OnBenchMark Logo

Ajay

Splunk Developer
placeholder
Location 
view-icon
Total Views98
availability
Shortlist0
back in time
Member since30+ Days ago
 back in time
Contact Details
phone call {{contact.cdata.phone}}
phone call {{contact.cdata.email}}
Candidate Information
  • User Experience
    Experience 10 Year
  • Cost
    Hourly Rate$75
  • availability
    Availability1 Week
  • work from
    Work FromAny
  • check list
    CategoryInformation Technology & Services
  • back in time
    Last Active OnApril 30, 2024
Key Skills
SplunkUnixGitHubPL/SQLPythonJenkins
Summary

Client: HSBC

Role:Splunk Developer

Location: Hyderabad, India (March’18 – July 21) 

 

 

Role:Splunk ITSI Developer/Admin

NewYork, Oct’21 – Till Date

 

Responsibilities:

 Splunk is a logging system for Telecoms Infrastructure. Logging is required for troubleshooting , compliance and various different types of analysis on the infrastructure. All telecoms infrastructure use the 'Syslog' format for sending logs to Splunk. Syslog format is a standard in computing industry for system logging

·        Working as a Consultant and a Global SME for Splunk.

·        Provided solutions for Splunk and Splunk Apps for Enterprise solutions. Having sound knowledge of Installation, Integrating Splunk with a wide variety of data sources that use a variety of protocols.

·        Installation and configuration of syslog-ng for syslog collection from devices.

·        Manage Elastic Stack as a shared service across on-prem and cloud.

·        Infrastructure design for the ELK clusters. Elasticsearch, Filebeat, Logstash performance and configuration Tuning.

·        Have Prepared Elasticsearch documentation and trained the team to perform day-to-day operations like backup, reindexing, restore, creating index patterns, troubleshooting frequently occurring issues.

·        Involved in the designing of Splunk Enterprise and migrated the data from ELK to Splunk using indexes.

·        Also handled Enterprise Admins in all phases of getting data into Splunk (From Pre-indexing to post indexing statistical data analysis)

·        Integrating security solutions with existing products and help identify cyberattacks by using UEBA (User Entity Behavior Analysis) platform applications.

·        Expert in Splunk search language and able to create and optimise complex, extensive data correlations and having good experience in Regular Expressions (REGEX) .

·        Expert in Splunk and Splunk Enterprise architecture to design, implement, and troubleshoot deployment, maintenance, and upgrade solutions for deployments of Enterprise Management.

·        Identifying the F5 Threat detection WAF and log4j attacks and developing dashboards which provided insights to security team to identiy the patterns and remediate them.

·        Developed a wokflow in Splunk by integrating with other sources to provide end to end mapping of service impact if there is any issue in the datacenter infrastructure.

·        Proactive measures for Bluecoat capacity like CPU and in/out traffic flowing.

·        Identifying Configuration change detection in the devices from the syslog and integration to Network automation tool to initiate a backup of config to satisy compliance standards.

·        Building the automation forTriggering the workflow in Itential based on the event detection in splunk.

·        Handled Large Scale Multisite cluster with Disaster Recovery. Done Capacity Planning and Sizing regularly

·        Provided L3 technical support for NNM for management of Network devices (Routers,

Switches, Firewalls, Wireless, Load Balancer etc.) monitoring, the configuration of various correlations             & suppression logics, protocol-based monitoring, the configuration of various iSPIs (Performance for metrics, Performance for Traffic, IP Telephony, IP Multicast & Quality Assurance), Reports customization, integration with other HP tools and third-party applications.

·        Provided technical support for Network Automation. Deployment of various policies and task configuration, Integration with NNM, Report creation and auto-scheduling of reports.

·        Performed threat hunting, Incident Response (IR) using Carbon Black Endpoint Detection and Response (EDR). Developed correlation rules and conducted incident analysis using Splunk ES and Exabeam UBA, UEBA.

·        Created formal documentation such as reports, training material, slide decks, and architecture diagrams.

·        Handled Splunk & NNM migration project from older version to latest version for all-region

·        Worked for automation of tools by using Python Script.

 


Copyright© Cosette Network Private Limited All Rights Reserved
Submit Query
WhatsApp Icon