Splunk Administrator- Core Splunk, Enterprise Security, User Behavior

Splunk Administrator- Core Splunk, Enterprise Security, User Behavior

Splunk Administrator
• Manage Splunk Users accounts
• Integration with complex LDAP
• Experience creating Presentation layers
• Creation of data retention policies
• Design and implementation of Splunk infrastructure from conception to deployment.
• Develop platform based on customer requirements
• Experience with Core Splunk, Enterprise Security, User Behavior Analytics
• Experience as a Splunk developer and Admin
• Knowledge of JavaScript, HTML, CSS, Powershell Perl and Python
• Handled Performance tuning
• Understanding of Virtual Infrastructures

Splunk Architect – SIEM solution from scratch

We are seeking a Contractor to maintain and enhance the Enterprise Security Log Analysis and Security Information Event Management (SIEM) system. Activities include creation and maintenance of correlation logic to analyze log data to support network and system monitoring capabilities as well as developing analysis and reporting dashboards to visualize relevant analytical and operational information. The Contractor shall also implement daily health monitoring of corporate-wide log feeds for detection of loss of or newly available log sources. The Contractor shall provide support and expertise for onboarding new log sources/types and data normalization to effectively work with existing Cybersecurity Tools. (more…)

Sr. Vulnerability Analyst w/ AWS, Splunk, Tenable

Incident Response Team Member on site w/ government
8 years overall experience; 5 yrs. around vulnerability tools.
Leader qualities
Vulnerability Tool configuration, deployment, engineering, and defining policies and procedures based on Government best practices
Has some of (not all)
Triton Forcepoint
Amazon Web Services (AWS)


Malware Security Engineer on Windows & Unix – McAffee & Splunk

The main function of the Security Engineer is to plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction or disclosure of information. Candidate must have experience with malware and incident analysis. Must be able to demonstrate good investigative skills and have knowledge of networking protocols and operating systems (windows and Linux), preferably having in depth knowledge of these. (more…)