LiveCareer-Resume

splunk administrator resume example with 3+ years of experience

Jessica
Claire
resumesample@example.com
(555) 432-1000,
, , 100 Montgomery St. 10th Floor
:
Summary

Splunk Administrator IT professional with technical knowledge and skilled in information security, system administration, computer network security, project management and IT project scheduling seeking an Information Security (InfoSec) opportunity on a Cyber Security Operations team to proactively defend against evolving security threats.

Skills
  • KNOWLEDGE AREAS
  • Incidence & Threat Analysis
  • System Hardening
  • Logs Review, Dashboard
  • Network Monitoring,
  • Software Development Life Cycle (SDLC)
  • Linux Operating System & Security
  • Project Planning & Tracking
  • Acas Scan/Compliance
  • Storage Mgmt
  • TCP/IP Network Protocols
  • Splunk Health
  • HTTP/SIEM/LDAP
  • SIEM / Firewalls/Anti-virus
  • Infrastructure /Routers/Switches
  • NIST Risk management (RMF)
  • Forwarder and Indexer Deployment
  • Technical Skills / tools
  • Network Monitoring Tools:
  • Tcpdump, Wireshark , Nessus
  • Multiple Priorities Management
  • Software / Applications: Microsoft Word, Excel, Access, PowerPoint, Visio, Outlook, Project, SharePoint
  • Operating Systems: Windows, Linux/Unix
  • Hardware: Cisco Switches/Routers, Firewall,
  • Networking: TCP/IP, DHCP, DNS, ACL Telnet, SSH

Work Planning and Prioritization

  • Team Building and Leadership
  • Project Management
  • Reporting and Documentation
  • New Hire Onboarding
  • Equipment Usage Tracking
Education and Training
Strayer University Washington, DC Expected in 01/2013 Master of Business Administration (MBA : Project Management - GPA :
, Expected in Department of Defense Cyber Security : - GPA :
Experience
Genesis Consulting Group - Splunk Administrator
Columbia, MD, 10/XXX2 - Current
  • Troubleshoot new and current data collection issues that make system unstable
  • Support the deployment of all supported and unsupported Splunk apps and Add-ons that are required for specific data source
  • Manage Splunk upgrade, update change management document
  • Delivered a comprehensive Splunk deployment document that detail the specification, data ingestion methodology and other architectural consideration in a production environment
  • Performed inventory of system and requirement gathering to develop security policies and procedures
  • Maintain role-based access control solution around the data collected
  • Architect, design and maintain Splunk infrastructure including log storage and event collector
  • Troubleshoot Forwarder and server issues
  • Tune searches and index performance
  • On-board new data source into Splunk and analyze data for anomalies and trends and build dashboard highlighting key trends
  • Monitor and troubleshoot existing input (files monitoring, http and optimizes search performance
  • Implement policies for the use of the computer system and network to ensure best practices and standardization
  • Manage Access Control List (ACL), Network Access Control
  • Host security, user account creation, password, least privilege, identity management, adding/deleting/creating/modifying user account information
  • Apply upgrade and patch
  • Support installation of Splunk components such forward, indexers, search head, UF and deployment server
  • Assist to build defense system using detection and prevention tool which alert for potential security violation Continuously monitor network traffic, logs analysis and report trend
  • Used tools to conduct cyber security alerting, analysis and enhanced situational awareness
  • Answering end-user queries, troubleshooting and fixing reported problems by providing technical support to computer users and analyze, solve, and correct issues in real time, providing end-to-end problem resolution
  • Enhanced client infrastructure supporting application and server, data, reporting, custom queries, dashboard, and security role Assist in all phases of incident response procedure from securing system, preserve evidence with the aim of prosecuting the perpetrator, determined contingency plan and prevented the reoccurrence of the incident
  • Work with teams to collect data for incident metric reporting
  • Support/facilitate incident remediation and prevention documentation and conformed to processes related to security monitoring
  • Monitor system performance to ensure 24/7 operability to keep the network up and running/uptime and collect data to evaluate and optimize network and system performance
  • As a result, we reached high availability (5 nine rules)
  • Create a backup and recovery policy and monitor network communication to identify and recover critical data and information.
Genesis Consulting Group - Splunk Administrator
Gaithersburg, MD, 02/XXX0 - 10/XXX2
  • Maintained high availability of Splunk enterprise service
  • Added users to a network, assigned and updated security permissions on the system
  • Interpreted and solved problems when a user or the automated monitoring system alert
  • Monitor system infrastructure for capacity planning and optimization
  • Managed user, role and permission and apps creation
  • On-board and maintain wide variety of data source, including OS and application logs
  • Optimize application to reduce impact on resources
  • Managed configuration and tunning in large Splunk environment
  • Designed and executed change to implement future state of Splunk for the client
  • Ensured that company’s workstations worked efficiently, stayed connected to the central computer network and telecommunication network, upgraded network by developing, testing, evaluating, and installing enhancements
  • Designed and implement Splunk infrastructure and support operation activities
  • Manage multiple assignment, changing priority
  • Established system specifications by analyzing workflow, access, security requirements; router administration, including interface configuration and routing protocols
  • Provide general engineering and design support for distributed Splunk environment Maintained network performance by performing network monitoring and analysis, and performance tuning; troubleshooting network problems; escalating problems to vendor(s)
  • Create custom dashboard, write queries and generated reports, set up alert and notification Protected organization's value by keeping information confidential.
L3harris - Application Support | Jr Splunk Administrator
Colorado Springs, CO, 02/2019 - 08/2019
  • Supported Intelligence gathering and analysis using Splunk to safeguard our homeland and international partner
  • Integrated new data source and technologies and on-boarded via direct editing of Splunk configurations files
  • Applied upgrades and patches when required
  • Provided day to day operation support to client, server, and storage
  • Optimized system resource and utilization
  • Added user, set up account/delete and ensured password meet DoD requirements
  • Troubleshoot, maintained physical and virtual machine running Linux and application services they provided
  • Monitored server and rotated logs weekly and sent to client off site via a secure system
  • Tracked vulnerability and apply patches.
Business Integra Inc, Information System Agency, DTIC - Linux System Administrator
City, STATE, 10/2019 - 12/2018
  • Performed system administration tasks on Red hat servers such as security pathing, OS upgrade, troubleshooting and ensured maximum system availability
  • Monitored system health and configuration to remediate issues in a timely manner
  • Supported deployment activities including upgrade, reviewed system Logs
  • Assisted with compliance activities including vulnerability management
  • Performed system backup and recovery, maintained system and application data files while ensure file security.
Accomplishments
  • TS Clearance | Splunk Enterprise Syst Administrator| PMP | Security+ | Linux+ |Microsoft (MCTS) Managing Projects, DoJ Splunk Training (2019) professional development ~ Training & COURSES ~
  • Cyber Security (Certificate) Rochester Institute of Technology, School of Computer Science, New York, 2017
  • Program Overview:
  • Cybersecurity Fundamentals
  • Computer Forensics
  • Cybersecurity Risk Management
  • Network Security
  • Cyber Security (Certificate) Academy of Computer Education (ACE), Maryland, 2017
  • Program Overview:
  • Information System Security
  • Malicious Codes and Attacks, Threats, and Vulnerabilities
  • Access Controls
  • Security Operations and Administration
  • Auditing, Testing, and Monitoring, Risk, Response, and Recovery
  • Cryptography, Membership
  • Project Management Institute Member (PMI) cyber security / information assurance
  • IT security compliance standards
  • NIST SP 800-53 / NIST SP 800-37 / SP 800-61
  • ISO/IEC 27000 (Information Security Techniques)
  • Committee on National Security Systems - CNSS 4011, 4012, 4013 4014, 4015, 4016
  • Federal Information Processing Standards - FIPS 199, 200
Additional Information
  • Networks and Communications , Information Security Standards, Regulatory and US Compliance Laws

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Strayer University

Job Titles Held:

  • Splunk Administrator
  • Splunk Administrator
  • Application Support | Jr Splunk Administrator
  • Linux System Administrator

Degrees

  • Master of Business Administration (MBA
  • Department of Defense Cyber Security

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: