knowledge or recent experience with scripting languages (bash), application development (java, python, .NET), databases and analytical tools
  • The ability to quickly explore, examine and understand complex problems and how it relates to the business objectives
  • The ability to stop, collaborate and listen with technical and non-technical consumers from IT administrators to executive level stakeholders
  • Self-motivated and self-educating, yet willing and able to work collaboratively with both customers and fellow team members
  • Well organized with a healthy sense of urgency, as well as the ability to set, communicate, and meet aggressive deadlines with competing priorities
  • Experience working in large and complex enterprise environments, with a working knowledge of enterprise business applications
  • Strong communication skillsregarding active listening, probing, change management and getting results through influencing
  • System Design: Knowledge of system design procedures and the ability to translate functional business requirements into an application system or process to meet the clients' needs that also meets all relevant Company standards
  • Technology Architecting: Ability to holistically conceptualize and model the use of technologies across a broad set of business applications to translate business strategies and requirements into technical strategies, and to apply the architecture models to create achievable system designs for business solutions
  • Application Development Methodology: Ability to apply the standard TCCC application development methods covering the full development lifecycle (e.g., project preparation, analysis, design, development, testing, deployment and support) to ensure solution quality and consistency of process
  • Business Partner Knowledge: Knowledge of business partners (such as customer, bottler, service agent, supplier) in their context: industry trends and competitive pressures, strategies and plans, organizational structure, decision-making process, contacts, technology infrastructure and systems
  • Functionality Testing: Knowledge of and ability to use testing methodologies, processes and tools for testing of functionality, including unit, integration, system, regression and dry run testing
  • Project Management: Ability to use appropriate tools and techniques to plan secure resources for manage assist and ensure the progress and ultimate completion of designated projects; effectively manage time and resources to ensure that work is completed efficiently
  • Security Administration: Platform and Application: Knowledge of principles, relevance, tools and procedures of security administration
7

Splunk Architect Resume Examples & Samples

  • Expert knowledge in Splunk Architecture; Expertise in Enterprise Security for Splunk highly desirable
  • B.S. in Computer Science preferred
  • 7+ years of experience in information system architecture methodologies, or an equivalent combination of education and work experience
  • 10+ years of experience in Technology
  • Proven track record of delivering complex solutions
8

Monitoring & Event Management Sme-splunk Resume Examples & Samples

  • Oversee the maintenance of existing Monitoring and Event Management implementations
  • Maintain overall health and stability of existing platforms by ensuring root cause analysis and non-repeat of critical issues
  • Provide expertise on market trends and industry best practices in the Monitoring, Event Management and IT Analytics areas
  • Shape the future roadmap identifying the gaps in the area to provide efficient tools to IT Operations staff
  • Define key selection criteria to measure offerings from different product vendors to align with the roadmap
  • Assist in bringing about organisational change
  • Assess the risk profile of the suite of applications to remain compliant ahead of the curve
  • Provide guidance on-boarding new teams on to the platforms and engineer custom solutions for non-standard requirements
  • Review and improve procedures and documentation to increase the maturity of the monitoring and event management service
9

Advisory Services Senior Cybersecurity Security Information & Event Management Splunk Resume Examples & Samples

  • Demonstrate in-depth technical capabilities and professional knowledge. Demonstrate ability to assimilate to new knowledge
  • Bachelor's degree and a minimum of 2 years of related work experience, or a Master’s degree and approximately 1-2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business, or related major
  • Understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell)
  • Prior Big 4 or other relevant consulting experiences a plus
10

Splunk Administrator Resume Examples & Samples

  • Install, maintain, configure and manage various reporting and monitoring systems
  • Monitor systems and report the status to client staff
  • Splunk server configurations (web, indexing retention, authentication, etc.)
  • Splunk data onboarding operations (inputs, SQL, index-time configurations)
  • Splunk data parsing operations (search-time field extractions, eventtypes, tags)
  • Manage existing application and create new applications (visual and non-visual)
  • Maintain documentation including: what work has been done, what is left to do, and site-specific procedures documenting the Splunk environment
  • Create event processing
  • Manage timestamps
  • Create indexes for field extractions
  • Create and manage host values and source types
  • Parse event segmentation
  • Manage and ensure proper data fields for file and directory inputs
  • Manage network, Windows and any other inputs that may arise (universal forwarders)
  • Bachelor’s degree and 2 years of IT experience or in lieu of degree High School diploma and 4 years of IT experience
  • Minimum of 2 years of experience with UNIX/Linux configuration to directly support Splunk
  • Minimum of 2 years of experience with Splunk administration
  • Experience with Regular Expression
  • Recent experience in an enterprise Splunk environment
  • Splunk administration skills in one or more of the following functionalities
  • Event Processing
  • Timestamps
  • Indexed Field Extraction
  • Host Values
  • Source Types
  • Event Segmentation
  • Various data inputs including but not limited to network, Windows, Linux, file and directory, and syslog
  • Ability to manage Splunk indexers including index storage
  • Working experience in troubleshooting in a Splunk Enterprise environment
  • Knowledge of established industry best practices
11

Senior Splunk Specialist Resume Examples & Samples

  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Management Information Systems or similar field is strongly preferred
  • 7 - 10 years of relevant experience, with a minimum of 5 years work experience in configuring, implementing and administering Security tools and delivering security services. Experience must include implementation and configuration management of multiple security tools and delivery of security services in large enterprise environments
  • Security signature generation methods and techniques
  • Create technical documentation around the operations, procedures, and content
  • Monitor the health and performance of the LaaS platform and work with supporting teams to consult on actions required
  • Coordinate escalations to internal teams to ensure timely delivery of incident resolutions
  • Work with the vendor for support and troubleshooting
  • Event flows (i.e. Syslog)
  • Virtualization
  • Network design and operation
  • Experience working in a corporate enterprise environment
  • Proficient in technical writing and communication
  • Security certification such as: CISSP, SANS GIAC, Security+, Network+, Linux+, MCSE, RHCE or CCNA-Security
  • Prior participation and responsibilities for 24x7 on-call schedule for technical support
  • Knowledge of regulatory and compliance-driven processes and activities to ensure enterprise compliancy to internal policies and regulatory requirements
  • Excellent oral and written communication skills required
  • Prior financial services institution experience a plus
12

Intermediate Splunk Specialist Resume Examples & Samples

  • 2-3 years of relevant experience, with a minimum of 1 year work experience in configuring, implementing and administering Security tools and delivering security services. Experience must include implementation and configuration management of multiple security tools and delivery of security services in large enterprise environments
  • Security monitoring practices
  • Creating and maintaining LaaS content development including reports, dashboard, rules and alerts to assist in detection of threats, reporting requirements, and efficiency in event monitoring
  • Work with various teams to resolve issues that may arise with log sources, LaaS host patching, connectivity etc
  • Familiarity with enterprise security tools such as IDS/IPS, Anti-Virus, Malware Gateway, Messaging Servers, Firewalls and Internet Proxy
  • Active Directory/LDAP
  • Security Information Event Management (SIEM)
  • Log management tools (i.e. Splunk/ArcSight)
  • Three tiered application model
  • Cloud computing and Virtualization
  • Familiarity with Hadoop and Database technologies
  • Unix or Linux shell environments
  • Experience with defining, generating and operationalizing security metrics
13

Splunk Developer Resume Examples & Samples

  • 2+ years of experience with Splunk including backend administration of indexes and forwarders
  • The ability to design Splunk reports and dashboards using complex data elements
  • A passion for Analytics, for helping users discover and share the stories and meaning in their data
  • Experience in translating business requirements into concrete data analytic solutions
  • Familairity & previous use of JavaScript within Splunk (Specifically the understanding of the SplunkJS module)
  • Strong understanding of Linux and file systems
  • Familiarity with one or more of the following is a plus: Python, Cisco Telecommunication Products, ServiceNow, API Integration, Hadoop, Tableau, Extrahop
  • Ability to stop, collaborate and listen with technical and non-technical consumers from IT administrators to executive level stakeholders
  • Self-motivated and self-educating, yet willing and able to work collaboratively with both internal customers and fellow Splunkers
  • Well organized with a healthy sense of urgency, able to set; communicate; and meet aggressive deadlines with competing priorities
  • Demonstrable understanding of common enterprise applications (especially in the areas of security and telecommunications)
  • Statistical and analytical modeling
14

Cyber Risk Vigilant Splunk Senior Consultant Resume Examples & Samples

  • 3 + years of current experience in technical consulting or big data analytics
  • 3 + years of Cyber Security experience (security analytics, SOC experience)
  • Ability to quickly explore, examine and understand complex problems and how it relates to the customers’ business
  • Experience with both the Unix and Windows operating systems; comfortable on the SSH command line interface
  • Working knowledge or recent experience with scripting languages (bash),application development (java, python, .NET), databases and analytical tools Ability to stop, collaborate and listen with technical and non-technical consumers from IT administrators to executive level stakeholders
  • Demonstrate understanding of common enterprise applications (especially in the area of security)
  • Must be willing to travel up to 80% within North America
  • BA/BS preferred in computer science, computer engineering, finance or mathematics or equivalent work experience
15

Splunk Software Engineer Analyst Resume Examples & Samples

  • A minimum of a Bachelor’s degree coupled with 5+ years’ experience in the Information Technology arena
  • 1+ years in a senior Splunk role
  • 1+ Years experience in Linux
  • 1+ Years experience in SQL/ODBC interfaces
  • 1+ Years experience in app interface development, using REST API’s
  • Familiar with Project Management processes
  • Experience in SQL SSIS
  • Experience in other systems and network management products
16

Cots Splunk System Admin Resume Examples & Samples

  • Strong Linux/Unix background with scripting for automation and troubleshooting
  • Demonstrated good overall understanding of enterprise-level architecture
  • Strong documentation and organizational skills
  • Scripting experience with Regular Expressions, Python, JavaScript, XML or other languages
  • Working knowledge with Enterprise technologies (SiteScope, SCCM, Nagios, Puppet, etc.)
  • Expert administration knowledge in a number of technical areas which could include Microsoft operating systems, WebSphere, Microsoft SQL Server, PeopleSoft, upgrades, installations, and architecture
  • Experience with technical consulting, big data and/or statistical and analytical modeling
  • Demonstrated aptitude for learning new technologies
  • Ability to effectively communicate technical concepts to other technical staff members as well as non-technical members of the organization
17

Senior SOC Analyst, Splunk Resume Examples & Samples

  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths
  • Independently follow procedures to contain, analyze, and eradicate malicious activity
  • Document all activities in relation to an incident and assist Incident Response teams with status updates during the life cycle of the incident
  • Conduct proactive threat research
  • Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC functions
  • Understand and maintain the appropriate knowledge of Security Technologies, (AV, FIM, HIPS, NIPS, SIEM, WAF/DAM, DLP), security procedures, and services within the SOC as well as ensuring all tools are functioning properly
  • Perform post-incident report according to standard operations as well as activities such as identifying what was done right and wrong, identifying tools that may have helped the investigation and those that hindered it. Discuss with the responsible parties on what could have been done better
  • Assist in developing and maturing the future services and capabilities of the SOC
  • Ensure that all procedures and operations are carried out by the responsible parties
  • AssistTier I Analysts in monitoring network traffic and security alerts for potential events/incidents as well as trending and historical analysis and ensuring all incident reports are complete and written within standard operations, ensure ticket audits and reviews are completed
  • 2 - 5 years of experience in information security event monitoring and detection
  • Advanced Windows,Linux, Database, Application, Web server, etc. log analysis
  • Advanced experience troubleshooting security reports on Linux, Windows, routers, firewalls,applications, etc
  • Familiarity with common network vulnerability/penetration testing tools including, but not limited to, Metasploit, vulnerability scanners, Kali Linux, and Nmap
  • Ability to read and write Snort IDS signatures
  • Experience reviewing and analyzing network packet captures
  • Possess a comprehensive understanding of the TCP/IP protocol, security architecture, network and remote access security techniques/products
  • Experience with enterprise anti-virus solutions, virus outbreak management, and the ability to differentiate virus activity from directed attack patterns
  • Working knowledge of network architecture
  • Strong research background, utilizing an analytical approach
  • Be able to react quickly, decisively, and deliberately in high stress situations
  • Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
  • Industry recognized professional certification such as CISSP, GCIH, GCIA, Security+
  • Scripting skills (e.g., PERL, Python, shell scripting)
  • Ensuring firewallsecurity standards are met
  • Some Splunk query-development expertise
  • Experience guiding junior analysts
18

Splunk Content Engineer Resume Examples & Samples

  • 3+ years of experience with Splunk, network security, system security, and Supporting Security Event Management Tools (SIEMs)
  • 1+ years of experience in rule and advanced logic creation within Splunk
  • Experience with integrating solutions in a multi-vendor environment
  • BA or BS degree in CS, IT, or a related field
19

Splunk Architect Resume Examples & Samples

  • Experience in interacting with customers and onboarding, configuring, and optimizing Splunk and ES
  • Experience with network security and system security for Security Event Management Tools (SIEMs)
  • Experience with infrastructure management and support, system administration in a Windows and UNIX environment, and using scripting languages to automate tasks and manipulate data
  • Splunk Architect Certification
20

Splunk Architect Resume Examples & Samples

  • 2+ years of experience with SPLUNK
  • Experience in interacting with clients and onboarding, configuration, and optimization with SPLUNK and ES
  • Experience with network security and system security, supporting security event management (SEM) tools
  • Knowledge of a number of security technologies and information security and networking
21

Splunk Content Analyst / Engineer Resume Examples & Samples

  • Experience with performing hunt activities in an incident response role
  • Experience with enterprise-scale operations and maintenance environments
  • Experience with SPL, SQL, and other related search languages
22

Splunk Content Engineer Resume Examples & Samples

  • 3+ years of experience with SPLUNK, network security, and system security, supporting security event management tools (SIEMs)
  • 1+ years of experience with rule and advanced logic creation within SPLUNK
  • Knowledge of enterprise logging, with a focus on application logging
  • 1+ years of experience in an Incident Response role performing hunt activities
  • Experience with various security tools, including Wireshark, Nessus, Nmap, Burp, Proxy, or Snort
  • Ability to be a Splunk language (SPL) expert
  • Splunk Power User or Architect certification
23

Splunk Content Analyst / Engineer Resume Examples & Samples

  • 1 year of experience with Splunk
  • Experience with network security, system security, network operations, system operations, and supporting SIEM tools
  • Experience with rules, advanced logic creation, and onboarding log sources within Splunk or other SIEM tools
  • Experience with using and supporting business intelligence tools
  • Experience with Python and JavaScript
  • Experience with network defense solutions, including firewalls, IPS/IDS, encryption, VPN, and authentication
24

Splunk Administrator Resume Examples & Samples

  • Provide overall management of the SPLUNK platform
  • Maintain the SPLUNK infrastructure in a highly available configuration
  • Standardize SPLUNK forwarder deployment, configuration and maintenance across a variety of UNIX and Windows platforms
  • Troubleshoot SPLUNK server and forwarder problems and issues
  • Assist internal users of SPLUNK in designing and maintaining production-quality dashboards
  • Mentor and train SPLUNK users and administrators
  • Monitor the SPLUNK infrastructure for capacity planning, system health , availability and optimization
  • Assist with design of core scripts to automate SPLUNK maintenance and alerting tasks. Support SPLUNK on UNIX, Linux and Windows-based platforms. Assist with automation of processes and procedures
  • During on-boarding and as needed create rules for compliance and audit requirements and create and manage
  • On a scheduled basis, configure backups, verify custom reports, manage log source groups, and validate log sources with client
  • Review and apply any newly available and applicable SPLUNK software or policy updates routinely
  • Manage SPLUNK user accounts (create, delete, modify, etc.)
  • Add /Remove log sources. Troubleshoot issues with log sources or systems with vendor, and report system defects as needed
  • Maintain current functional and technical knowledge of the SPLUNK platform and future products
  • Help to document best practices in developing and using SPLUNK
  • 3+ year hands-on experience with distributed SPLUNK administration or any similar log-management tool
  • 3 + Linux/UNIX/Red Hat Systems administration experience
  • Expert knowledge on Security Information and Event Management Platforms (SIEM) – specifically SPLUNK
  • Experience with server administration on Windows or UNIX platforms
  • Excellent attention to detail and follow through, initiative and organizational skills
  • Strong verbal and written interpersonal communications skills and ability to deal effectively with business partners, peers and management Work Conditions
25

Junior Cyber Systems Administrator Splunk TS Resume Examples & Samples

  • Will have excellent oral and written skills creating programmatic documentation; standard operating procedures and granular process checklists
  • 0-2 years of related experience in data security administration
  • DoD 8570 IAT II and CND-IS certifications
  • Must be willing to take the CI polygraph
26

Cirt Computer Network Defense Analyst Shift Work Splunk Arcsight CND TS Resume Examples & Samples

  • The analysis and triage of network anomalies that should be considered Events of Interest (EOI). Will provide basic assessment of the anomaly; designate it as an EOI and coordinate response with CND response team
  • Escalating EOIs to Responders in a timely manner; with all required information to ensure the response team may act upon it accordingly
  • You must have a good understanding of networks at a packet level. Must be able to analyze packet captures at the expert level
  • Must have extensive experience using CND tools to detect network attack; these tools are
  • Participate in special projects as required
  • 8+ years of related experience in various data security administration; technical oriented positions desired
  • 3+ years IACND experience required
  • Requires DoD 8570 IAT II and CND-IR (like CEH; GCIH; CSIH; GCFA) and 3 years network defense/information assurance experience. 2. Must be willing to obtain & maintain a CI polygraph
27

Splunk Certified Architect Resume Examples & Samples

  • Provide primary focus engineering of Splunk solution based on business requirements
  • Providing day-to-day engineering, testing, technical documentation and deployment packages for the new Splunk solution
  • Defining integration/log collection process/infra
  • Provide integration work across (BBS integration/interface development/ iSAC integration / LDAP integration /ARP integration / ISSO/WebSSO integration)
  • Involved in the migration of existing SEGWay to the new Splunk solution
  • Full architectural proposal/documented solution for delivering Splunk for the primary purpose of Logging/Monitoring
  • 10 + years of experience in information system architecture methodologies
  • Expert knowledge in Splunk Architecture
  • Expertise in Enterprise Security for Splunk highly desirable
  • Perform a scripted installation of universal forwarders
  • Functional integration proposal for integrating to ArcSight
  • Knowledge in UNIX, r-syslog and Splunk
  • Solid experience working with Windows Servers & Desktops, Linux/Unix, and databases
  • Must be Splunk certified
28

Splunk Administrator Resume Examples & Samples

  • Bachelor of Science/Arts Degree in Engineering, Computer Science, Business Administration or Mathematics and a minimum of 6 years experience, or an Associate’s degree with 8 years or 10 years IT experience with no degree/certification
  • Splunk Certified Administrator (within 6 months of start) and DoD 8570 IAT-III certification (ie. CISSP, CASP, GCIH, CISA, GCED)
  • 1 year experience with the UNIX operating system; 1 year experience with the Splunk; 2 years direct experience with U.S. military C2 or commercial LAN/WAN communication systems (experience my be concurrent)
29

Splunk Consultant Resume Examples & Samples

  • Develop Splunk infrastructure and related solutions as per automation toolsets
  • Implement forwarder configuration, search heads and indexing
  • Create Dashboards, report, schedule searches and alerts
  • Resolve configuration based issues in coordination with infrastructure support teams
  • Create DevOps dashboard that aggregates data across multiple services to identify critical threats and proactively mitigate risks
  • Prepare, arrange and test SPLUNK search strings and operational strings
  • Analyze security based events, risks and reporting instances
  • Developing custom web application solutions for internal ticket metrics reporting
  • Provide regular support guidance to SPLUNK project teams on complex solution and issue resolution with the objective of ensuring best fit and high quality
  • Interact with the data warehousing team regarding extracting the data and suggest the standard data format such that Splunk will identify most of the fields
  • Onboard new log sources with log analysis and parsing to enable SIEM correlation
  • Subject matter expert in best practices, security protocols, PKI, and other security-related issues
  • Analyzed large datasets to identify metrics, drivers, performance gaps and opportunities for improvement
30

Splunk Consultant Resume Examples & Samples

  • Understand customer’s business requirements around Security data-analytics
  • Develop Splunk APPS, Technology Add-ons, Business Add-ons
  • Maintain complete life-cycle of custom APPS
  • Web framework integration for dashboards, reports with customer’s IT portal
  • Extend customer’s Security analysis output to Cognizant’s MSSP portal for
  • Knowledge on Cloud technologies, Enterprise security
  • Experience on SQL query and related product knowledge
  • Working experience in one or more of the following programming languages: Java, C++, Python, Ruby, Perl
  • Experience with Regular Expressions (REGEX)
  • Programming level certifications – Java, Perl, Ruby
  • Microsoft, Linux certifications
31

Splunk SME Resume Examples & Samples

  • Read, analyze and interpret business requirements, system documentation, and technical procedures
  • Secure relevant information, integrates data from different sources, and identifies possible causes of problems
  • Support Extract, Transform, and Load operations to retrieve content from ePO and ForeScout repositories as well as existing hardware, software, system boundary inventories. Maintain and present that content within Splunk
  • Conduct appropriate analysis and ensure calls that are unable to be resolved are appropriately forwarded to vendor
  • Understands SQL Server Metadata views and system tables
  • Experience with dashboard or Security Information Event Management (SIEM) systems, including ingest of third- party data for rendering within the dashboard or SIEM
  • Certification: Splunk Certified Admin, or Microsoft Certified Solutions Associate SQL Server 2012, or Oracle Database Administrator Certified Professional required
  • Hands on experience with Virtualization Technology such as VMware or Virtualbox
  • Experience with Active Directory, Log management tools and Vulnerability assessment tools
  • Splunk
  • RSA Archer
  • Security Content Automation Protocol (SCAP)
  • Asset Summary Reporting Format (ASR)
  • Restful API solution integration
  • Linux Administration
  • 05-06 years w/High School Diploma
32

Splunk IT Operations / Cybersecurity Engineer Resume Examples & Samples

  • 2+ years of experience with installing, configuring, and maintaining a Splunk server
  • Experience with developing and automating security configuration dashboards within Splunk and Enterprise Security
  • Experience with a wide range of technologies, including UNIX or Linux, Windows, networking equipment, and databases
  • Knowledge of vulnerability management, including application of DoD STIGs and Cybersecurity control audits and assessments
  • Knowledge of scripting languages, including Perl, Ruby, or Python
  • DoD 8570.01M IAT II Certification
  • Experience with SPL, SQL, and related search languages
33

Splunk Security Engineer Resume Examples & Samples

  • This is a remote position, so you can be located anywhere in the U.S
  • Support new client on-boarding, including
  • Participate inactivation calls and meetings
  • Review SIEM and NSM configurations for compliance with FGS and industry best practices
  • Develop, maintain, and enhance practice documentation and tools, including methodologies, standard operating procedures, reporting templates, and sales collateral
  • Develop and organize standard toolkits and tool development repositories, and custom content
  • Have at least 2 years of experience in security operations and/or consulting or equivalent expertise
  • Can demonstrate mastery of Splunk
  • Demonstrate skill in security engineering using one or more of the following
  • RSA Security Analytics(formerly NetWitness)
  • HP ArcSight
  • McAfee ESM (formerlyNitroView)
  • Snort, Bro, Argus and/or similar open source tools
34

Splunk Security Tools Engineer Resume Examples & Samples

  • Perform installation, configuration management, license management, data integration, data transformation, field extraction, event parsing, data preview, and application management of Splunk platform
  • Troubleshoot issues with Splunk indexers, search heads and forwarders
  • Act as an escalation point for 24x7 operations support for Splunk
  • Monitor Splunk infrastructure for capacity planning and optimization
  • Arrange and conduct necessary trainings for Splunk for internal support teams
  • Continuously engage with IT & Security management, project managers, technical staff, and enterprise peers to achieve organizational goals
  • Store, manage, and ensure availability of historical data to satisfy retention policies by source
  • Maintain version control and patch status on Splunk infrastructure and applications
35

Splunk Resume Examples & Samples

  • Performs all administration, management, configuration, testing, and integration tasks related to the Splunk, BigData/Hadoop, ArcSight ESM and associated platforms to include content creation, maintenance, and administration tasks
  • Research, analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, and operating systems)
  • 7+ years in security logging and monitoring engineering
  • 5+ years hands on experience in engineering and supporting large scale Splunk or similar event logging solutions for large corporations is preferred
  • 5+ years of multiple security platform administration or engineering within large-scale or global enterprises combined
  • 3+ years of experience within an engineering role designing or implementing complex BIG Data / hadoop and large data management solutions
  • 2+ year experience in Hadoop/BigData technology configuration and management is preferred
  • Experience installing and maintaining Syslog-NG, windows Snare and MSCOM is preferred
36

Splunk Security Tools Engineer Resume Examples & Samples

  • Experience with architecting, implementing, and operating Splunk or other big data platforms
  • Experience working in a globally distributed environment
  • Knowledge of Splunk architecture and standard design
  • Experience with Splunk data analysis and methodologies supporting information security
  • Knowledge of TCP/IP protocols and packet analysis
  • Experience with Splunk utilization of Hadoop (HUNK) a plus
  • Experience using regex (regular expressions) with a scripting language. perl regular expressions are preferred, but use of regex objects in any scripting language (bash, python, c++, ruby, etc.) is acceptable
  • Or documented equivalent work experience of at least 5+ years
  • Splunk Architect Certification or 2 + years Enterprise Splunk management experience
37

Splunk Admin / Developer Resume Examples & Samples

  • Proficient in creating reports and dashboards in Splunk 6.x or similar
  • Proficient in Splunk administration
  • Proficient in Python scripting
  • Experience with creating physical and logical data models
  • Experience with doing statistical data analysis
  • Experience working with Syncsort Ironstream (Desired but not required)
  • Experience working with IBM Systems Management Facility (SMF) records. (Desired but not required)
38

Splunk Advisory Engineer Resume Examples & Samples

  • Develop and nurture relationships to support and guide customer resources that include Splunk Administrators, Architects, Knowledge Managers, Developers and Users for increasing Splunk adoption
  • Assist and provide expert best practices in adoption, expansion, growing use cases and in setting up a Splunk Center of Excellence
  • Assist with Splunk Apps and system upgrade planning & execution
  • Assist in workshops to help customers leverage the full value of Splunk solutions and lead periodic stakeholder meetings
  • Support Professional Services in identifying, scoping, and selling follow on and new service opportunities
  • Support Education Services in identifying and recommending staff training opportunities
  • Identify in collaboration with the Splunk Account team the key success criteria for Splunk deployment and drive customer success and satisfaction
  • Work closely with the Splunk Account Team (Account Manager, Sales Engineer, Professional Services and Education) to identify opportunities for new usage of Splunk across organizational functions
  • Maintain current functional and technical knowledge of the Splunk platform and future products
  • Splunk product expertise highly desired (Core, Enterprise Security, IT Service Intelligence, Hunk, User Behavior Analytics) and certifications: Architect, Administrator, Power User, Knowledge Manager
  • Hands on technical experience within the cyber security domain, including engineering, integration, implementation and operations
  • Large scale implementation, IT Operations, analytics and big data experience
  • Virtualization and systems administration knowledge
  • Industry certifications (desired): GIAC, CEH, CISSP, CISM, CISA, PMP, ITIL
39

Splunk Advisory Engineer Resume Examples & Samples

  • Support and guide customer resources that include Splunk Administrators, Architects, Knowledge Managers, Developers and Users for increasing Splunk adoption and overall customer success
  • Assist and provide expert best practices in adoption, expansion, additional use cases and in setting up Splunk Center of Excellence
  • Work closely with the Splunk Account Team (Account Manager, SE, CA, PS and EDU) to identify opportunities for new usage of Splunk across organizational functions
  • Help to document best practices in developing and using the Splunk Documentation run book
  • Large scale implementation, analytics and big data experience
  • Previous hands on technical experience with a progression of career responsibility
  • Previous Splunk product knowledge
  • Security domain, implementation and security tools knowledge
  • Previous experience as a Solutions or Client Architect
40

Senior Splunk Application Developer Resume Examples & Samples

  • Gather requirements, design, support and maintain Splunk production-quality dashboards
  • Standardized Splunk agent deployment, configuration and maintenance across a variety of network, UNIX and Windows platforms
  • Capture metrics on Splunk alerts
  • Troubleshoot Splunk server and agent problems and issues
  • Develops new Splunk requirements that are continually incorporated into baseline tools/applications
  • Assist internal users of Splunk in designing and maintaining production-quality dashboards
  • Debug complex Splunk configuration issues
  • Participate as an escalation point for 24x7 operations support for Splunk
  • Monitor the agent and server infrastructure for capacity planning and optimization
  • Design core Systems performance and troubleshooting logs
  • Communicate with peers and supervisors routinely, document work, meetings, and decisions
  • Perform other duties as required or assigned
  • Support Splunk on network devices, Unix, Linux and Windows-based platforms
  • Splunk deployment, configuration and maintenance across a variety of network devices, UNIX, Linux and Windows platforms
  • Troubleshoot Splunk server problems and issues
  • Active/current Secret Clearance with the ability to upgrade to TS/SCI with Poly
  • Demonstrated background and experience in Splunk development and management
  • Broad industry knowledge of application monitoring and event management
  • Understanding of cloud-computing concepts
  • Basic understanding of AIX, Solaris, Linux and Windows operating systems
  • Working understanding of Solaris, Linux and Windows operating systems
  • Familiarity with Java-based server applications & logging frameworks
  • Able to communicate effectively at all levels of an organization
  • Willingness to aggressively pursue Splunk and industry certifications
  • Bachelor's Degree in Computer Science, Engineering, or other Engineering or Technical discipline or equivalent relevant experience. Master's Degree preferred
  • 10-15 years of experience as an Application Security Developer, Application Security Analyst, or equivalent
  • Minimum 5 years of experience using Splunk in a 24x7 environment
41

Splunk Developer Resume Examples & Samples

  • Design solutions and concepts for data aggregation and visualization
  • Design and maintain production-quality dashboards
  • Work with multiple data sources
  • Participate in design discussions
  • Deliver application updates with set deadlines
  • Mentor and train Splunk users and administrators
  • Minimum 3 years Splunk Development
  • Experience with Java-based server applications and logging frameworks
  • Advanced SPL, Eval and Status Functions, understanding expressions
  • Advanced customization of dashboards with CSS and JavaScript
  • 3+ years JavaScript and CSS
  • Proven experience customizing applications and dashboards
  • Splunk Machine Learning
  • Python/SQL
42

Splunk Operations & Integrations Specialist Resume Examples & Samples

  • Advise, manage, run an enterprise class Splunk environment
  • Support system administration activities on Linux OS and Splunk Enterprise and related applications
  • Participate in production support activities of Splunk & big data platforms
  • Design Splunk system to meet growth while maintaining balance between performance/stability and agility
  • Develops advanced scripts for manipulation of multiple data repositories to support analyst requirements
  • Onboard and normalize new security event data into Splunk & big data platforms
  • Develops advanced reports, dashboards or alerts to meet the requirements of critical initiatives
  • Develops scalable security management tools and processes
  • Develops automation for security tools management
  • Create customized searches and applications using programming/development skills such as java, python, shell scripting, regular expression etc
  • Automate deployment, integration and testing of enterprise system and services
  • Minimum ten (10) years of related experience
  • Minimum 4+ years of experience with Splunk
  • 4+ years of network security and system security experience, supporting security event management tools (SIEMs)
  • Professional understanding and administrative knowledge of large scale Linux/Unix deployments
  • Excellent understanding of enterprise logging & analytics platforms
  • Excellent understanding of regular expressions
  • Working knowledge of code deployment and revision control software
  • Infrastructure management and support experience
  • System administration experience in a Windows and Unix environment
  • Experience in using scripting languages to automate tasks and manipulate data. Programming experience is a plus
  • Experience working in a large enterprise environment
  • Experience integrating solutions in a multi-vendor environment
  • Ability To
  • Communicate clearly to technical and business audiences
  • Be well organized with a healthy sense of urgency, and able to set, communicate, and meet aggressive deadlines and milestones
  • Self-motivate, learn quickly and deliver results with minimal supervision
  • Quickly understand and interpret customer problem and navigate through complex organizations
  • Represent the group in a friendly, courteous, and professional manner
43

Splunk Resource Resume Examples & Samples

  • Lead key log management and analysis platform(s) discipline by driving technology strategy, implementation and adoption of the platform within Ally Enterprise
  • Develop/ implement patterns and best practices for the platform(s)
  • Lead Proof of Concept (POC) initiatives to assist in defining technology direction and enabling business strategy
  • Identify trade-offs and negotiate viable compromise meeting both architecture and business goals and requirements
  • Keep abreast of technology trends and advancements
  • Provide technical input into strategy/capability planning and annual portfolio planning efforts
  • Provide technical leadership, guidance and support to identify and resolve platform architecture and design issues
  • Work with subject matter experts (e.g., network, server infrastructure, etc.) to ensure technology solutions are compliant to Ally standards
  • Provide technical leadership, guidance and support to identify and resolve architecture and design issues
44

Splunk Security Analytics Engineer Resume Examples & Samples

  • Understanding of big data technology such as NoSQL, Hadoop, Spark, Hive, MongoDB, Cassandra, Redis, Riak, CouchDB, Neo4j or MapReduce
  • Preferred understanding of project execution or project management
  • Specific expertise/experience in data analysis, modeling and visualization required
  • Specific expertise/experience in the areas of data structures and data warehousing required
  • Experience using a distributed version control system (DVCS; e.g., GitHub, TFS) required
  • Experience working in SDLC environment (Agile/Scrum, Waterfall)
  • ETL experience preferred
  • Understanding of REGEX
  • Understanding of Threat Modeling and Kill-Chain exercises or capable of working in cross functional collaborative efforts with other teams similar to DevOps
  • Open to further training in Splunk design, SPL, machine learning or user behavior analytics
  • Occasional travel maybe be required. Mainly from training and conferences
  • Preferred understanding of building analytic solutions using big data technologies and coding
  • Preferred understanding of machine learning techniques
  • Strongly Preferred Academics or Education in one or more of the following
  • 2-5 years of applicable work experience is needed for a successful candidate
45

Splunk SME Resume Examples & Samples

  • Defining Build/Development approach(es) for Splunk apps
  • Develop approach(es) align to the framework defined by the enterprise architects
  • Design solutions / apps to meet customer Payments monitoring requirements
  • Work with build/coding team to code the solutions
  • Work with test teams to ensure System Test, Functional test and other relevant test are performed
  • Review infrastructure capacity to ensure Splunk solutions are meeting required NFRs
  • Support and direct service introduction of Splunk infrastructure and splunk applications in Live
  • Must have extensive knowledge of Splunk or similar big data products that can be used for various monitoring and business intelligence purpose
  • Must have exposure to Global Payments and/or monitoring within Global Payments
  • Ideally should have knowledge of automated build and deployment tools
  • Must have extensive and varied experience in development/support/ defect resolutions in multiple projects with differing levels of technical comprehension
  • Must have extensive experience of development in large scale, complex integration Program/Projects
  • Must have ability to work in Agile teams and ensure DevOps adoption
  • Must have ability to work under pressure to tight deadlines whilst maintaining quality and managing to an acceptable level of risk
  • Would be ideal to have ability to work collaboratively and effectively with all Programme/Project disciplines
  • Must have experience of the Payments processing applications
  • Awareness of Payments Monitoring is prefered
  • Must have deep understanding of Splunk
  • Must have detailed understanding of Technology and Banking Industry
  • Would be ideal to have Degree Level education
  • Would be ideal to have awareness of banking applications awareness of the corporate banking domain
46

Splunk Deployment Engineer Resume Examples & Samples

  • 3+ years of experience with IT in a professional work environment
  • 1+ years of experience with designing, implementing, configuring, and operating Splunk
  • 1+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including performing installation and configuration, monitoring system performance and availability, performing upgrades, and troubleshooting
  • Experience with performing site surveys, data gathering, and research and analysis related to deploying and implementing security tools
  • Knowledge of federal information security policies, standards, procedures, directives, frameworks, federal security authorizations, assessment, and risk management processes for enterprise systems
  • CISSP, Security+, or a related Certification
47

Splunk Resume Examples & Samples

  • 1+ years experience with Splunk administration, installation, configuration, clustering, monitoring, query design, dashboard design
  • 5+ years experience with UNIX/Linux administration/engineering
  • 3+ years experience with scripting (perl, shell, etc)
  • 1+ years experience with integration/web technologies (SOAP, REST, JSON, XML, etc)
  • 1+ years experience developing/delivering presentations to management and stakeholders
  • 3+ years experience with administration/engineering of at least two of the following: server platforms, network, storage subsystems, database, virtualization platforms
  • 2+ years experience designing/supporting platforms with multi-site and/or highly available designs
  • 2+ years experience with monitoring platforms (NetCool, Spectrum, etc)
  • 2+ years experience with web front-end development (PHP, Javascript, etc)
  • 2+ years experience with architecting solutions based on customer requirements
48

Splunk Security Consultant Resume Examples & Samples

  • Develop a comprehensive SIEM and Security Analytics architecture to support real-time security monitoring operations
  • Perform as technical lead in the development and delivery of custom content, system integration and event reporting
  • Troubleshoot and configure networking devices, various platforms, and database, Windows and/or UNIX system administration
  • Build and implement reporting and visualizations to inform and assist clients' incident response teams and security managers
  • Contribute to a strong client relationship through interactions with client personnel
  • Design, develop and document Security Operations Center Procedures and Processes
  • Communicate client expectations to the engagement team
  • Travel 100%
  • 2 or more of the following
  • 2+ years Splunk administration (Certified Splunk Administrator preferred)
  • 2+ years of working with SIEM tools performing deployment, configuration, and maintaining operations, content development
  • 2+ years working with security tool administration (e.g. firewalls, IDS, end-point protection, content filtering, IAM, DLP)
  • 2+ years working with operational information security disciplines (e.g. incident response, security infrastructure management or monitoring services)
  • Hands-on Splunk experience, inclusive of
49

Splunk Consultant With English Resume Examples & Samples

  • Previous experience working with Splunk and Splunk deployments
  • Experience with Big Data analysis
  • Ability to quickly explore, examine, and understand complex problems and how it relates to the client’s business
  • Working knowledge or experience with scripting languages, application development (java, python, .NET), databases, and analytical tools
  • Strong analytical, problem solving and debugging skills
  • Strong communication skills (ability to give technical demonstrations) and experience working on a virtual team towards common goals is a plus
  • Precision and attention to details, willingness to learn
  • Splunk certifications such as Splunk Architect or Splunk Certified Consultant
50

Splunk Administrator Resume Examples & Samples

  • Implements and maintains Splunk infrastructure and configurations
  • Creates and maintain alerts, dashboards, reports, scripts, or other tools within the Splunk system to maintain system health and integrity for all system, applications, hosts, data ingestion, forwarder status, etc
  • System management for clustering, deployment, licensing, and other server functions
  • Documents the cause and resolution of outages
  • Manages application enhancements to improve performance and stability
  • Strong interpersonal and communication skills, both written and oral
  • Respond to Operations incidents
  • Keep management and appropriate teams informed of high level support issues
  • 3 – 4 years as a Splunk Administrator
  • 3+ years of experience in Infrastructure and application performance monitoring
  • Technical background in capacity management. 2 years equivalent experience
  • Hands on knowledge of ELK Stack, Zabbix, and Rapid monitoring tool sets
  • Experience with Confluence
  • Perl, Bash and windows shell scripting
  • Ability to be flexible and adapt to any given situation
  • Ability to work under pressure with a calm demeanor
51

Splunk System Administrator Resume Examples & Samples

  • Perform all administration, management, configuration tasks related to the Splunk, Hadoop, EMC Smarts and associated platforms to include incident response, maintenance, and administration tasks
  • Execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the platforms
  • Report weekly on indexing, search and alert usage by groups
  • Coordinate and execute updates of VOD guide data with support engineers
  • Foresees problems or challenges and amends procedures accordingly
  • Places an emphasis on quality while driving toward expected results
  • Responsible for documenting issues / resolutions via ticket system for present / future reference
  • Execution / Results Focus: Translates ideas into actions and results; adapts to changing conditions and unexpected challenges; focuses on successful completion of priorities; consistently meets deadlines; anticipates and overcomes task barriers
  • Decision Making: Recognizes problems and takes action; uses logic and good judgment to arrive at sound, well informed, and timely decisions; seeks input from others and involves others when appropriate
  • Communication: Communicates information, ideas and opinions professionally with clarity; works cooperatively, considerately, and professionally with others; has good listening skills; is flexible/open-minded; solicits feedback and effectively handles constructive criticism
  • Interpret technical specifications and requirements
  • Independently determine methods and procedures for assignments
  • Work effectively in multiple tasks and with changing priorities
  • Bachelor’s degree in Engineering or Computer Science and/or equivalent work experience
  • Minimum 5 years hands on experience in engineering and supporting large scale Splunk or similar event logging solutions for large corporations is preferred
  • At least 1 year experience in Hadoop technology configuration and management is preferred
  • Hands on experience with database engineering and support
  • Splunk Administrator certification is a plus
  • Demonstrated ability to work and communicate effectively with peers in operations, programming and engineering
  • Experienced with the use and configuration of content management systems
  • Ability to quickly learn various computer applications including internal programs critical to Broadcast Operations
  • Exhibit strong interpersonal skills with the ability to build and maintain relationships
52

Splunk Developer With Top Secret Clearance Resume Examples & Samples

  • Serve as a member of a security operations team monitoring all aspects of network security on a 24/7/365 basis. Contribute to team effectiveness through internal and external training and Continual Service Improvement actions
  • Monitor, contextualize and provide reporting on a wide variety of network data feeds including but not limited to network logs, syslogs, firewall logs, netflow data, and IDS/IPS logs
  • Leveraging extensive experience in network exploitation and defense, maintain a current knowledge of attack vectors and methodologies and apply this knowledge to identify vulnerabilities in an assigned network
  • Apply a thorough understanding of SPLUNK development skills to review, revise and refine Security Operations Center data collection, aggregation and correlation in support of Continual Service Improvement efforts
  • Serve as Incident Lead for response actions to security incidents including but not limited to External Cyber Attacks, Security Violations, Insider Threat Behaviors, Classified Spillages and Configuration-based Threats
  • Represent the Security Team in collaborative efforts across multiple Operations and Maintenance Teams to ensure risk awareness, security best-practices, and to assist these teams in deploying and maintaining the network at the lowest possible risk accepted by the client
  • Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions
  • Conducts risk and vulnerability assessment at the network, system and application level
  • Conducts threat modeling exercises
  • Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs
  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
  • Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy
  • Prepares security reports to regulatory agencies
  • Audits and manages access management
  • Bachelor's degree in Computer Science or related field and 4+ years experience, or equivalent combination of education and experience
  • Experience in network, host, data and/or application security in a Windows/Unix/Linux operating environment
  • Advanced understanding of Splunk and Enterprise Security to include experience administering these systems, assessing new technologies and integrating those datasets into Splunk, and building queries, dashboards, and monitoring protocols within Splunk
  • Understanding of Windows/Linux operating systems and command line tools
  • A solid foundation in networking, with a deep understanding of TCP/IP and other core protocols
  • Experience with network security tools (e.g. Nessus, Wireshark, Snort)
  • Experience with host-based security tools (e.g. Firewalls, IDS/IPS, Proxies)
  • Experience reviewing raw log files, and data correlation (i.e. firewall, Netflow, IDS, syslogs)
  • Demonstrable knowledge of attack vectors, threat tactics, attacker techniques, and the Cyber Kill Chain
  • Knowledge of network-based services and client/server applications
  • Experience with programming/scripting languages (e.g.Python/Perl)
  • Background in information security operations e.g. incident response and monitoring services
  • Experience with enterprise information security data management tools/SIEM such as ArcSight or Splunk
  • Experience with improving signature quality and detection through results analysis and team collaboration
  • Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and authentication technologies
  • Possess one or more security related certifications, preferably GCIH or equivalent, CEH, etc
  • Ability to administer the operations of a security infrastructure
53

Splunk Developer With Top Secret Clearance Resume Examples & Samples

  • Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Develops, tests and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools
  • Provides complex engineering analysis and support for firewalls, routers, networks and operating systems. Performs and evaluates vulnerability scans within a multi-platform, large enterprise environment. Reacts to and initiates corrective action regarding security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security
  • Oversees user access process to ensure operational integrity of the system. Enforces the information security configuration and maintains system for issuing, protecting, changing and revoking passwords
  • Develops technical and programmatic assessments, evaluates engineering and integration initiatives and provides technical support to assess security policies, standards and guidelines. Develops, implements, enforces and communicates security policies and/or plans for data, software applications, hardware and telecommunications
  • Assesses the impact on the business unit/customer caused by theft, destruction, alteration or denial of access to information and reports to senior management
  • Assume full functional ownership of the SPLUNK platform, maintaining all aspects of the platform and associated apps at peak effectiveness
  • Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and access-lists
  • Four or more years of experience in network, host, data and/or application security in a Windows/Unix/Linux operating environment
  • Four or more years of experience Advanced understanding of Splunk and Enterprise Security to include experience administering these systems, assessing new technologies and integrating those datasets into Splunk, and building queries, dashboards, and monitoring protocols within Splunk
54

Splunk Developer Resume Examples & Samples

  • Establish and ensure adoption of best practices and development standards
  • Design and optimize Splunk architecture for large-scale/distributed deployments
  • Design and customize complex search queries, and promote advanced searching, forensics and analytics, Develop dashboards, data models, reports and optimize their performance. Develop alerts and timed reports Develop and manage Splunk applications
  • Working knowledge of scripting languages (e.g. Unix, Python, Pearl, etc.)
  • Splunk deployment, configuration and maintenance across a variety of UNIX and Windows platforms
  • Analyze logs for the all major applications and come up with most affected areas or reoccurring issues
  • Maintain a close partnership with Splunk on feature requests, upgrade planning, and product roadmap alignment
  • Undertake day-to-day operational and user support
  • Execute on new projects and data/user onboarding
  • Ensure predictable, consistent, and successful project delivery
  • Provide leadership and key stakeholders with the information and venues to make effective, timely decisions
  • May have people management responsibilities
  • Bachelor degree in Information Technology or related field from an accredited university
  • Experience driving large scale complex efforts
  • Strong sense of ownership & accountability
  • Proven ability to forge strong relationships with stakeholders at all levels
  • Excellent planning and organizational skills is required
  • Excellent verbal, writing and presentation skills is required
  • Self-motivated with the ability to work with minimal supervision and hit the ground running
  • Strong influencing and stakeholder management skills. Ability to influence others at a senior level to adopt new perspectives
  • Sound understanding of business and organizational strategies and processes
  • Banking or financial services experience
  • Splunk Development experience
  • Working knowledge of scripting languages
  • Agile or Six Sigma experience
55

Splunk Administrator Resume Examples & Samples

  • Maintain all components of a distrubuted SPLUNK infrastructure including indexer clusters, search head clusters, and deployment servers
  • Standardize SPLUNK forwarder deployment, configuration, and maintenance across a variety of UNIX and Windows platforms
  • Monitor the SPLUNK infrastructure for capacity planning, system health, availability, and optimization
  • Bring new data into the SPLUNK platform per client request, creating custom sourcetypes when necessary
  • During on-boarding and as needed create rules for compliance and audit requirements
  • Verify custom reports, manage log source groups, and validate log sources with client
  • Previous Splunk administration or development experience. At least 2 years of Splunk experience required
  • Understanding of Splunk architecture and clustered environments
  • Familiarity with working in the Red Hat Enterprise Linux operating system
  • General Windows and Unix operating system familiarity
  • Previous Splunk Enterprise Security experience
  • Scripting experience in any language
  • Experience in data manipulation and regular expressions
56

Splunk Systems Analyst Resume Examples & Samples

  • Develop metrics and prototypes that can be used to drive business decisions
  • Work with numerous platforms to design, build and deploy statistical models to prevent outages
  • Design, develop and implement R&D and pre-product prototype solutions and implementation of those solutions using statistical analysis tools (e.g. R, SAS,SPSS), and software development technologies (e.g. Python, Java, C/C++, .NET)
  • Establish scalable, efficient, automated processes for model development, model validation, model implementation and large scale data analysis
  • Strong background in statistical concepts and modeling
  • Working knowledge of XML, Javascript, HTML, regular expressions, SQL, Shell Scripting, Python and etc
  • Proficiency with statistical analysis tools (R/SAS/SPSS/Python)
  • Experience in Application design
  • Experience with machine data originating from IT infrastructure, applications, etc
  • Experience solving analytical problems using qualitative approaches
  • Excellent at data visualization and presentation
  • Experience with big data (Hadoop)
  • Bachelor's Degree in an Information Technology, or related discipline (e.g., Computer Science, Management Information Systems (MIS), Math, Information Systems) and a minimum of four years of related work experience designing, developing, programming and/or supporting IT Systems and applications
  • In lieu of a Bachelor's degree, a minimum of six years of related work experience designing, developing, programming and/or supporting IT Systems and applications may be accepted
  • Technical aptitude and in-depth knowledge of IT technologies, software applications, programming languages, and adjacent systems and data exchanges
  • Analytical and problem solving skills including the ability to investigate, assess and recommend solutions
  • Knowledge of industry tools and techniques used to elicit, prioritize, organize, document, model and analyze technical requirements
  • Interpersonal skills with the ability to effectively interact with others
  • Listening, verbal and written communications skills
  • Ability to collaborate in a team-oriented environment with tight deadlines and changing priorities
  • Organization skills with the ability to work on multiple projects and/or assignments simultaneously
  • Negotiation skills with the ability to find successful resolutions for moderately complex issues
  • Ability to coach and help others learn knowledge or skills in a specific area
57

Splunk Specialist Resume Examples & Samples

  • Ability to develop content and generate reports utilizing Splunk or related SIEM and/or analytic technologies
  • Previous experience supporting and/or developing cyber and information security architectures, especially requirements definition and specification
  • A minimum of 1+ years utilizing Splunk application tool
  • Knowledge of cyber security threats, vulnerabilities, protection measures and technologies
  • Proficient knowledge of the cyber security industry and measures/techniques applied to both measure and reduce risk
  • Experience working in large multilayer global organizations with competing IT interests and goals
  • Knowledge of cryptography/public key infrastructure, operating system architecture, TCP/IP and Web application protocols
  • CISSP certification (preferred)
58

Splunk Architect Resume Examples & Samples

  • Board internal clients onto Splunk, support project in multi
  • Tenant Splunk installations, develop advanced reports to meet the requirements of key stakeholders, and develop scalable security management tools and processes. Conduct research in areas, including security principles, host and network based security technologies, machine learning algorithms, and mitigation methods. Engineer, configure, and deploy enterprise SIEM, SEM, and log management solutions, develop automation for security tools management, and create customized searches and applications using programming and development expertise, including Java, python, shell scripting, and regular expression. Automate deployment, integration, and testing of enterprise system and services and create and optimize big data correlations as a Splunk search language (SPL) expert. This position may require travel to locations, including DC, NY, CT, and CA
  • Experience with working in a large enterprise environment and integrating solutions in a multi
  • Vendor environment
  • Scale operations and maintenance environments
59

Splunk Security Tools Engineer Resume Examples & Samples

  • Perform installation, configuration management, capacity planning, license management, data integration, data transformation, field extraction, event parsing, data preview, and application management of Splunk platform
  • Troubleshoot Splunk indexers, search heads, heavy forwarder and forwarder issues
  • Continuously engage with IT & security management, project managers, technical staff, and enterprise peers to achieve organizational data science goals
  • Provide reports on an ongoing basis in regards to Splunk license utilization and forecast
  • Experience working in a globally distributed enterpriser environment
  • Bachelor’s Degree or documented equivalent work experience of at least 4+ years
  • Splunk Architect Certification or 1 + years Enterprise Splunk management experience
60

Splunk Developer Intern Resume Examples & Samples

  • At least two years of experience with the Java programming language
  • Ability to learn new technology and willingness to work with teammates to understand and solve complex problems
  • Willingness to engage in self-directed training on Splunk, where needed (we will provide online access to Splunk training material, in additional to any material found on the web)
  • Able to have fun while working hard!
  • Any prior experience or exposure to Splunk is a big plus
61

Splunk Specialist Resume Examples & Samples

  • Supporting the development of the end-to-end IT Security Architecture for GTO’s first line of defense role in Cyber Security. The architecture will include network, systems and data components
  • Constructing a scalable, flexible and implementable security architecture of integrated (standards-based) capabilities with detailed reference architectures that will be ingested by all of DB’s networks, systems and applications. The architecture must be able to be efficiently implemented to enable higher level capabilities (using the OSI services interconnection model) to use security services available across DB’s corporate network
  • Satisfying internal DB cyber policies, controls and risk appetite, and compliance with all external regulatory requirements relevant to the geographic locations where DB conducts business
  • Integrating with GTO’s overall IT vision/strategy/architecture
62

Splunk Cyber Engineer Resume Examples & Samples

  • Understand and identify new vulnerabilities and attack vectors to actively hunt for threats
  • Re-write and update sensor/packages to support custom requirements and build dashboards to satisfied customer’s needs
  • Collaborate with clients regarding the nature of the system vulnerabilities and recommended remediation steps
  • Able to use various COTS and custom platforms to gather statistic to proactively scan the enterprise for malware
  • Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints
  • Provide staff and users with assistance in solving computer related problems, such as malfunctions and program problems
  • Test and monitor computer systems, including coordinating the installation of computer programs and systems
  • Conduct root-cause analysis of noted system performance issues
  • Apply the Concept of Operations (CONOP) set of disciplines for the planning, analysis, design, construction and operation of information systems across a major sector of the organization
  • Develop analytical and computational techniques and methodology for problem solutions
  • Test, debug, and assist in the refinement of system products
  • Apply, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk analysis and modern business methods and performance measurement techniques
  • Assist in establishing standards for information systems procedures
  • Experience as a Splunk Knowledge Manager or Splunk Power user
  • Experience with collecting, ingesting, analyzing, and visualizing machine data with Splunk
  • Experience with Splunk dashboards and creating complex queries
  • Experience with the Splunk Security App
  • Experience with malware identification, analysis, and event resolution
  • Experience with Security Information Event Management (SIEM)
  • Experience with Splunk in an AWS or similar environment
  • Experience with intrusion detection (IDS)/Host-Based IDS
63

Splunk Security Engineer Resume Examples & Samples

  • Standardize and implement Splunk Universal Forwarder deployment, configuration and maintenance in Linux and Windows platforms
  • Continuously engage with enterprise stakeholders to achieve enterprise security goals
  • Store, manage, and ensure availability of historical data to satisfy retention policies and storage requirements by source
  • Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance
  • Experience with IDS, IPS, and SIEM appliance architecture, operations, and management
  • Experience working in a globally distributed enterprise environment
  • Knowledge of Splunk architecture and standard design practices
  • Experience with Splunk data analysis and methodologies applied to log data
  • Knowledge of Linux, Cisco and Microsoft operating system infrastructures
  • Knowledge of TCP/IP protocols and packet analysis troubleshooting
  • Experience using regex (regular expressions) with a scripting language. Experience with perl regular expressions are preferred, but use of regex objects in any scripting language (bash, python, c++, ruby, etc.) is acceptable
  • Experience with Splunk utilization of Hadoop (HUNK)
  • 2+ years Enterprise Splunk design and implementation experience
64

Splunk Admin Resume Examples & Samples

  • Should have strong Splunk Administration experience
  • Strong experience with Splunk 6.x product, distributed Splunk architecture and components including search heads, indexes and forwarders
  • Should have experience configuring Clustered Indexers, Clustered Search Heads, License Management, Heavy Forwarder Configuration, sys log onboarding
  • Expertise in customizing Splunk for Monitoring, Application Management and Security as per customer requirements and industry best practice
  • Expert in Splunk Forwarder installation and management on Linux, Unix and Windows Servers
  • Expert on Splunk Configuration files
  • Debug Splunk related integration issues
  • Expert in installing and using Splunk apps for UNIX and Linux (Splunk nix)
  • Splunk integration with LDAP
  • Syslogs and network devices/infrastructure logs, application logs onboarding
  • Should be able to create scripts for automatic forwarder installation on Windows and Linux servers
  • Should have experience with Splunk DB connect App
  • AWS Experience and Splunk Admin certification plus points
65

Senior Splunk Administrator Resume Examples & Samples

  • Serve in the role of technical subject matter expert, assisting in upholding search best practices, through user activity audits, and functional alerting
  • Responsible for suggesting improvements and additional functionality as feedback for Splunk roadmap
  • Collaborate with the engineering team, application developers, management, and infrastructure teams to assess near- and long-term needs
  • Assist with improving the standards of the consumers experience by providing metric visibility into applications performance
  • Provide expertise to support groups that require performance and troubleshooting guidance. Including query tuning and upholding best practices
  • Participate in design documentation of monitoring related solutions
  • Plan, engineer, and implement robust and cost-effective computing environments, exploiting emerging technologies to provide compelling solutions
  • Participate in process development with customers and service providers
  • Effectively communicate tool capabilities and processes to varying stakeholders
  • Bachelor’s degree in Computer Science, Information Technology, Mathematics, Business Administration, or a related field; or, an equivalent combination of education and related work experience
  • Minimum of 5 years of experience with implementation, operations, maintenance of IT systems and/or administration of software functions in multi-platform and multi-system environments
  • Experience with administration of Splunk in a production environment
  • Deep understanding of Splunk configuration/architecture and able to debug issues
  • Assist design solutions and concepts for data aggregation and visualization
  • Understand Splunk data workflow and provide troubleshooting and feedback for improvement
  • Must have strong Splunk UI experience and ability to debug complex/expensive search queries
  • Experience implementing and delivering monitoring solutions in development, QA, and Production environments
  • Understanding and experience with configuration management tools and concepts such as Puppet, Chef, CloudFormation, and similar
  • Understanding and focus on security processes and data handling practices
  • Experience with monitoring solutions and methodologies, including server and network performance, hardware, and web synthetics; application performance monitoring a plus, including, but not limited to, New Relic, ScienceLogic, Splunk, ExtraHop, AppDynamics, DynaTrace, KeyNote, Microsoft SCOM, Solarwinds Orion
  • Understanding and basic technology skills to include, but not limited to: Oracle, MS SQL, MySQL, logging practices, GIT/SVN, Redhat Linux, Microsoft Windows, iOS mobile devices, Android mobile devices, Amazon Web Services, JSON, Java/JBOSS, and Jetty
  • Advanced scripting skills to include, but not limited to: shell scripts and supporting program languages – Python, Regular Expression, Bash, Ruby, Perl, JavaScript, and Selenium
  • Solid foundation in computer and operating systems, understanding performance metrics, statistical calculations, systems troubleshooting, runbook automation
  • Strong communication skills and ability to interact with management and all teams involved in the operational or development process
66

Splunk Solution Architect Resume Examples & Samples

  • Collaborate with Splunk Business Partner and technical consultants to provide support for system issues, or introduce new solutions
  • Help manage the strategy of the Splunk Business Unit within the company
  • Monitor Splunk internal logs to identify and resolve potential performance issues
  • Troubleshoot technical issues to determine root cause and resolve or implement workaround as necessary
  • 14+ years’ IT experience in a technical position
  • 4+ years' experience with Splunk
  • Hands-on experience installing, configuring and administering Splunk
  • Proficiency with Linux and Windows platforms
  • Familiar with various distributed compute environments including client- server, VMs, AWS, GCP
  • Experience with one or more programming/scripting languages (e.g., Perl, Python, Java)
  • Familiarity with network based storage technologies
  • Understanding of the function, operations and management of network infrastructure components (switches, routers, firewalls, load balancers, etc.)
  • Knowledge and experience in proposal development and preparation is desirable
67

Operations Engineer, Splunk Resume Examples & Samples

  • Thoroughly documents system configuration and changes using Confluence
  • Collaborates with vendor and internal teams on technology challenges and trends
  • Experience with administration of Splunk Search Heads Clustering, Indexers, and Forwarders
  • Evaluation and implementation best practices and standards
  • Drive monitoring strategies, processes and resource planning with internal teams such as development teams and application Support Teams
  • Automate and optimize processes where efficiencies can be gained
  • Splunk Search Head Clustering Administration
  • 5+ years in a Linux / Unix Operations Production Support role or similar role
  • 2+ years SQL experience
  • Products used are primarily (but not limited to) Splunk Search Head Clustering
  • Synthetic Monitoring experience/Transaction Based Monitoring
  • 3+ years analyzing, designing, installing and maintaining computer systems/servers
  • 3+ years performing configuration and maintenance of Sun, Linux, AIX and windows systems
  • Hands on knowledge of HP Monitoring tools such as BPM, BSM, OMi, and SiteScope
  • Hands on knowledge of Java, HTML, XML, MySQL, LAMP programming
  • Working Knowledge of VMWare, Citrix
  • Excellent customer service, communication (written and verbal), and interpersonal skills
68

Senior Splunk Developer Resume Examples & Samples

  • Possesses excellent technical acumen
  • Understand code development and deployment processes and implement best practices in development and deployment practices
  • Understand application availability and strives towards keeping applications up and stable in multiple application environments
  • Quickly analyze business and technology challenges and recommends appropriate IT solutions and services in a real-time support environment
  • Resolve issues that cross multiple systems or departments that may affect the application stability
  • Understand the importance of source code configuration management
  • Track open issues and the resolution of issues
  • Be a self-motivated and focused individual who enjoys a fast paced environment requiring attention to detail
  • 4 Year Degree or equivalent experience
  • 5 – 7 Years of related experience in a multi-tiered application environment
  • Strong background in system design, development, architecture and application deployment
  • Excellent communication, problem-solving and decision making skills
  • Strong teamwork and collaboration skills
  • Ability to perform detailed analysis of business problems and technical environment
  • OS: Well-versed in Linux commands
  • Understanding of application logging and logging best practices
  • Good understanding of Splunk architecture, components and add-ons
  • Proven track record in developing Splunk apps and deploying code to various Splunk components
  • Exposed to Splunk configuration required to onboard data into Splunk
  • Fluent in Splunk queries to build alerts, dashboards and reports in Splunk
  • Troubleshoot and resolve Splunk configuration issues
  • Exposure to database systems such as SQL Server, Oracle, etc. and networking infrastructure such as firewall, load balancers, DNS, active directory, etc
69

Senior Splunk Application Engineer Resume Examples & Samples

  • Supports the best practices in engineering, design planning and aligned project management of all build activities for a specific new or existing application or system within GIS
  • Maintains solid interpersonal skills to engage across multiple levels of the firm, in cross business discussions within a matrixed, geographically dispersed organization and to build a solid network of peers and others of influence. Adapts personal communication style to the style of others, develops rapport and stays calm under pressure or escalating issues using advanced oral and written English communication skills
  • Projects solid consultative skill to conduct effective questioning, hone in on key directives to formulate ideas and materials as well as present those ideas clearly and concisely across the organization
  • Maintains an advanced knowledge of services and applications with the assigned GIS processes and operating environment to recognize and position improvement opportunities and next generation solutions achievable through engineering
  • Manifests analytical and problem solving ability to escalate and negotiate conflicting engineering issues, handle multiple and shifting engineering priorities across a broad spectrum of operating environments and provide solutions that are both financially sound and operationally feasible
  • Develops an in depth and continuous understanding of EY’s business and the way IT’s Engineering teams adds to the effectiveness of the EY business. Identifies and positions appropriate services and solutions as part of both knowledge sharing and engineering services remit
  • Manage engineering projects by delegating work effectively utilizing the proper people, time and project management disciplines across a diverse culture and multiple time zones. Works to resolve team conflicts through an ability to implement and communicate difficult decisions as well as provide individual, team and peer mentoring as appropriate
  • Excellent knowledge in the Splunk Enterprise Product as an Administrator (cluster administration)
  • Deep knowledge in Splunk Architecture
  • Deep knowledge as Splunk App Developer
  • Knowledge in the Splunk Enterprise Security Application would be beneficial
  • Advanced scripting or entry level programming skills
  • 3+ years in a multi terabyte Splunk environment
70

Splunk Architect With Top Secret Clearance Resume Examples & Samples

  • Assume full functional responsibility for the SPLUNK platform, maintaining all aspects of the platform and associated apps at peak effectiveness
  • Develop Splunk dashboards and associated charts, graphs, and drill downs to enable managers, administrators, users and analysts to maximize the utility of the Splunk platform and applications
  • Through collaboration with subject matter experts from a wide variety of security and Information Technology teams, research, develop, and foster adoption and/or expansion of additional use cases to meet mission functions of those teams
  • Advise and execute Splunk maintenance, patching and upgrades
  • Train Administrators, Knowledge Managers, Developers and Users to maximize the utility of Splunk solutions within their mission areas. Serve as a mentor for users seeking Splunk Power User and Admin Certifications
  • Six or more years of experience in as an engineer, administrator or user of a SIEM
  • At least four years of direct experience creating security solutions with Splunk
  • Demonstrable expertise with Network Intrusion Detection/Prevention systems and host-based Intrusion Detection/Prevention systems
71

Splunk Cyber Security Expert Resume Examples & Samples

  • Coordinate recommendations and/or requests to change LOB or customer process, procedures, or strategies with the relevant stakeholders
  • Management of Splunk event collection, parsing, and content
  • Participate in the content review / approval process
  • Migrate SIEM content from McAfee ESM to Splunk ES
  • Provide Training, Documentation and communication to SOC LOB
  • Conduct regular content review with stakeholders
  • Assist analyst by reviewing logs and coming up with content
  • Trend analysis to tune and/or develop content
  • Understanding customer specific security technology
  • Customer Security Event SME
  • Reducing ‘noise’ in the Splunk for SOC analyst per assigned customer
  • Event review use case development in Splunk ES
  • Interface with Primary and Secondary technical POC
  • US citizenship. Ability to obtain Secret clearance
  • Expert level understanding of Splunk, particularly
72

Splunk Security Engineer Resume Examples & Samples

  • 3+ year of work experience with Splunk real-time processing architecture and deployment and Splunk dashboard design
  • Bachelor in an IT related concentration
  • Must be proficient in Splunk Processing Language
  • Strong experience and comfort operating in the Linux CLI and Splunk .conf files
  • Experience with software development, system architecture, and/or databases a plus
  • Splunk certification(s) a plus but not required as long as functional experience is valid
  • Experience in requirements analysis, engineering, product testing in test lab/real world environments
  • Experience with the Splunk Common Information Model (CIM)
  • Experience in SOAP, REST API, web-based technologies and scripting languages including JavaScript, Python and shell scripting, XML, HTML is a plus
  • Strong communication, written, and verbal skills
  • Ability and comfort level to do presentations to potential and existing customer audiences of 5-30 people
73

Splunk Administrator / Engineer Resume Examples & Samples

  • Support large-scale deployments with data feeds from multiple on premise data centers
  • Monitor and maintain Splunk performance, availability, and capacity
  • Track work effectively via Agile methods
  • Maintain regulatory awareness and compliance
  • Experience with programming a plus
  • Experience with various security tools, including Wireshark, Nessus, Nmap, Burp, Proxy, or Snort a plus
  • Splunk Certified Administrator, Splunk Certified Architect and/or Splunk Certifie
  • Consultant – not required but strongly preferred
74

Splunk Cyber Engineer Resume Examples & Samples

  • 12 Years of job related experience and a High School/GED diploma
  • 6 Years of job related experience and a Master’s degree
  • 4 Years of job related experience and a Doctorate
75

Splunk Content Engineer Resume Examples & Samples

  • Experience with Splunk
  • Experience with network security, system security, and supporting Security Event Management (SEM) tools
  • Experience with working in a large enterprise environment and integrating solutions in a multi–vendor environment
  • Knowledge of rule and advanced logic creation in Splunk
  • BA or BS degree or 4 years of experience with information technology or network security
  • Experience with enterprise–scale operations and maintenance environments
  • Experience with rule and advanced logic creation in Splunk
76

Splunk Architect Resume Examples & Samples

  • 1+ years of experience with Splunk
  • Experience in interacting with clients and conducting onboarding, configuration, and optimization using Splunk ES
  • Splunk Architect and Splunk Power User Certifications
77

Splunk Architect Resume Examples & Samples

  • Experience with client interaction, including onboarding, configuration, and optimization with Splunk and ES
  • Experience with network security and system security, including supporting SEM tools
  • Knowledge of security technologies, information security and networking
78

Splunk Security Engineer Resume Examples & Samples

  • Standardize and implement Splunk Universal Forwarder deployment, configuration, and maintenance in Linux and Windows platforms
  • Store, manage, and ensure the availability of historical data to satisfy retention policies and storage requirements by source
  • More than 2 years of enterprise Splunk design and implementation experience is desired
  • Experience with Splunk utilization of Hadoop (HUNK) is desired
79

Splunk Developer Resume Examples & Samples

  • Subject Matter Expert (SME) within the Security Operations Team for GSO SIEM Security technologies
  • Provide backup support for other solutions network security solutions
  • Provide weekly status reports and tracking of all personally assigned projects
  • Participate in on-call 24x7 rotation for operational support incidents. Periodically this will require covering nights and weekends supported technologies
  • Support client facing / end user helpdesk and other IT Support Team's escalations 24x7
  • Responsible for maintaining service SLAs
  • Ensuring support tickets are fully updated with the most current data. Provide proper escalations and handoffs to management and support staff
  • Act as a Subject Matter Expert and provide backup support, training and mentoring on all team supported security technologies
  • Candidate will need to become familiar with all Symantec's security policies and standards and the Symantec change control environment
  • Participate and collaborate on Change Control that involve changes within the Symantec Enterprise
  • Responsible to ensure that supported security technologies are feeding the Security Log Platforms
  • Ensure that the operations team keeps all run books and topology / data flow drawings for each solution up-to-date and current
  • Achieve Certifications in Symantec and 3rd party security platforms that the team is responsible to administer
  • Candidate willing to submit to an enhanced background check which includes credit verification
  • Candidate must have (4-6 years) working in security operations
  • College degree BS preferred
  • Travel requirements <=25% that would include GSO
  • IT Security and Information Technology Infrastructure Library (ITIL) Certifications are a plus
  • IT Security certifications are a plus (CISSP, CISM, CISA, SANS, Security+, etc.)
  • Candidate must have good verbal and written communication skills
  • Vendor - Product Certifications preferred
  • Hands on Operational Experience with many of the following products
  • Expert: Splunk Ver 6.x Principal Splunk Developer – Splunk Training Cert are a Plus
  • Expert: Balabit Syslog-NG
  • Expert: UNIX - Red Hat Enterprise 6.x & 7.x – Shell & Perl Scripting – RHEL Cert is a Plus
  • Expert: Programming & Scripting in Shell, PERL, Python, Splunk Software Development Kit (SDK)
  • Knowledge: Windows Server 2008, 2012 & Power Shell
  • Knowledge: Ticketing systems i.e. Service Now
80

Splunk Developer Resume Examples & Samples

  • Experience with Unix command line interface (CLI)
  • 1+ years experience in IT supporting software products, preferably Splunk
  • Ability to multitask and solve technical problems
  • Experience building regular expressions is preferred
  • Experience in one or more Linux scripting languages (ie: Shell, Perl, Python)
  • Object Oriented experience with languages such as C/C++ is a plus
  • Unit test experience is a plus
  • RESTful/JSON experience is a plus
  • Maven, Git, and Jenkins experience is a plus
  • Understanding Design Patterns is a plus
  • Splunk administrator certification is a plus, but not required
  • A strong interest in technology with the desire to continually learn
  • Ability to adapt to changing priorities
81

Senior Software Administrator Splunk Resume Examples & Samples

  • Support datacenter infrastructure application build, deployment, and sustainment such as: Splunk and VMWARE vRealize Suite
  • Create documentation on build, deployment, and sustainment processes and procedures for application use in cloud capable datacenter
  • Independent judgment is required to troubleshoot and resolve issues in a minimum amount of time. Efficiently communicate progress towards resolution of outages to management
  • Stay appraised of emerging security vulnerabilities; coordinate with external resources if necessary, and provide mitigation with minimal developer impact
  • Work closely with other departments to meet requirements
  • Respond to security audits (both manual and automated) to maintain compliance where appropriate. Proactively monitor and audit space and memory usage of various common good applications; reallocating resources as needed to maintain service and performance
  • Monitor system and performance metrics using standard tools, autonomously responding to trends as appropriate to maintain or exceed expected performance
  • Monitor systems metrics and develop reports as needed for system analysis
  • Provide technical solutions as required to support engineering initiatives
  • Support accrediting applications in the DoD RMF certification process
  • ITILv3 certification
  • Training on BMC products – Remedy, Atrium, ADDM
  • Comptia Security+ and Windows OS certification are required
82

Principal Splunk Architect Resume Examples & Samples

  • Design, engineer, configure and administer Splunk content
  • Operate, develop for, and maintain the Splunk log management infrastructure, leverage knowledge on a number of security technologies, information security, and networking
  • Manage Splunk and related hardware infrastructure, oversee production support, design the Splunk system to meet growth while maintaining a balance between performance, stability, and agility, and develop advanced scripts for the manipulation of multiple data repositories to support analyst requirements
  • Develop automation for security tools management, and create customized searches and applications using programming and development expertise
  • Conduct research in areas including security principles, host and network-based security technologies, machine learning algorithms, and mitigation methods
  • Assist in the proper operation and performance of Splunk, loggers and connectors
  • Perform Content Development to properly identify data feeding SIEMs and correlation of events
  • Develop filters to assist in the identification of significant events
  • Provide recommendations and implement changes to optimize Splunk products in the customer environment
  • Write and develop custom scripts and programs as needed
  • Minimum of 7 years of experience with the design, configuration, and support of Splunk 6.x, or similar
83

Cots Splunk Administrator Resume Examples & Samples

  • Advanced knowledge of logging and troubleshooting
  • HTTP/XML programming experience
  • Strong interpersonal and communication skills, written and oral
  • Understanding of Data Security principles and practices
  • Hands-on experience with Splunk or other data consolidation / data mining technologies
  • Scripting experience with Regular Expressions, Python, Javascript, XML or other languages
  • On call support required ( 24/7) as needed
  • Perform work required for this position in an office environment
  • Ability to develop and promote effective working relationships with all levels of staff and clients
  • Ability to solve problem of a complex technical nature for extended periods of time, requiring a great deal of attention to detail
  • Ability to work with disparate pieces of information
  • Highly developed analytical, organization and problem solving skills and the ability to focus attention on details
84

Remote Splunk Administrator Resume Examples & Samples

  • 1) Majority of this role will involve Strong background in Unix/Linux system administration, including command line and scripting, Syslogs, ryslog etc..performance analysis and tuning experience related to logging
  • 2) 5+ years of Splunk support with agent experience, troubleshooting, installation, and configuration. Experience with Splunk in a large, distributed enterprise environment with a high ingestion rate (multiple TB of data per day) Experience with clustered search heads, forwarders & indexers - fault tolerant solutions at a data center level. Strong, focused experience in the instrumentation and ingestion of data feeds into Splunk (this position is responsible for getting data forwarded into the Splunk environment)
  • 3) Shell Scripting - Ability to create scripts from scratch and strong ability for command line changes
85

Advisory Senior Consultant Cybersecurity Splunk Resume Examples & Samples

  • Consistently deliver quality client services. Monitor progress, manage risk, and ensure key stakeholders are kept informed about progress and expected outcomes. Stay abreast of current business and industry trends relevant to the client's business
  • Establish appropriate business relationships with client personnel
  • Possess good business acumen
  • Remain current on new developments in advisory services capabilities and industry knowledge
  • A minimum of 1 year of related work experience with cybersecurity systems with hands-on Splunk technical infrastructure and implementation experience
  • Knowledge of general security concepts and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures, and governance
  • Experience in process definition, workflow design and process mapping
  • Demonstrated characteristics of a forward thinker and self-motivator who thrives on new challenges and adapts to learning new knowledge
  • A military/government background is a plus
  • Able to work collaboratively in a team environment
86

Senior Splunk Architect Resume Examples & Samples

  • Considered an expert Splunk Architect
  • Technically familiar with Splunk Enterprise Security or Splunk IT Service Intelligence
  • Are familiar with micro-service architectures, decoupled systems and how to monitor them
  • Have a passion for Data Analytics
  • Strive for simplicity in the solutions you build for ease of use by others
  • Know how to write outward facing documentation to support your solutions
  • Believe in CI/CD philosophies and have practiced it in the past
  • Are a fast learner and can see the bigger picture for the business
  • Believe data analytics drive results and shorten detection of issues and remediation
  • Design, implement, and improve an enterprise Splunk environment from early stages to a mature implementation through participating with Agile SCRUM teams to deliver monitoring and data analytics solutions
  • Place emphasis on quality while driving toward expected results
  • Responsible for documenting strategic plans, issues and resolutions via ticket system for present/future reference
  • Accountability/Self-Directing: Takes ownership of tasks and follows through to results; understands own strengths/weaknesses; holds self-accountable and completes tasks and projects
  • Quality of Work: Performs work with accuracy, efficiency, thoroughness, and effectiveness; is attentive to detail and accuracy, is committed to excellence, continuously looks for improvements
  • Minimum 7 years in logging and monitoring engineering
  • Minimum 6 years hands on experience in engineering and supporting large scale Splunk or similar event logging solutions for large corporations is preferred
  • Splunk Architect certification is a plus
87

Splunk Data Analyst & Developer Resume Examples & Samples

  • You welcome the challenge of big data and are proficient in R/Python, C#, and statistical modeling
  • Self-driven, takes initiative and desires to work in a dynamic, busy and innovative group
  • Have a passion for Data Analytics and understand the value
  • Support large-scale deployments across multiple Data Centers, with data feeds from multiple on premise data centers and Cloud based applications
  • Working with the SCRUM & Operations teams to prototype, develop and refine data-driven product metrics and features
  • Investigate/Research data to explore and come up with innovative features and improvements to the engineering/development pipeline and operational efficiencies
  • Helping to govern and manage the enormous and complex pipeline of data that we use in our video platforms and decision making Helping to develop the skills of the entire team as data-savvy leaders who ask great questions and make informed decisions with data analytics
  • Develop Splunk dashboards, visualizations, configurations, reports and search capabilities using customized Splunk queries
  • Execution/Results Focus: Translates ideas into actions and results; adapts to changing conditions and unexpected challenges; focuses on successful completion of priorities; consistently meets deadlines; anticipates and overcomes task barriers
  • Communication: Communicates information, ideas and opinions professionally with clarity; works cooperatively and professionally with others; has good listening skills, excellent verbal and written communications skills; is flexible/open-minded; solicits feedback and effectively handles constructive criticism
  • Master or Bachelor in Statistics/Math/Computer Science or related field
  • Minimum 4 years in logging and monitoring engineering
  • Minimum 2 years hands on experience in engineering and supporting large scale Splunk or similar event logging solutions for large corporations is preferred
  • Splunk Certified Power User/Administrator is a plus
  • 4+ years of relevant programming skills data mining, big data, machine learning, natural language processing, and similar experiences is a plus
  • Experience and proficiency in coding skills in C#, Python, Perl, SQL, Regex and Shell scripting
  • Excellent oral & written communication skills, able to interact effectively with development
88

Splunk Security Engineer Resume Examples & Samples

  • Demonstrate a mastery of Splunk and its components
  • Provide deployment strategies with the understanding of affordable risk based on customer acceptance
  • Develop dashboards with visual metrics for stakeholders
  • Maintain the overall Splunk solution to include maintenance, enhancements and integration
  • Support testing of new integrations for infrastructure and production performance
  • Bachelor’s degree in Computer and Information Systems, Engineering, Science, or Mathematics
  • 8-10+ year’s concentration in performing cyber security engineering
  • DoD-8570.01M compliant IAT or IAM Level II certification
  • Knowledge of and practical experience of integration of COTS or open source tools into Splunk
  • Experience with Splunk query language
  • Strong analytical and programming skills
89

Splunk Technical Lead / Developer Resume Examples & Samples

  • Design and development of data reporting and analytics tools to support EDC operations and management
  • Provide technical support and leadership for near-shore team
  • Work with risk manager to implement risk rules (TAP, SoD, SDLC, etc.)
  • Engage with end-users on business requirements and support
90

Splunk Security Engineer Resume Examples & Samples

  • Splunk Enterprise Security configuration
  • Splunk architecture and design for both on premise and AWS cloud
  • Familiarity with Palo Alto NGFW and VPN
  • Strong willingness to accept new projects and learn new tools
  • Provide security consulting to project and development teams in the area of information security
  • Articulate in PCI policies, standards, and procedures
  • Functional understanding of TCP/IP networksand firewalls
  • Level of DDOS prevention understanding
  • AWS and Azure cloud security
  • F5 APM, ASM, WAF expertise
  • Assist in remediation and responses to audits, vulnerability assessments, and penetration tests
  • Demonstrate analytical and problem solvingskills
  • Proven experience managing numerous projectsand activities simultaneously
  • The abilityto drive qualityinto every product,project and servicethe company provides
  • Willingness to cross training architecture, design, and support of other information security tools
  • Other tool familiarity is a plus: Rapid7, Cisco ASA, Bomgar, Symantec DLP, FIM, Firemon, AirWatch
  • PKI internal and external CA’s and Venify management would be a plus
  • Five or more years of experience in information security
  • Three or more years of Splunk configuration
  • Five or more years of experience in a systemadministration (e.g., Network,Windows, UNIX) role
  • Experience in working with compliance and regulatory programrequirements
  • Experience analyzing network, event, and security logs on premise and cloud
  • Proven projectmanagement and organizational skills, specifically managingmultiple concurrent projects
  • Excellent analytical, problem solving and decision makingskills, applied with a solution-focused attitude
  • Excellent writtencommunication skills, demonstrating the ability to write with purpose, clarity, and accuracy
  • Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance and professionalism
  • Excellent teamworkskills
  • CISSP, CISA, or CISM certifications preferred
91

Splunk Infrastructure Engineer Resume Examples & Samples

  • Strong background in Unix/Linux system administration, including command line and scripting (ideally 5+ years of direct experience running/administering a Splunk instance)
  • 5+ years of Splunk support with agent experience, troubleshooting, installation, and configuration
  • 3+ years of Windows and UNIX administration
  • 2+ years of performance analysis and tuning experience related to logging
  • 2+ years of experience with Splunk application design, architecture, and installation
  • Strong experience in operating systems analysis/engineering
  • Experience with Splunk in a large, distributed enterprise environment with a high ingestion rate (multiple TB of data per day)
  • Experience with clustered search heads, forwarders & indexers – fault tolerant solutions at a datacenter level
  • Strong, focused experience in the instrumentation and ingestion of data feeds into Splunk (this position is responsible for getting data forwarded into the Splunk environment)
  • Experience with rsyslog and other log transport mechanisms
  • Completing props and transform
  • Regular expressions
  • Splunk deployment applications
  • SDLC experience, including Release Management experience
  • Experience with related Splunk apps (like dbconnect)
  • Experience with consolidating/migrating separate Splunk instances into a single environment
  • Experience with other Splunk premium applications – ITSI, UBA, ES, Hunk
  • Netcool experience
  • Follow established standards in the instrumentation of data feeds into Splunk
  • Instrument the feed into a lower environment to sample feed accuracy and data volume
  • Maintain the lifecycle status of the feed in our reporting system
  • Review post-implementation to address any modifications required to a feed
92

Splunk Onboarder Resume Examples & Samples

  • Splunk Admin and Architecture related experience
  • Data on boarding across multiple data sources (windows, linux, API, database, etc)
  • Knowledge of Splunk forwarder management
  • Data normalization (extractions, tags, event types)
  • Understanding of the Splunk Common Information Model
  • Understanding of Splunk Data Models
  • Understanding of Splunk configurations and dependencies
  • Ability to debug configuration issues
  • Understands Splunk architecture and components (search head, deployment server, cluster master, indexers, forwarders (HF/UF)
  • Strong communication skills to work with both collaborative cross-functional team of peers and departments within the company (product development, operations, networking, etc.)
  • Ability to establish priorities, work independently and proceed with objectives
  • Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude
  • Knowledge of system and network architecture and interrelationships (technical and functional)
  • At least 2 year of experience in implementing Splunk, Splunk certifications is a plus
  • At least 2 years of experience in consulting
  • At least 5 years of experience in networking/application/system admin and/or development related roles
  • Familiar with both Windows and Linux based OS
  • Experience with syslogNG is a plus
  • Experience in working with multiple cross-functional teams
  • Highly motivated, able to take ownership of tasks and see through completion
  • Understanding of PCI requirements and support company’s annual PCI audit
  • Splunk Power User or Architect certification - preferred
  • Industry recognized security certifications – preferred
  • Preference for at least one current recognized security professional certification such as CISSP, CISM, CISA or ISO 27001 Lead Auditor
  • Demonstrates the ability to analyze and resolve issues independently
  • Knowledge of project management tasks, experience creating documentation/presentations, and demonstrated ability to train other team members
  • Good organizational, multi-tasking, and time-management skills
  • Ability to successfully pass a client background screening if required
  • Proven ability to work independently and as a team member in a fast paced environment
93

Splunk Developer Resume Examples & Samples

  • To automate, administer, manage, run and make reliable, trustworthy and dependable the processing of production
  • To integrate in production of the new application programs or data processing sequences
  • To configure and parameterize the production equipments
  • To automate the procedures of technical management and pattern matching of alarms
  • To define and implement the procedures of recovery in the event of incident and of restoration of the data. To define, implement and to follow the protection plan and the plans help
  • To implement the standards, standards, rules and procedures of the field to be administer, manage, run and take care of their application program
  • To prepare and upgrade the dashboards, the Handout, specification, instructions, information and the reference frames of production, to transfer knowledge
  • To analyze, treat and capitalize the incidents of production of level 2. To technically assist the administrator of application program and system Junior, the pilots of operations management and the wizards users
  • To formalize the reports of incident and the action plans and to ensure the implementation of it. To put in place, introduce, position rights to use and access, to maintain and put at day
  • Optimize measuring instruments of performance and to produce them referrers
  • To level the pieces of software and the products, to apply the patches. To take part in the projects of change
  • Qualification
94

Splunk Administrator Resume Examples & Samples

  • Splunk experience - minimum 2 to 5 years' experience architecting, configuring, deploying, and customizing the tool
  • Strong understanding of Splunk configuration files and architecture
  • Knowledge of advanced search and reporting commands
  • Demonstrated ability to create complex dashboards, forms, and visualizations
  • Bachelor’s degree in Computer Science, Information Security or related technical field; or 10 - 12 years of relevant work experience
  • Understanding of System Log Files and other structured and non-structured data
  • Intermediate level understanding of Solaris, Linux and Windows operating systems
  • Security+ certification
  • Current Secret Clearance required; SSBI preferred
  • Effective verbal and written communication skills that include the ability to describe highly technical concepts in non-technical terms
  • Splunk Architect or Splunk Administrator certification preferred
  • Knowledge of a scripting language and UNIX command line
  • Experience working in DISA and working with the DISA DECC environment
  • Strong knowledge of application monitoring and event management
  • Knowledge in the Common Information Model (CIM), Understand the relationship between the CIM and knowledge objects, ability to create a lookup file and create a lookup definition& field aliases and calculated fields
95

Splunk Delivery Lead Resume Examples & Samples

  • A full stack engineer developing and delivering solution end to end from design through the delivery
  • Build, Develop and support operational capability in order to provision environments by utilising and creating innovative tools
  • Duties include automation of installation/configuration/management of Splunk 6.x, ELK, App Dynamics, New Relic, Icinga, Nagios, Apache, node.js applications in a secure deployment
  • Responsible for creating an automated capability to patch and manage Windows and Linux (RHEL/CentOS) operating systems
  • Responsible for creating/versioning/testing of scripts (Bash, PowerShell), AWS Cloud Formation templates, Chef, Nagios, Maven/Ant, Git, Jenkins, Perl, and Ruby to achieve a high-level of automation
  • Troubleshoot dev, test and production environment events/issues, including cloud infrastructure and application components
  • UX development using React, Angular.js or Node.js
  • At least 12 months Deployment and management of JAVA, ANT Scripts, J2EE, PHP and .NET based multi-tier application deployments across cloud platforms
  • At least 2 years development experience including bash/shell scripting or any development language
  • At least 1 year of Development experience with React, Angular.js or Node.js
  • Deployed Splunk and/or other Operational monitoring tools
  • Familiarity with RDBMS (Oracle, MySQL, SQL Server)
  • Network experience with route tables, access control lists, firewalls, NAT, HTTP, Load Balancers, DNS, IP and firewall configuration
  • Knowledge of REST Web Services, XML and JSON
  • Experience with orchestration/provisioning with Chef/Puppet and Jenkins
  • LI
96

Splunk Sme-remote Resume Examples & Samples

  • 5+ years of experience with Splunk
  • Expert level with Regular Expression (regex)
  • Splunk front-end and back-end experience
  • Cyber security experience
97

Splunk Developer With Top Secret Clearance Resume Examples & Samples

  • Development and administration of the SPLUNK platform, maintaining all aspects of the platform and associated apps at peak effectiveness
  • Refine and maintain Splunk dashboards and associated charts, graphs, and drilldowns to enable managers, administrators, users and analysts to maximize the utility of the Splunk platform and applications
  • Provide training to Administrators, Knowledge Managers, Developers and Users to maximize the utility of Splunk solutions within their mission areas
  • Maintain up-to-the-minute functional and technical expertise of the Splunk platform and Splunk Applications through a robust relationship with the vendor and global user group
  • Work with supported teams to ensure accuracy and currency of SOPs with regard to procedures which are dependent upon or leverage the Splunk platform
  • Support a SOC watch that operates on 24/7/365 basis
  • Contribute to team effectiveness through internal and external training and Continual Service Improvement actions
  • SIEM development and support for response actions to security incidents including but not limited to External Cyber Attacks, Security Violations, Insider Threat Behaviors, Classified Spillages and Configuration-based Threats
  • Designs and develops new systems, applications, and solutions for external customer's enterprise-wide cyber systems and networks
  • Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration and testing issues. May interface with external entities including law enforcement, intelligence and other government organizations and agencies
  • Bachelor's degree in Computer Science or related field and 4+ years’ experience, or equivalent combination of education and experience
  • Four or more years of experience of advanced understanding of Splunk and Enterprise Security to include experience administering these systems, assessing new technologies and integrating those datasets into Splunk, and building queries, dashboards, and monitoring protocols within Splunk
  • Experience in managing the SPLUNK platform, maintaining all aspects of the platform and associated apps at peak effectiveness
  • Experience maintaining Splunk dashboards and associated charts, graphs, and drilldowns to enable managers, administrators, users and analysts to maximize the utility of the Splunk platform and applications
  • Good analytical and problem solving skills to troubleshoot and resolve network/operating system security issues and associated toolsets used by the SOC
  • Ability to administer the operations of a security infrastructure and integrate enhanced capabilities
  • Good communication and interpersonal skills dealing with a full spectrum of clients
98

Remote Splunk Admin Resume Examples & Samples

  • Working with a data feed owner, the engineer will process intake requests to instruments data feeds into Splunk
  • Open and track requests for related access rights, network config changes, etc that are required for fulfillment of the Splunk feed request
  • Maintain the life-cycle status of the feed in our reporting system
99

Splunk Services Delivery Manager Resume Examples & Samples

  • Work with Services Engagement Managers to achieve a smooth transition of project requirements and help finalize the Statement of Work (SOW)
  • Manage a portfolio of in-region consulting projects with varied complexity and duration, in both high-touch, billable (up to 40%) and low-touch, non-billable capacity
  • Effectively drive engagement kickoff, manage customer expectations, define project staffing needs, and generally ensure customers deploy their Splunk solutions for successful outcomes
  • Execute on engagement activities and deliverables, including activity planning for consultants, preparing weekly status reports, timesheet compliance and billing approvals, while mitigating project risk
  • Ensure consistent project delivery through to engagement closure including customer sign-off and satisfaction surveys, while communicating additional follow-on services opportunities to our Engagement Managers
  • Own the collection and sharing of project artifacts across the Splunk delivery team, and communicate successful engagements details to Splunk’s marketing and sales teams
  • Drive and contribute to internal continuous improvement initiatives aligned to primary business drivers and revenue growth opportunities
  • Communicate with, and manage all internal and external stakeholder expectations across Splunk’s engagement stages, including pre- and post-delivery
  • Ensure all project and revenue details, together with status reporting on project activity and deliverables is captured in Splunk’s Professional Services Automation (PSA) solution
  • 6 -10+ years of related experience in a product company services organization
  • Willing and able to travel up to 50%, as required
  • Ability to conduct effective executive presentations
  • Proven ability to manage multiple projects simultaneously
  • Proven experience in traditional and agile project delivery methodologies
  • Target driven, team-player, and focused on great customer outcomes
  • Experienced in delivering large scale enterprise software projects
100

Splunk Administrator Resume Examples & Samples

  • Responsible for initiating, planning, executing, configuring, and deploying the latest version of Splunk on a Windows or Linux environment
  • Operate and maintain all Enterprise Management functions and perform EM activities managed by customer. Integrate, operate, and maintain COTS and GOTS system management tools to improve the overall operation and maintenance of the customers managed production systems
  • Support system and database administrators, database managers, and desktop support personnel in by updating the configuration of system management tools to meet new/changing mission requirements
  • Prepare, review, and evaluate documentation, specifications, test plans, and procedures
  • Support system test programs and analyze system test results
  • Evaluate emerging technologies for inclusion into current and planned architectures
  • Splunk - Installation, Configuration, Management
  • Red Hat Linux – Level II Systems Administration, Shell Scripting, Patching, Security Configuration
  • Tivoli - Installation, Configuration, Management
  • Web - GOTS and COTS, Installation, Configuration, Management
101

Splunk Analyst / Service Administrator Resume Examples & Samples

  • 5+ years Splunk Core experience including implementing and troubleshooting Splunk Index and Search head clusters, Agent and HF deployments / configurations
  • 3+ years BEM / TrueSight experience including implementing environment solutions and troubleshooting issues
  • 3+ years BEM / TrueSight experience writing BEM MRL Code and troubleshooting related issues
  • 2+ year Scripting experience in any of - Perl, Python, Unix Shell
  • Experience of integration of Splunk with other products
  • Unix operating systems experience
  • Excellent knowledge of regular expressions for report building
  • Excellent knowledge of Splunk Cluster Admin tasks
  • Excellent stakeholder engagement and communication skills
  • ITIL Foundation Certified and experience in service operation models
  • Solid understanding in use of Agile principles, especially Scrum and Kanban
  • Knowledge of BMC BEM / True Sight tools would be highly advantageous
  • Exposure to other Application and Infrastructure monitoring tools would be highly regarded
  • Exposure to / knowledge of Java, Linux, GIT / Stash and AWS Cloud Formation highly regarded
  • A Learning Mindset, being team player and desire to both share knowledge and learn from others will be key to success
  • Maintain and Update all components of a distributed Splunk infrastructure including indexer clusters, search head clusters, and deployment servers
  • Troubleshoot issues with log sources or systems with vendor, and report system defects as needed
  • Standardize and Troubleshoot Splunk UF/HF forwarder deployment, configuration, and maintenance across a variety of UNIX and Windows platforms
  • Monitor the Splunk infrastructure for capacity planning, system health, availability, and optimization
  • Assist with design of core scripts to automate Splunk setup, maintenance and alerting tasks
  • Support Splunk on UNIX, Linux and Windows-based platforms. Assist with automation of processes and procedures
  • Bring new data into the Splunk platform per client request, creating custom source types when necessary
  • Maintain business continuity, data quality and regulatory compliance
  • Managing production incidents and problems from inception to resolution
  • Ongoing upgrade and maintenance of associated platform software and hardware
  • Participate in a rotating 24x7 roster
  • Review and improve procedures and documentation to increase the maturity of the operations model
102

Splunk Architect Resume Examples & Samples

  • Architect, implement, and use Splunk solution in a highly available, redundant, distributed computing environment
  • Deploy new Splunk instances, including clustered deployments
  • Tune the Splunk infrastructure and lead capacity planning and continuity of operations tasks
  • Maintain Splunk systems internal documentation, including SOP’s and design documents
103

Senior Splunk Security Engineer Resume Examples & Samples

  • 1) Security mindset and experience - awareness of concepts like "threat hunting", "attack chain", "kill cycle", "anomaly detection"
  • 2) Significant Splunk Enterprise Security experience - specific activities include configuration of core environment, custom lookups, SPL, threat hunting, build and optimize correlation searches, know workflows, refine alerts, build data models, establish baselines and normalize, cluster management
  • 3) Skilled in partnership & communication with teams across IT to engage and set up the data to ingest from servers
104

Splunk Security Engineer Resume Examples & Samples

  • 3+ years of experience with IT
  • 2+ years of experience with Splunk, network security, system security, and supporting security information and event management (SIEM)
  • 1+ years of experience with rule and advanced logic creation in Splunk
  • Experience with using scripting languages to automate tasks and manipulate data
  • Knowledge of enterprise logging, including application, OS, and security technology logging
  • Ability to demonstrate SPL expertise
  • Ability to travel up to 80% of the time
  • 1+ years of experience with performing hunt activities in an incident response role
  • Experience with security tools, including Firewall, IDS, Active Directory, Nmap, Burp, Proxy, or Bro
  • Splunk Admin or Architect Certification
105

Splunk Deployment Engineer Lead Resume Examples & Samples

  • 4+ years of experience with IT in a professional work environment
  • 4+ years of experience with designing, implementing, configuring, and operating Splunk
  • Experience with working in large federal agency environments, including USPS, HHS, SSA, Treasury, GSA, and NASA
  • BA or BS degree in IT Security, Engineering, or a related field
106

Splunk System Administrator Resume Examples & Samples

  • Bachelor's Degree or equivalent combination of education and professional experience
  • Typically 8+ years of relevant experience
  • Be able to work with clients, peers and management in a highly visible, mission critical environment
  • Experienced in administering a Splunk Distributed Environment including Index Clustering, Search Head Clustering and Forwarder Deployment Server
  • Experienced in creating custom dashboards, alerts and report to meet requirements
  • Ability to create knowledge objects as needed
  • Experience using and configuring the Distributed Management Console (DMC)
  • Understanding of Red Hat Enterprise Linux operating systems including normal system maintenance and tuning
  • Understanding of Windows operating systems including normal system maintenance
  • Able to work in a team setting or as an individual contributor
  • Shift work may be required
  • Have appropriate certification in compliance with the requirements of the DoD 8570 IAT Level II
107

Splunk Certified Resume Examples & Samples

  • 5+ years’ experience with Splunk
  • 7 years ‘experience with database technology
  • 5+ years’ experience QlikView and/or Tableau
  • 5+ years’ experience with full SDLC including system design, integration and testing
108

Senior Splunk Specialist Resume Examples & Samples

  • Provide Splunk Professional Services for Splunk Enterprise Security
  • Install, configure, and update Splunk Enterprise and Splunk Enterprise Security environments in a multi-site environment, following best practices from Splunk PS
  • Configure advanced Splunk options like Indexer and multi-site Search Head clustering
  • Ability to build custom applications and technical add-ons for efficiently on-barding data and meeting Splunk CIM compliance for Enterprise Security accelerated data models
  • Resolve issues discovered during System/Integration Testing, and User Acceptance Testing
  • Document detailed design and code
109

Splunk Technician, Mid Resume Examples & Samples

  • 2+ years of experience with Splunk
  • Experience with network security and system security, including supporting SIEM tools
  • Experience with working in a large enterprise environment and integrating solutions in a multi-vendor environment
  • Knowledge of security technologies and information security and networking
  • Knowledge of enterprise logging, including application logging and regular expressions
  • Experience with enterprise scale operations and maintenance environments
  • Knowledge of networking protocols
  • BA or BS degree in CS, IT, or related field
110

Splunk / Monitoring Engineer Resume Examples & Samples

  • Must have minimum of 5+years experience with Splunk performing tasks such as
  • Bachelor’s degree in Computer Science, Mathematics, or related field and 4 years of information systems development experience, or 8 years information systems development experience in lieu of a degree
  • Experience within Microsoft, Linux and Oracle/SQL DB technologies in an enterprise environment a plus
  • Identify, build and support monitoring solutions & tools to measure real-time message performance
  • Understanding of LAN topology, routers, hubs, switches, firewalls and network protocols and services, including WAN/Frame Relay/MPLS, TCP/IP, DNS, WINS, DHCP, SMTP, SNMP, etc. is a plus not mandatory
  • Demonstrated experience in the implementation of information engineering projects; systems analysis, design and programming using standard tools and methods, systems planning, business information planning
  • Demonstrated ability to work independently
  • Demonstrated ability to communicate effectively to all levels of the organization and correctly identify the customer’s needs
111

Splunk Services Engineer Resume Examples & Samples

  • Work closely with members of the Sales and Sales Engineering Team to examine and understand customer requirements; design, build, and expand on existing solutions to solve challenging customer problems
  • Drive adoption and expansion of Splunk while working side by side with the customers to solve unique business problems across a variety of solution areas and use-cases
  • Leverage previous experiences, share best practices, and create innovative solutions to push user adoption and maximize the value of Splunk
  • Provide enablement where appropriate to enable customers to solve the next wave of questions on their own
112

Senior Cyber Risk Defense Splunk Analyst Resume Examples & Samples

  • A Cyber-risk Defense Splunk Use Case and Content Developer is responsible for creating the logic in Splunk to enable actions by the teams of Cyber-risk Defense Analysts during all phases of the threat detection and incident response lifecycle. The Splunk logic should prioritize incoming events to minimize risk exposure, ensure the timely identification of threats, and provide adherence to AIG’s threat severity model. The successful candidate will report to the Director of Cyber-risk Operations and will regularly liaise with other Cyber-risk Defense Teams to foster an intelligence driven operations capability across the organization
  • Must be able to support team case management by working with customers to quickly understand and document their requirements to ensure rapid completion of tasks
  • Assist the Detect and Response groups with the evidence intake and chain-of-custody process
  • Decrypt and perform forensic acquisitions of digital media while assisting with the shipment and receipt of digital evidence and other items
  • Able to collect, correlate, and display complex metrics depicting notable Insider Threat activities and suggest actionable items to reduce risk for the business
  • Utilize data mining tools to collect, search, sort, and organize large amounts of electronic information
  • Analyze insider events and data feeds for event detection and correlation from monitoring solutions
  • Triage and classify the output using automated systems for further investigation
  • Collect, preserve, and analyze electronic data according to the firm’s policies and practices
  • Perform response to confirmed incidents, coordinating appropriate resources to mitigate the threat
  • Produce high quality reports presenting complex technical matters clearly and concisely
  • Examine the timeline of notable incidents and identify precursors for data leakage
  • Review all available data to further develop and improve the threat scenario’s and use cases
  • Recommend changes to detection platform data sources, policies, filters and rules to improve event analysis
  • Recommend improvements and assist in the setup of detection processes, protocols, skills and tools
  • Work closely with Information Security architecture and engineering to develop new tools and techniques for predicting, detecting and preventing insider threats
  • Continually evaluate changes to actor tactics, techniques and procedures to ensure technology strategy maintains pace with a changing cyber insider threat landscape
  • Maintain the strong working relationship with stakeholders, working across multiple lines of business and service providers to pull together and respond to actionable information
  • At least 3-5 years of relevant insider threat, intelligence, or investigative experience
  • Demonstrated success in close working collaboration with cyber security, intelligence, HR, and Legal
  • Demonstrated expertise in both working in and handling extremely sensitive areas/materials, respectively
  • Experience handling investigations, leveraging legally sound practices (including chain of custody), the results of which are prosecutable case files
  • Experience developing and communicating findings to non-technical business areas
  • Experience using analytical skills and an ability to interpret established standards and guidelines to solve problems
  • Proven ability to innovate, develop, implement, and effectively document complex technical systems and approaches
  • Good understanding of possible methods of internal and external data movement
  • Ability to navigate a complex global network to identify intelligence and detection sources
  • Excellent analytical ability, sharp attention to detail, creative problem solving, consultative skills, and innovation
113

Splunk Developer Resume Examples & Samples

  • This role is responsible for supporting and implementing all of the client's own monitoring tools
  • The client has a plan to consolidate tools and get to Splunk for Log monitoring and New Relic for all performance monitoring
  • The person will be responsible for installing and configuring the monitoring tools, add users (Operations Center) and installing agents on servers and network equipment
  • This person will provide level 3 support for the Operations Center analyzing data from the tools to help identify causes of problems and drive to corrective
  • 1 year Splunk Administration
  • 3-5 years IIS System Administration
  • 1 year Windows OS Adminstration
114

Senior Splunk Systems Engineer Resume Examples & Samples

  • Implement, architect, administer Splunk and Splunk Enteprise Security Suite
  • Perform data ingestion and data visualization for Splunk and Splunk Enteprise Security Suite
  • Provides technical, managerial and administrative direction relative to the problem definition and analysis and
  • Recommends alterative solution to higher level client management for further ultimate implementation
  • Build and integrate contextual data into the notable events, and workflow within Splunk Enterprise Security Suite
  • Development of configuration files for Splunk and customized applets (apps)
  • BS and 9 yrs related experience, MS +7 yrs related experience or equivalent experience in lieu of education
  • 5 years of administering or implementing Splunk Enterprise and Splunk Enterprise Security Suite in distributed and clustered architecture
  • Must posses the following two certifications
  • Certified Splunk Administrator
  • Certified Splunk Enterprise Security
  • Expertise in SPL query development, data visualization utilizing HTML, XML, CSS and JAVA and Python scripts
  • Expertise implementing Enterprise Security Suite from beginning to the end while integrating with other security appliances such as Sourcefire, FireEye, Firewalls, Web Proxy, ePO, Tenable, Amazon Web Services, Akamai, iSight (including other publically available threat intelligence communities)
  • Ability to leverage REST API for purpose of advanced Splunk administration and Splunk query automation
  • Expertise in administering Linux O/S such as Redhat Enterprise
  • Experience in managing AWS Splunk instances and integration with on prem Splunk Enterprise
115

Cybersecurity Specialist Splunk Resume Examples & Samples

  • DoD 8570.1M IAM level 2 is required (i.e., CISSP)
  • Resource will act as the IASO for hosted systems, assuming the responsibilities as outlined in AR 25-2
  • Resource will assist hosted customers in obtaining and maintaining RMF for DOD IT, DIACAP, and other certifications as required
  • Resource will update and/or assist the hosted system's personnel in updating artifacts of the accreditation package and store the artifacts in organizationally defined repository; i.e., system diagram (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc
  • Resource will assist in the preparation of network infrastructure specifications or designs incorporating required information security features
  • Resource will review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies, and best industry practice
  • Resource will assist in the preparation of required documentation and coordination with Authorizing Official/Designated Approval Authority to obtain hosted system security accreditation to include certification procedures and criteria, certification evaluation reports and reports of findings
  • Resource will provide security engineering design and analysis services for ALTESS and hosted customers
  • Resource will act as the ALTESS CyberSecurity liaison for ALTESS hosted systems
  • Resource will coordinate with the ALTESS ISSM and confirm status for migration to an ALTESS hosted enclave in order to ensure continuity for CyberSecurity requirements based on changing program guidance
  • Resource will perform vulnerability scanning of computer systems using DoD and Army authorized security scanning software
  • Resource will use results of vulnerability scans to determine vulnerabilities and develop operational plans to remediate or mitigate vulnerabilities as they are discovered
  • Resource will manage IA workforce training and certification program, as outlined in DoDi 8570.01M using the Army Training and Certification Tracking System
  • Resource will perform risk assessment reviews and document change requests; and determine approval or denial of requests
  • DoD 8570.01M IAM level II certification is required. Resource must possess Baseline certification as defined in DoD Instruction 8570.01M
116

VCT Security Splunk Resume Examples & Samples

  • Design and customize complex search queries, and promote advanced searching, forensics and analytics, Develop dashboards, data models, reports and optimize their performance
  • Designing and developing reports and Dashboards using Splunk Queries
  • Creating Knowledge objects with Splunk
  • Experience in CIM, creating lookups, field Aliases, Calculated fields, field extractor, Tags and event types, workflow actions, Alerts and scheduled reports, Macros with Splunk
  • Worked with Data models
  • Has ability to design Splunk reports and dashboards using complex data elements
117

Splunk Product Owner Resume Examples & Samples

  • Grow and improve the enterprise Splunk environment from early stages to a mature implementation by creating forwarder apps to ingest our data
  • Assist and provide expert best practices in adoption, expansion, additional use cases and in setting up Splunk
  • Support and guide Baxter resources that include Splunk Administrators, Architects, Knowledge Managers, Developers and Users for increasing Splunk adoption and overall customer success
  • Assist with system upgrade planning and execution
  • Assist in workshops to help leverage the full value of Splunk solutions and lead periodic stakeholder meetings
  • Act as the Splunk liaison for Splunk technical questions, issues or escalations. This will include working with Splunk Support, Product Management (i.e. roadmaps), or others as needed
  • Development of best practices and run book
  • Develop reliable, efficient queries that will feed custom alerts and dashboards
  • Act as a resource for colleagues with less experience
  • Minimum 4+ years of experience with SPLUNK in one of the following areas: IT Operations, compliance, dev ops, network security, and system security, supporting security event management tools (SIEMs) Minimum 2+ years of experience with rule and advanced logic creation within SPLUNK
  • Experience with scripting languages to automate tasks and manipulate data
  • Experience with integrating solutions in a multi-vendor environment, including SaaS environments
  • Splunk Certified Administrator, Splunk Certified Architect and/or Splunk Certified
  • Strong technical, analytic and problem solving skills combined with the ability to provide quick resolution to problems
  • Strong knowledge (recent experience) with the following technology: storage, servers, data centers, and cloud
  • Enterprise and or cloud software experience
  • Exceptional verbal, written, organizational, presentation, and communication skills
  • Demonstrable success in thinking strategically and executing tactically, while providing consistent and high levels of customer satisfaction and retention in a fast-paced environment
  • Participate in user acceptance testing efforts as needed
118

Splunk / Systems Engineer Resume Examples & Samples

  • 1+ years of experience with using and supporting commercial and open source data analysis platforms, including Splunk, ELK, and Hadoop and with using the Python programming language
  • Experience with overcoming common data analysis barriers, including time delays, inconsistent reporting, and sensor upgrades or transitions
  • Experience with Windows and Linux OS support
  • Experience with interfacing with clients daily and with weekly reporting of progress or remediations
  • Ability to be self-driven to improve and automate processes and learn complex COTS systems and applications
  • Security+ Certification or ability to obtain within 6 months of hire
  • Experience with defining implementable algorithms from available data and from known detection methods, including statistical, behavioral, and predictive
  • Experience with database support for Hadoop or Oracle
  • Coursework in Data Science or Analysis
119

Splunk Software Engineer Resume Examples & Samples

  • 14 years of overall IT experience
  • 7+ years direct experience with Java development
  • 5+ years’ experience with JEE development
  • Experience working on Data-driven business applications written in Java
  • Experience with AJAX Single Page Interface technologies such as JavaScript, GWT, EXT-JS, and JQuery
  • Experience using SPLUNK
  • Must be comfortable working in either Windows or Linux based environments
  • Experience with Agile/Scrum methodology
  • Good communications and documentation skills
  • Java in both Windows and Linux environments
  • OLTP database (Oracle, and MongoDB) database experience a plus
  • Domain knowledge of the TUSCAN portfolio of capabilities is a plus
  • Good working knowledge of Linux/Unix and scripting (shell, bash, perl, and other scripting tools/language)
120

Splunk Administrator With Top Secret Clearance Resume Examples & Samples

  • Bachelor's degree in Computer Science or related field and 6+ years experience, or equivalent combination of education and experience
  • Demonstrable expertise working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and access-lists
  • Demonstrated experience in Security Information and Event Management (SlEM) operations, troubleshooting, and tuning
  • Splunk Certified Power User
  • Splunk Certified Admin
  • Splunk Certified Architect
  • CISSP
  • Certified Ethical Hacker (CEH)
  • Certification as Splunk Certified Power User, Splunk Certified Admin and Splunk Certified Architect
  • Ability to perform and interpret vulnerability assessments
  • A willingness to be challenged and a strong desire to learn
121

Splunk System Administrator Resume Examples & Samples

  • Candidate must have experience with implementing and administering Splunk
  • Specifically configuring data inputs and data routing, user accounts and data management policy as well as basic troubleshooting and monitoring of Splunk
  • Experience with monitoring Splunk capacity in relation to hardware license consumption and storage utilization
  • Experience with Linux and Windows agents for Splunk administration with a solid understanding of the Splunk Infrastructure. Ability to create operations documentation for maintaining the Splunk infrastructure
  • Knowledge of enterprise logging, with a focus on security event logging
  • Experience with working in a large enterprise environment
  • Proven ability in working independently with minimal oversight
  • Experience in working in an operational environment (preferably for a DOJ agency)
  • 05-07 years w/Bachelors Degree