Hi  ,

Role :  Splunk Administrator

Location : Westwood MA

Duration : 12 Months

Experience : 4+ year

Technical Skill Set

·         Good knowledge & working experience on Splunk based logging
management, event correlation, security incident management, SIEM

·         Experience in implementation and management of the Splunk SIEM

·         Experience in writing complex correlation rules, log source
integration with SIEM

·         Experience in defining alerts, reports and dashboards

Must Have :

·         Implementation, configuration and management of SIEM solution.
Experience shall comprise of

* Experience and Capabilities*

Architecture Design

Tool Implementation & Configuration

Administration and Troubleshooting

Monitoring and reporting

Technology Refresh and Upgrades






·         Log Source integration with SIEM

·         Configure settings for log aggregation and normalization

·         Configure archiving and backups Configure alerts for incidents

·         Configure and enable correlation rules, alerts and reports

·         Monitor log reporting status and initiate appropriate corrective

·         Experience in developing custom parsers or connectors for log
sources not natively supported by Splunk

Security Incident Management and Response experience


·         Experience on any other SIEM Tools: ArcSight, McAfee ESM Nitro
Security, Log Logic

Firewall, IPS and Proxy management

*Saurabh Sharma*


4606 FM 1960 Rd W, Suite 400 Houston, Texas-77069

T: 281 954 5503

Email: saur...@e-infionics.com <raj...@e-infionics.com> |

Web: www.e-infionics.com

You received this message because you are subscribed to the Google Groups 
"Oracle Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to oracle-users+unsubscr...@googlegroups.com.
To post to this group, send email to oracle-users@googlegroups.com.
Visit this group at https://groups.google.com/group/oracle-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to