Resume

Sign in

Developer Engineer

Location:
Buffalo Grove, Illinois, United States
Posted:
April 08, 2019

Contact this candidate

Resume:

VASANTH MAHENDAR

Voorhees Township, NJ *****908-***-**** • ac81bf@r.postjobfree.com

PROFESSIONAL SUMMARY

I am having 6 years of IT with years of experience as a Splunk System Administration, Splunk Developer and Administration. Good knowledge in Big Data and Machine Data analysis using Splunk. Thorough Splunk for implementation, configuration, customization & integration. Experienced in designing and implementing monitoring solutions using Splunk. Strong analytical, interpersonal, and problem-solving skills.

4 years of experience at Splunk, in Splunk developing dashboards, forms, SPL searches, reports and views, administration, upgrading, alert scheduling, KPIs, Visualization Add-Ons and Splunk infrastructure.

Splunk Certified Administrator & Splunk Certified Power User/ Developer.

Gained expertise in system administration on Splunk, ITSI, SIEM, Machine Learning Tool kit, AppDynamics, Linux.

Expertise in Installation, Configuration, Migration, Trouble-Shooting and Maintenance of Splunk infrastructure.

Experienced in a wide array of technologies including Big Data, Distributed (Web-based), Database systems, SOA (Service Oriented Architecture), BPM technologies, Mainframe etc.

Executed projects using Waterfall and Agile SDLC methodologies.

Expert in using several search commands like streamstats, eventstats, maxsearch, stats, chart, time chart, transaction, strptime, strftime, eval, where, xyseries, table etc.,

Design, Deploy, and Support enterprise Splunk logging application. Assist other enterprise instances as Splunk Subject Matter Expert SME.

Creating accurate reports, Dashboards, Visualizations, Elastic search and Pivot tables for the business users.

Experience in using Splunk platform in Linux and windows.

Creating the Jenkins nodes/jobs configuration.

Creating builds in Jenkins.

Good knowledge of creating and implementing of shell scripts to take care of Splunk file backup, monitoring alert log and log rotation.

Creating and Managing Splunk DB connect Identities, Database Connections, Database Inputs and Outputs, access controls.

Worked on Security solutions (SIEM) that enable organizations to detect, respond and prevent these threats by providing valuable context and visual insights to help you make faster and smarter security decisions.

Experience in Operational Intelligence using Splunk platform.

Experience of JVM and multi-threaded processing using JMX servers.

Experience with Splunk UI/GUI development activities by managing the Splunk knowledge objects like Field extraction, Tags and Lookups management.

Ability to Debug Splunk related and integration issues.

Configured Clusters for load balancing and fail over solutions.

Implemented workflow actions to drive troubleshooting across multiple event types in Splunk.

Extensive knowledge in writing Packages, Stored Procedures, Functions and Database.

Strong qualitative analysis skills to lend insight into highly ambiguous and sensitive business problems. In-depth understanding of processes and technology integration challenges.

Hands on experience in Python, Shell Scripting, Oracle SQL, Perl, Bash, Java Script, CSS, HTML, Auto Hot Key.

As a data analyst, helped the leadership to discover how the data can be utilized to solve problems and measure the adoption rate of newly introduced web services to determine the success.

Quick learner capable of adapting to new technologies and business processes to deliver high quality solutions.

An excellent team player with proven leadership, communication, interpersonal, analytical, and problem-solving skills.

Installation and configuration of Splunk apps to onboard security data sources into Splunk.

Good experience in working with SNMP traps and Syslog NG in on boarding the security devices on Splunk monitoring.

Experience with regular expressions and using regular expressions for data retrieval.

Work with application owners to create or update monitoring for applications.

Administering Splunk and Splunk; Integrating Splunk with a wide variety of legacy data sources and industry leading commercial security and other tools.

Assisting users to customize and configure Splunk to meet their requirements.

Perform implementation of security and compliance-based use cases. Performing maintenance and optimization of existing Splunk deployments.

I have knowledge in Nagios Using the Splunk/Nagios monitoring tools to develop dashboard capabilities by collecting performance and system status from various systems.

SKILLS

Splunk Modules: Splunk 5.x/6x, Splunk DB Connect, Splunk Enterprise, Splunk on Splunk, Splunk App

for VMware, Splunk Web Framework.

Operating Systems: Solaris (8, 9 10), Red Hat Linux (4, 5), Unix, AIX, Windows 2K/XP/2003.

Web Servers: Oracle Http Server, Apache Tomcat, Sun ONE 6.x, MS IIS server 5.1/6.0, IBM-HTTP.

Application Servers: Oracle Web Logic Server 8.x./9.x/10.x, Apache Tomcat, JBoss 5.x/6.x, Oracle SOA

Suite 11g, Oracle.

Tools used: Splunk 5x/6x Is 5.1 .5.3 6.1.3, 6.2.3, 6.3.Oracle Forms 10g, 9i, 6i. TOAD,SQL

Loader,

TOAD 10.6.

Databases: Oracle 11g/10g, MYSQL SERVER, DB2, MS Access.

Languages: SQL and PL/SQL.

Networking & Protocols: TCP/IP, HTTP, HTTPS, FTP, SNMP, LDAP, DNS

CI/CD Tools: Jenkins and Docker

Version control Tool: Git, LINUX (3 years), SCRIPTING (3 years), UNIX (3 years), JAVA (2 years), PYTHON (1 year)

AD, AIX, Anti-Virus, Apache, Application Development, big data, CD, configuration management, clients, Version control, Data collection, Databases, database, Designing, DNS, Engineer, senior management, Firewall, Forms, FTP, Http, IBM, DB2, IDS, indexing, Information Security, MS IIS, Interpretation, JAVA (2, JBoss 5.x, LDAP, LINUX, logging, Loss Prevention, Machine learning, Managing, McAfee, MS Access, mail, Windows, Windows 2, 3.x, MYSQL, Enterprise 6.3.3, Enterprise, network, Networking, ons, Operating Systems, Oracle, DB, Developer, PL/SQL, peak, Protocols, Python, quality, real-time, Receiving, Red Hat Linux, Red Hat, reporting, Requirement, scaling, Servers, Shell, scripts, SCRIPTING, SNMP, Solaris, MS SQL Server, SQL, SQL

Loader, SSL, Sun, TCP/IP, TOAD, Tomcat, Triage, Troubleshoot, Trouble Shooting, Troubleshooting, type, unique, UNIX, UNIX shell scripting, upgrades, Upgrading, VPN, Web Servers, Web Logic, Written

WORK HISTORY

Splunk Admin/Developer

CVS HEALTH CARE - Buffalo, IL 07/2018 - Current

Identify and interpret customer requirements for Splunk implementation for an enterprise solution.

Installation and configuration of Splunk product at different environments.

Upgraded Splunk Enterprise from v 6.2 to v 6.4 in clustered environments and non-clustered environments.

Monitoring and analyzing the real-time events for the security devices like Firewall, IDS, Anti-Virus etc., using SIEM tools.

Developed Splunk Dashboards, searches and reporting to support various internal clients in Security, IT Operations and Application Development.

Analyzed security-based events, risks and reporting instances.

Planned, implemented, and managed Splunk for log management and analytics.

Analyzing the events and providing solutions for the incidents.

Involved in setting up alerts for a different type of errors, Data Enrichment using the lookups and Data Interpretation using the Fields and Fields Extraction and performing the Data Normalization using the Tags.

Attended the bridge calls for production issues and non-prod issues and involved application teams or database teams or networking teams to resolve the issues and involved in Root cause analysis for the issues encountered.

Also provided 24/7 on call support for all the production applications.

Provided regular support guidance to Splunk project teams on complex solution and issue resolution with the objective of ensuring best fit and high quality.

Performed deeper analysis of data using event correlations across indexes and various source types to generate custom reports for senior management.

Environment: Splunk 5.x, 6.0.x, 6.1.x, 6.2.x, Linux, UNIX, Oracle 11g, MS SQL Server 2012, SQL.

Role: Splunk Security Engineer.

SPLUNK Admin / Developer

HERTZ - Estero, FL 01/2016 - 06/2018

Installation, configure and administer Splunk Enterprise Server 6.x.x and Splunk Forwarder6.x.x on Red hat Linux.

Setup Splunk Forwarders for new application tiers introduced into environment and existing applications.

Work closely with Application Teams to create new Splunk dashboards for Operation teams.

Troubleshooting and resolve the Splunk - performance, search poling, log monitoring issues; role mapping, dashboard creation etc.

Worked with McAfee products to maintain the environment, determine new deployment opportunities and provide feedback to other operational teams.

Designing and implementing Splunk-based best practice solutions.

Requirement gathering and analysis.

Interacted with team members and Business users during the design and development of the application.

License - Add and Configure Splunk Licenses (Master License, Pooling, Stacked, Usage Report).

Planning and implementing Splunk version upgrades.

Created modules in Machine learning tool kit.

Established indexes and retention policy of buckets; developed user roles to complement operational and security utilization.

Set-up common source types using pre-trained datasets and constructed source types of unique data.

Creating Regular Expressions for Field Extractions and Field Transformations in Splunk.

Integrate the RSA and AD with the SSL VPN.

Administer, Maintain, and Deploy Imperva web application firewall, Checkpoint IPS & VPN systems, and McAfee network-based Data Loss Prevention (DLP) devices.

Troubleshoot issues pertaining to EPO, McAfee Agent, Policy Auditor, Rogue System Detection, Asset Baseline Monitor and Host Intrusion Prevention.

Involved in Performing all upgrades and hot patches for McAfee SIEM (Nitro).

Assisted internal users of Splunk in designing & maintaining production-quality dashboard, assisted offshore team to understand the use case of business and provided technical services to projects, user requests & data queries.

Installed and configured different Splunk apps and add-ons on Splunk platform.

Scripted SQL Queries in accordance with the Splunk.

Splunk technical implementation, planning, customization, integration with big data.

Knowledge about Splunk architecture and various components (indexer, forwarder, search head, deployment server), Heavy and Universal forwarder, License model.

Setup SSL for communication with & between various Splunk components.

Worked on log parsing, complex Splunk searches, including external table lookups.

Worked on configuration files inputs.

conf, indexes.

conf, props.

conf, serverclass.

conf, transforms.

conf and limit.conf.

Upgrading and Migrating the Splunk Components and setting up the Retention Policy for the indexes.

Splunk Engineer/Dashboard Developer

AT & T - Irving, TX 01/2015 - 01/2016

Designing and implementing Splunk-based best practice solutions.

Requirement gathering and analysis.

Interacted with team members and users during the design and development of the applications and Splunk Objects.

Receiving promptly, handling, gathering requirements through remedy tickets and resolving at on time.

Communicating and collaborating with hundreds of customers, Splunk users.

Data collection from various Systems /Servers, Forwarder Management, creating and managing Splunk apps.

Building Splunk queries by Splunk Search Processing Languages (SPL) and Regular expressions.

Creating, maintain support, repair, customizing System & Splunk applications, search queries and dashboards data security, Splunk Enterprise Security app, Triage events, incident Analysis.

Splunk Administration and analytics development on Information Security, Infrastructure and network, data security, Splunk Enterprise Security app, Triage events, Incident Analysis.

Developed Splunk Objects and reports on Security baseline violations, Non-authenticated connections, Brute force attacks and many use cases.

Good experience in working with SNMP traps and Syslog NG in onboarding the security devices on Splunk.

Design, support and maintain large Splunk environment in a highly available, redundant, geographically dispersed environment.

Install, configure, and troubleshoot Splunk.

Experience with regular expressions and using regular expressions for data retrieval.

Work with application owners to create or update monitoring for applications.

Experience creating and maintaining Splunk reports, dashboards, forms, visualizations, alerts.

Installed Jenkins in Linux environment Installed Plugins in Jenkins.

Creating the Jenkins nodes/jobs configuration.

Creating builds in Jenkins.

Creating users and updating Security reclaims.

Good experience in building Splunk Security Analytics.

Lead logging enrollments from multi-tier applications into the enterprise logging platforms.

Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.

Written and developed scripts for automating tasks using Jenkins and UNIX shell scripting.

Created a set of base searches in ITSI and tested in different scenarios.

Added aggregate and per entity thresholds based on applications inputs.

Added URL monitor to the glass table.

Created Search Commands to retrieve multiline log events in the form Single transaction giving Start Line and End Line as inputs.

Guarantee high accessibility & execution trough flat scaling and burden adjusted segments.

Prepared, arranged and tested Splunk search strings and operational strings.

Created and configured management reports and dashboards.

Created EVAL Functions where necessary to create new field during search run time.

Provide inputs for identifying best fit architectural solutions - deployment for Splunk project.

responsible for the end-to-end event monitoring infrastructure of business-aligned applications.

Experience in setting up dashboards for senior management and production support- required to use SPLUNK.

Maintained and managed assigned systems, Splunk related issues and administrators.

Environment: Splunk Enterprise Server 6.3.x, Universal Splunk Forwarder 6.3.x, Shell, Python Scripting, Splunk DB connect.

SPLUNK Admin / Developer

Transunion - Mumbai, India 01/2012 - 01/2015

Worked in installing the Splunk Enterprise 6.3.3 on both Linux (Red Hat Distro) and Windows Servers as a separate Splunk User.

Installation and configuration of various components like indexer, forwarder, search head, deployment server.

Worked in installing the Splunk Universal Forwarder and Splunk Heavy Forwarder on both Linux and Windows Environment.

Installation of Splunk Applications and Technology Add-ons with respect to the technology.

Updated the Splunk Enterprise 6.3.3 to 6.4.

Designing and maintaining production-quality Splunk dashboards.

Splunk Enterprise Deployments and enabled continuous integration on as part of configuration management.

Helping application teams in on-boarding Splunk and creating dashboards/alerts/reports.

Expertise with Design, Implementation, Configuration and Management of Splunk Enterprise.

Created Splunk Search Processing Language (SPL) queries, Reports, Alerts and Dashboards.

Creating and Managing Apps, Create user, role and Permissions to Knowledge objects.

Create Dashboard Views, Reports and Alerts for events and configure alert mail OR depends on the requirement.

Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.

Trouble Shooting of searches for performance issues by adding lookups, correct joins and using summary indexes.

EDUCATION

Bachelor of Technology: Computer Science

CERTIFICATIONS

Splunk Certified Administrator

Splunk Certified Power User/Developer



Contact this candidate