Hope you are doing good. Please go through the JD and revert me back with
updated resume, if you feel interested.
Required Technical Skill Set
Good knowledge & working experience on Splunk based logging management,
event correlation, security incident management, SIEM architecture
Experience in implementation and management of the Splunk SIEM solution
Experience in writing complex correlation rules, log source integration
Experience in defining alerts, reports and dashboards
No of Requirements
Desired Experience Range
Location of Requirement
*Desired Competencies (Technical/Behavioral Competency**)*
Implementation, configuration and management of SIEM solution.
Experience shall comprise of
*Experience and Capabilities*
Tool Implementation & Configuration
Administration and Troubleshooting
Monitoring and reporting
Technology Refresh and Upgrades
Log Source integration with SIEM
Configure settings for log aggregation and normalization
Configure archiving and backups Configure alerts for incidents
Configure and enable correlation rules, alerts and reports
Monitor log reporting status and initiate appropriate corrective actions
Experience in developing custom parsers or connectors for log sources
not natively supported by Splunk
Security Incident Management and Response experience
Experience on any other SIEM Tools: ArcSight, McAfee ESM Nitro Security,
Firewall, IPS and Proxy management
Ubair Anwaar | SYSMIND, LLC
Phone: 609-897-9670 x 3505
Mail to: *uba...@sysmind.com <uba...@sysmind.com>*
Address: 38 Washington Road, Princeton Junction, NJ 08550
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an email
To post to this group, send email to email@example.com.
Visit this group at https://groups.google.com/group/latha56.
For more options, visit https://groups.google.com/d/optout.