Hi  ,

Role :  Splunk Administrator

Location : Westwood MA

Duration : 12 Months

Experience : 4+ year

Technical Skill Set

·         Good knowledge & working experience on Splunk based logging
management, event correlation, security incident management, SIEM

·         Experience in implementation and management of the Splunk SIEM

·         Experience in writing complex correlation rules, log source
integration with SIEM

·         Experience in defining alerts, reports and dashboards

Must Have :

·         Implementation, configuration and management of SIEM solution.
Experience shall comprise of

* Experience and Capabilities*

Architecture Design

Tool Implementation & Configuration

Administration and Troubleshooting

Monitoring and reporting

Technology Refresh and Upgrades






·         Log Source integration with SIEM

·         Configure settings for log aggregation and normalization

·         Configure archiving and backups Configure alerts for incidents

·         Configure and enable correlation rules, alerts and reports

·         Monitor log reporting status and initiate appropriate corrective

·         Experience in developing custom parsers or connectors for log
sources not natively supported by Splunk

Security Incident Management and Response experience


·         Experience on any other SIEM Tools: ArcSight, McAfee ESM Nitro
Security, Log Logic

Firewall, IPS and Proxy management

*Saurabh Sharma*


4606 FM 1960 Rd W, Suite 400 Houston, Texas-77069

T: 281 954 5503

Email: saur...@e-infionics.com <raj...@e-infionics.com> |

Web: www.e-infionics.com

You received this message because you are subscribed to the Google Groups "ONLY 
To unsubscribe from this group and stop receiving emails from it, send an email 
to aravindcontact+unsubscr...@googlegroups.com.
To post to this group, send email to aravindcontact@googlegroups.com.
Visit this group at https://groups.google.com/group/aravindcontact.
For more options, visit https://groups.google.com/d/optout.

Reply via email to