Home

Immediate Hire - Splunk Engineer - Irvine or Culver City, CA (Hybrid) at Culver, Oregon, USA
Email: [email protected]
From:

Gangadhar,

Intellectt

[email protected]

Reply to:   [email protected]

Role:
 Splunk Engineer

Location: 
Irvine or Culver City, CA (Hybrid)

Duration: 
Long Term Contract

Description:

8 years of overall IT experience.

5 years experience in managing, designing, and configuring Splunk environment.

5 years experience in Unix environment including administration, scripting, or supporting applications.

Experience with Splunk Enterprise Security Premium Application and Splunk Enterprise.

Experience in requirement gathering and documentation.

Experience in developing and supporting Splunk Applications.

Experience in automation with programming languages like Python, JAVA, .Net, and Ansible is a plus.

Experience in technologies like GIT, JIRA, and Automation Testing.

Familiarity with Phantom, Cloud computing, Web Interfaces, Databases, and Big Data technologies (like Hadoop, Kafka, etc.)

Understanding of Continuous Delivery and Continuous Integration.

Splunk Admin Certification is mandatory.

Excellent communication and interpersonal skills.

Splunk core admin experience is mandatory.

Responsibilities:

Support, Admin, maintain, and expand Splunk infrastructure to meet future architecture design and deployment requirements.

Develop distributed Splunk applications, including requirement gathering, and coordinating Splunk setup.

Recommended Splunk implementation best practices and fixes.

Design, implement, and optimize Splunk applications (including Enterprise Security), queries, knowledge objects, and data models.

Perform basic and advanced scripting tasks with Splunk to automate repeatable processes using Python.

Deploy Best Practices for developing Splunk Apps and create conceptual architecture for continuous improvement initiatives.

Provide Impact assessment for migration efforts.

Support Performance Testing and User Acceptance Testing.

Design and implement Custom Searches and reports.

Build proof of concepts for Splunk enhancements.

Tuning information model and defining reusable templates.

Define reusable view templates and retention & archival policies.

Provide Impact assessment for migration efforts, and coordinate migration activities.

Nice to Have:

Experience in Security information and event management (SIEM).

Experience with RTIR.

Certifications in CISSP, Python, Java, .Net, Ansible / Red Hat or similar.

Keywords: information technology California
[email protected]
View all
Wed Mar 06 04:25:00 UTC 2024

To remove this job post send "job_kill 1187222" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 28

Location: , Oregon