Hi ,
Role : Splunk Administrator Location : Westwood MA Duration : 12 Months Experience : 4+ year Technical Skill Set · Good knowledge & working experience on Splunk based logging management, event correlation, security incident management, SIEM architecture · Experience in implementation and management of the Splunk SIEM solution · Experience in writing complex correlation rules, log source integration with SIEM · Experience in defining alerts, reports and dashboards Must Have : · Implementation, configuration and management of SIEM solution. Experience shall comprise of * Experience and Capabilities* Architecture Design Tool Implementation & Configuration Administration and Troubleshooting Monitoring and reporting Technology Refresh and Upgrades *P* *P* *P* *P* *P* · Log Source integration with SIEM · Configure settings for log aggregation and normalization · Configure archiving and backups Configure alerts for incidents · Configure and enable correlation rules, alerts and reports · Monitor log reporting status and initiate appropriate corrective actions · Experience in developing custom parsers or connectors for log sources not natively supported by Splunk Security Incident Management and Response experience *Good-to-Have* · Experience on any other SIEM Tools: ArcSight, McAfee ESM Nitro Security, Log Logic Firewall, IPS and Proxy management *Saurabh Sharma* SAP AND IT CONSULTING SERVICES 4606 FM 1960 Rd W, Suite 400 Houston, Texas-77069 T: 281 954 5503 Email: saur...@e-infionics.com <raj...@e-infionics.com> | saurabhsysmind...@gmail.com Web: www.e-infionics.com -- You received this message because you are subscribed to the Google Groups "Business_Intelligence" group. To unsubscribe from this group and stop receiving emails from it, send an email to business_intelligence+unsubscr...@googlegroups.com. To post to this group, send email to business_intelligence@googlegroups.com. Visit this group at https://groups.google.com/group/business_intelligence. For more options, visit https://groups.google.com/d/optout.