beBee background
Professionals
>
Administrative
>
Seattle
Naveen K

Naveen K

splunk developer

Services provided: Splunk

Seattle, City of Seattle, King
$60 / hour
Approximate rate

Social


About Naveen K:

…10+ years of IT experience and 8+ years of experience with Splunk - Enterprise Splunk, Splunk DB Connect, Splunk configuring, implementing, and supporting Splunk Server Infrastructure across Windows, UNIX and Linux.

  • Extensive knowledge of Splunk architecture and various components. Passionate about Machine data and operational Intelligence.Linux Administrator, DevOps/Agile operations Build/Release Management,
  • Expertise in DevOps which includes technologies and platform like UNIX/Linux, Java, Jenkins, Maven, GitHub, Chef, Ansible, Subversion, Ant, VMware, Puppet, SVN, GitHub, Vagrant, CVS, Tomcat, JBoss etc.
  • Experience in Linux Administration (Installation, Configuration, Patching, Tuning and Upgrades of Linux (Red Hat and Oracle).
  • Having experience in understanding of Splunk 5.x, 6.x and 7.x product, Distributed Splunk architecture and components including search heads, indexers, forwarders.
  • Expertise in Splunkenterprise architecture such as Search Heads, Indexers, Deployment server, Deployer, License Master, Heavy/Universal Forwarders.

Experience

Client: Diseny Seattle WA                                                                                      May  2022- Present

Role: Sr Splunk  Developer /Admin

Responsibilities: 

 

  • Designed Splunk Enterprise 6.5 infrastructure to provide high availability by configuring clusters across two different data centers.Installed, Configured, Maintained, Tuned and Supported Splunk Enterprise server 6.x/5.x.
  • Architect and Implement Splunk arrangements in exceptionally accessible, repetitive, conveyed figuring situations.
  • Performed Field Extractions and Transformations using the RegEx in Splunk.
  • Responsible for Installing, configured and administered Splunk Enterprise on Linux and Windows servers.
  • Supported the upgradation of Splunk Enterprise server and Splunk Universal Forwarder from 6.5 to 6.6.
  • Installation and implementation of the Splunk App for Enterprise Security and documented best practices for the installation and performed knowledge transfer on the process.
  • Worked on installing Universal Forwarders and Heavy Forwarders to bring any kind of data fields into Splunk.
  • Writing Splunk Queries, Expertise in searching, monitoring, analyzing and visualizing Splunk logs.
  • Experience in alert handling, standard availability and performance report generation. Experience in root cause analysis of post-production performance related issues through Splunk tool.
  • Newrelic will be Performing security reviews and produce threat models for applications by working with product engineering and architects.
  • Build security tools, monitoring, and infrastructure that enable the security team to scale our monitoring to meet the growing demand of our engineering teams.
  • Working with software engineers to analyze security vulnerabilities and follow through with issues until resolution.
  • Newrelic Monitor our bug bounty program, static application security testing, and custom monitoring tools for suspicious activity and run incident response when required.
  • Designing, optimizing and executing Splunk-based enterprise solutions.
  • Installed and configured Splunk Universal Forwarders on both UNIX (Linux, Solaris, and AIX) and Windows Servers.
  • Hands on experience in customizing Splunk dashboards, visualizations, configurations using customized Splunk queries.
  • Monitored the Splunk infrastructure for capacity planning, scalability, and optimization.
  • Experienced in using Splunk- DB connect for real-time data integration between Splunk Enterprise and rest all other databases.
  • Expertise in Actuate Reporting, development, deployment, management and performance tuning of Actuate reports.
  • Responsible with Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Monitored license usage, indexing metrics, Index Performance, Forwarder performance, death testing.
  • Splunk Architecture/Engineering and Administration for SOX monitoring and control compliance.
  • Design and implement Splunk Architecture (Indexer, Deployment server, Search heads, and Forwarder management), create/migrate existing Dashboards, Reports, Alerts, on daily/weekly schedule to provide the best productivity and service to the business units and other stakeholders.
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.
  • Configured Syslog server for the forwarding the logs to Splunk server via network protocols like TCP and UDP.
  • Subject matter expert in best practices, security protocols, PKI, and other security-related issues.
  • Monitored the database (data tables and error tables), WebLogic error log files and application error log files to track and fix bugs.
  • Responsible for troubleshooting various indexing issues by analyzing Splunk logs such as splunkd.log, metrics.log ingested as internal index.
  • Support and execute arrangements considering a full information lifecycle (Search & Investigate, Add Knowledge, Monitor & Alert, Report & Analyze). Followed agile and scrum process for the whole implementation process.

 

Client : All state                                                                                            Aug  2021- April 2022

Role: Sr Splunk ITSI Developer

Responsibilities: 

 

 

  • Perform analysis of requirements, design specifications, development, and technical and user documentation of report development. 
  • Perform analysis of requirements, data identification as part of data onboarding for new data into Splunk
  • Write complex Splunk queries used to present data in Splunk IT Service Intelligence (ITSI)
  • Serve as primary administrator for Splunk ITSI 
  • Analyze, diagnose, and resolve errors throughout the lifecycle. 
  • Formulate recommendations to reduce operating time or improve efficiency. 
  • Maintain proficiency in technical and analytical tools as defined by company standards for the development of complex software to satisfy design objectives. 
  • Employ effective communication techniques to provide project status reports to team members and direct supervisors
  • Designed Splunk Enterprise 6.5 and 7.0,7.1 infrastructure to provide high availability by configuring clusters across two different data centers.
  • Create documentation on build, deployment, and sustainment processes and procedures for application use in cloud capable datacenter
  • Configured up to 10 standard data sources based on use case scenarios to support the underlying security requirements.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.

Environment: 

 

  Splunk 5.x and 6.x 7.x 7.1, Splunk Enterprise, Splunk on Splunk, Splunk DB 2 Connect, Splunk   Cloud, Hunk, Splunk IT Service Intelligence, Splunk Web Framework. Windows 2000, XP, Win 10, Windows Server, Unix/Linux (Red Hat), Free BSD.

 

 

Client:   Travelport (Atlanta)(off shore)                                                     Sep 2018 to  July 2021

Role: Splunk ITSI Developer

Responsibilities: 

 

  • Perform analysis of requirements, design specifications, development, and technical and user documentation of report development. 
  • Perform analysis of requirements, data identification as part of data onboarding for new data into Splunk
  • Write complex Splunk queries used to present data in Splunk IT Service Intelligence (ITSI)
  • Serve as primary administrator for Splunk ITSI 
  • Analyze, diagnose, and resolve errors throughout the lifecycle. 
  • Formulate recommendations to reduce operating time or improve efficiency. 
  • Maintain proficiency in technical and analytical tools as defined by company standards for the development of complex software to satisfy design objectives. 
  • Employ effective communication techniques to provide project status reports to team members and direct supervisors
  • Configured up to 10 standard data sources based on use case scenarios to support the underlying security requirements.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Environment: 
  •             Splunk 5.x and 6.x 7.x 7.1, Splunk Enterprise, Splunk on Splunk, Splunk DB 2 Connect, Splunk            Cloud, Hunk, Splunk IT Service Intelligence, Splunk Web Framework. Windows 2000, XP, Win 10, Windows Server, Unix/Linux (Red Hat), Free BSD.

 

 

Client: Costco Issaquah,WA(off shore)                                                        Feb 2016 to Aug 2018

Role:  Sr. Splunk Developer/Admin
Responsibilities: 

  • Designed Splunk Enterprise 6.5 and 7.0,7.1 infrastructure to provide high availability by configuring clusters across two different data centers.
  • Create documentation on build, deployment, and sustainment processes and procedures for application use in cloud capable datacenter
  • Working on System and platform integration in a large enterprise Linux-base environment
  • Installed and configured Linux, SuSe& Red hat 5.x, 6.x, 7.x on Dell Power Edge (710,720 and 730), using Kickstart with PXE for LAMP (Linux, Apache, MySQL and Perl/PHP) installations.
  • Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation.
  • Used Chef for configuration management of hosted Instances within GCP. Configuring and Networking of Virtual Private Cloud (VPC).
  • Create Chef coding best practices for existing development team .
  • Create documentation for Chef best practices to be used by developers as a guide to Chef Automation.
  • Work with Chef automation to create infrastructure and deploy application code changes autonomously
  • Installed, Configured, Maintained, Tuned and Supported Splunk Enterprise server7.x/6.x/5.x.
  • Architect and Implement Splunk arrangements in exceptionally accessible, repetitive, conveyed figuring situations.
  • Performed Field Extractions and Transformations using the RegEx in Splunk.
  • Designed the large scale job scheduling mechanism for mortgage underwriting operation teams
  • Monitor and support services with a variety of services such as Splunk (ES, UBA, ITSI & ITOA), SCOM & OMS 2016, SCCM, AppDynamics, ExtraHop and other proprietary systems
  • Expert knowledge on Security Information and Event Management Platforms (SIEM) – specifically SPLUNK
  • Responsible for Installing, configured and administered Splunk Enterprise on Linux and Windows servers.
  • Supported the upgradation of Splunk Enterprise server and Splunk Universal Forwarder from 6.5 to 6.6.
  • Installation and implementation of the Splunk App for Enterprise Security and documented best practices for the installation and performed knowledge transfer on the process.
  • Implemented conversion to Litespeed backup system and am working on an across the board upgrade to SQL Server 2005.
  • Splunk architecture and design for both on premise and AWS cloud
  • AWS and Azure cloud security
  • Responsible for creating/versioning/testing of scripts (Bash, PowerShell), AWS Cloud Formation templates, Chef, Nagios, Maven/Ant, Git, Jenkins, Perl, and Ruby to achieve a high-level of automation
  • Minimum 3 years of experience using Splunk in a 24x7 environment
  • Analysed the 22 reports to determine the conversion of the reports either using FID tables and views or using Free Form SQL.
  • Operate, develop for, and maintain the Splunk log management infrastructure, leverage knowledge on a number of security technologies, information security, and networking
  • Worked on installing Universal Forwarders and Heavy Forwarders to bring any kind of data fields into Splunk.
  • Writing Splunk Queries, Expertise in searching, monitoring, analyzing and visualizing Splunk logs.
  • Experience in alert handling, standard availability and performance report generation. Experience in root cause analysis of post-production performance related issues through Splunk tool.
  • Verified if the data model helps in retrieving the required data by creating data access paths in the data model
  • Designing, optimizing and executing Splunk-based enterprise solutions.
  • Installed and configured Splunk Universal Forwarders on both UNIX (Linux, Solaris, and AIX) and Windows Servers.
  • Hands on experience in customizing Splunk dashboards, visualizations, configurations using customized Splunk queries.
  • Monitored the Splunk infrastructure for capacity planning, scalability, and optimization.
  • Experienced in using Splunk- DB connect for real-time data integration between Splunk Enterprise and rest all other databases.
  • Expertise in Actuate Reporting, development, deployment, management and performance tuning of Actuate reports.
  • Responsible with Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.
  • Monitored license usage, indexing metrics, Index Performance, Forwarder performance, death testing.
  • Splunk Architecture/Engineering and Administration for SOX monitoring and control compliance.
  • Design and implement Splunk Architecture (Indexer, Deployment server, Search heads, and Forwarder management), create/migrate existing Dashboards, Reports, Alerts, on daily/weekly schedule to provide the best productivity and service to the business units and other stakeholders.
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.
  • Using the following tools and technologies such as: Bash, Perl, VMware ESX, ESXi, Hyper-V, NFS/CIFS, SCOM & OMS 2016, Active Directory, LDAP, LSF, FlexLM Licensing, AppDynamics, Splunk (ES & ITSI), ServiceNow, ExtraHop, SolarWinds, VERITAS, Solaris, Exadata, InfiniBand switch, Oracle SPARCE and SAN.
  • Lead key log management and analysis platform(s) discipline by driving technology strategy, implementation and adoption of the platform within Ally Enterprise
  • Configured Syslog server for the forwarding the logs to Splunk server via network protocols like TCP and UDP.
  • Subject matter expert in best practices, security protocols, PKI, and other security-related issues.
  • Monitored the database (data tables and error tables), WebLogic error log files and application error log files to track and fix bugs.
  • Responsible for troubleshooting various indexing issues by analyzing splunk logs such as splunkd.log, metrics.log ingested as internal index.
  • Support and execute arrangements considering a full information lifecycle (Search & Investigate, Add Knowledge, Monitor & Alert, Report & Analyze). Followed agile and scrum process for the whole implementation process.

 

Client:Sorix Solutions,Hyderbad                                                               March  2014  to  Jan  2016                                                                                                                           

Role: Senior Splunk Engineer

              Responsibilities:

  • Installed, Configured, Maintained, Tuned and Supported Splunk Enterprise Server 6.0 and Splunk Universal Forwarder 6.0 SplunkEnterprise Server 5.x/4.x, Splunk Universal Forwarder 5.x/4.x on various platforms like Windows Server, UNIX, Solaris.Tuned and Supported SplunkEnterprise Server 5.0.
  • Administered a complex cluster based environment involving search heads in a cluster while the indexers are in standalone mode.
  • Configured Splunk forwarder to send unnecessary log events to "Null Queue" using props and transforms configurations.
  • Created and configured management reports and dashboards in Splunk for application log monitoring.
  • Active monitoring of Jobs through alert tools and responding with certain action to logs analyses the logs and escalate to high level teams on critical issues.
  • Responsible for developing Splunk queries and dashboards targeted at understanding application performance and capacity analysis.
  • Extensive experience on setting up the Splunk to monitor the customer volume and track the customer activity.
  • Have involved as a Splunk Admin in capturing, analyzing and monitoring front end and middle ware applications.
  • Created Splunk app for Enterprise Security to identify and address emerging security threats using continuous monitoring, alerting and analytics.
  • Created and configured management reports and dashboards in Splunk for application log monitoring.
  • Responsible for administering, maintaining, and configuring a 24 x 7 highly available, Splunk apps for production portal environment.
  • Work closely with Application Teams to create new Splunk dashboards for Operation teams using advance XML and CSS.
  • Created Shell Scripts to install Splunk Forwarders on all servers and configure with common configuration files such as Bootstrap scripts, Outputs.conf and Inputs.conf files.
  • Extensively used Splunk Search Processing Language (SPL) queries, Reports, Alerts and Dashboards.
  • Installation and implementation of the Splunk App for Enterprise Security and documented best practices for the installation and performed knowledge transfer on the process.
  • Using DB connect for real-time data integration between SplunkEnterprise and databases.
  • Analyzing in forwarder level to mask the customer sensitive data able to manage distributed search across set of indexers.
  • Responsible to filter the unwanted data in heavy forwarder level thereby reducing the license cost.
  • Worked with administrators to ensure Splunk is actively, accurately running, and monitoring on the current infrastructure implementation.
  • Worked on properly creating/maintaining/updating necessary documentation for Splunk Apps, dashboards, upgrades and tracked issues.
  • Provided On-call support for various production applications.
  • Administered various shell and Python scripts for monitoring and automation.
  • Extensive experience on setting up the Splunk to monitor the customer volume and track the customer activity.
  • Administering the MS SQL Server by Creating User Logins with appropriate roles, dropping and locking the logins, monitoring the user accounts, creation of groups, granting the privileges to users and groups.
  • Installed & configured and managed 
  • Worked on various components in Splunkenterprise architecture such as Search Heads, Indexers, Deployment server, Deployer, License Master, Heavy/Universal Forwarders etc.
  • Developed Splunk queries and dashboards targeted at understanding application performance and capacity analysis.
  • Worked on multiple Splunk SPL functions to create new fields during search.
  • Used Splunk for Application Log, Security Log and Performance monitoring.
  • Configured Splunk multisite indexer cluster for data replication.
  • Developed Splunk infrastructure and related solutions as per automation tool sets.
  • Knowledge of security threats and vulnerabilities and how to detect and mitigate them, experience in building security monitoring and incident management solutions using Splunk.
  • Involved in standardizing Splunk forwarder deployment, configuration and maintenance across UNIX and Windows platforms.
  • Create dashboard from search, Scheduled searches o Inline search vs scheduled search in a dashboard.
  • Configured up to 10 standard data sources based on use case scenarios to support the underlying security requirements.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Optimized Splunk for peak performance by splitting Splunk indexing and search activities across different machines.
  • Worked with administrators to ensure Splunk is actively and accurately running and monitoring on the current infrastructure implementation.

 

Client:Konah Solutions,India                                                                             July  2013  to Feb 2014

Role: PL/SQL Developer

 

  • Responsibilities: 
  • Responsible for Analysis, Design, Coding, Debugging and testing the processes/programs that are necessary to extract data from Operational Databases, transforming and cleaning the data and loading it to data ware house.
  • Experience in writing the SQL, PLSQL stored procedures to meet the business requirements and the transformations.
  • Developed PL/SQL triggers and master tables for automatic creation of primary keys.
  • Used Dynamic SQL to implement DDL statements in PL/SQL programs.
  • Worked with the team to design, develop, test & implement system. Creation of database objects like tables, procedures using Oracle tools like PL/SQL, TOAD. Written Stored Procedures using PL/SQL.
  • Responsible for developing PL/SQL Functions, Procedures, Packages, Cursors and Triggers.
  • Created programming code using advanced concepts of Records, Collections and Dynamic SQL.
  • Extensively used error and exception handling techniques for validation purposes in code.
  • Created Functions for duty calculations and validation of the inputs.
  • Involved in Development of the applications by using PL/SQL tools like cursors and exception handlers, Loops and records. SQL Queries.
  • Generated specific reports using crystal report system.
  • Developed scripts for checking Oracle errors in alert logs and trace files for every 15minutes.
  • Involved in coding with SQL, PL/SQL function, stored procedure, packages, triggers, and Materialized view for Oracle database.
  • Successfully performed data replication using Materialized views.

Education

  • Bachelor's in 

Technical Skills:

 

  • Splunk: Splunk 5.x and 6.x 7.x 7.1, Splunk Enterprise, Splunk on Splunk, Splunk DB 2 Connect, Splunk Cloud, Hunk, Splunk IT Service Intelligence, Splunk Web Framework
  • Operating Systems: Windows 2000, XP, Win 10, Windows Server, Unix/Linux (Red Hat), Free BSD
  • Data Analysis: Requirement Analysis, Business Analysis, detail design, data flow diagrams, data definition table, Business Rules, data modeling, Data Warehousing, system integration
  • RDBMS: Oracle 11g/10g/9i/8i, MS-SQL Server 2000/2005/2008, Sybase, DB2 MS Access, Mysql
  • Web Technologies: HTML, DHTML, JavaScript, XML, XSL, XSLT, REST, SOAP
  • Web/App Servers: Apache Tomcat 6.0, web logic8.1/9.2, web sphere 6.0
  • Concepts: SDLC, Object Oriented Analysis and Design, Unified Modeling Language (UML), Assembly and System Level Testing, exposure in Agile.
  • Programming Language: C, C++, Java with Big Data, Python, UNIX shell scriptsChef Cookbooks

 

Professionals offering similar services to those of Naveen K

Professionals in the same Administrative sector as Naveen K

Professionales offering Splunk services

Professionals from different sectors near Seattle, City of Seattle, King

Other users who are called Naveen

Jobs near Seattle, City of Seattle, King

  • Funko

    Staff Accountant

    3 days ago


    Funko Everett, United States

    · Funko Overview · Welcome to the Funko-verse, a world built on pure imagination, a land governed by the philosophy that stories matter, a universe comprised of characters from countless fandoms, a galaxy of once upon a times and happily ever afters. · But what does Funko do? ...


  • The Judge Group Everett, United States

    Our client is currently seeking a Propulsion Engineer 4- Installations Analysis · Job Title: Propulsion Engineer 4- Installations Analysis · Location: Everett, WA · Employment Type: ContractResponsibilities: · Work · with Flight Test engineering and Test Integration to ensure the ...


  • Dickinson Fleet Services Seattle, United States

    ***$2,500 New Hire Bonus 50% after 30 days and 50% after 180 days*** *** If you have any questions or to connect with a recruiter while your application is being reviewed, please Text DFS2 to *** ****Veterans encouraged to apply**** Fleet Services – A Cox Automotive Company keeps ...