Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailLocation:
Pune Maharashtra IndiaJob ID:
R0097122Date Posted:
Company Name:
HITACHI INDIA PVT. LTDProfession (Job Category):
OtherJob Schedule:
Full timeRemote:
NoJob Description:
Job Title:Splunk SME
Designation:Senior Engineer/ Assistant Manager
Company:Cumulus Systems Pvt. Ltd.
Location:Pune India.
Salary: As per Industry
Company Overview:
Cumulus Systems engages in providing End-to-End Software Development Lifecycle involving Business & Requirements Analysis Solution Architecture & Design Development Testing Deployment and Postproduction Support. Its cross-domain storage performance management platform called MARS (Measure Analyze Recommend Solve) monitors and helps manage large-scale heterogeneous IT infrastructure across the entire enterprise.
Job Roles & Responsibilities:
1. Splunk Platform Implementation and Configuration:
Lead the deployment configuration and integration of Splunk with various data sources and security tools.
Ensure that Splunk instances (indexers forwarders search heads) are set up correctly and optimized for performance.
Customize Splunk for different security use cases (e.g. monitoring incident detection compliance reporting).
2. Data Collection and Ingestion:
Configure data inputs forwarders and data parsers for various log sources (e.g. network devices firewalls endpoints servers).
Set up log forwarding and ensure efficient and secure data collection from a wide range of security and IT systems.
Ensure data normalization and correlation to make it usable for analysis and detection.
3. Search and Query Optimization:
Design and develop complex SPL (Search Processing Language) queries to analyze security data.
Optimize searches for performance and efficiency especially when working with large datasets.
Create and maintain reports dashboards and alerts for security monitoring and incident response.
4. Incident Detection and Response:
Use Splunk to monitor security events in real-time identifying potential threats and anomalies.
Configure and fine-tune Splunks correlation searches and alerts to ensure accurate detection of security incidents (e.g. intrusions breaches).
Work with security operations teams to investigate incidents and provide actionable insights from Splunk data.
5.Security Monitoring and Threat Intelligence Integration:
Integrate external threat intelligence feeds into Splunk to enhance security monitoring.
Leverage Splunks machine learning capabilities to identify patterns of suspicious activity.
Create custom detection rules machine learning models and analytics to detect emerging threats.
6.Reporting and Compliance:
Generate and deliver automated security reports (e.g. for compliance frameworks like GDPR PCI-DSS HIPAA).
Ensure that Splunk data is properly indexed categorized and stored to support compliance and auditing requirements.
Create dashboards and visualizations for executives managers and technical teams to track security posture.
7.Splunk Tuning and Optimization:
Perform regular health checks of the Splunk environment to ensure high availability scalability and performance.
Tune Splunk configurations (indexing search data storage) to maintain optimal performance especially during peak event loads.
Troubleshoot and resolve issues related to Splunk performance data accuracy or integration challenges.
8. Collaboration and Knowledge Sharing:
Work with other security teams (e.g. SOC Incident Response Threat Intelligence) to align Splunks capabilities with organizational security needs.
Provide training mentoring and best practices for other Splunk users and administrators.
Stay up to date with new features apps and updates to Splunk and share knowledge with the team.
9. Documentation and Standards:
Maintain comprehensive documentation for Splunk configurations use cases search queries and data pipelines.
Develop standard operating procedures (SOPs) for various Splunk-related tasks (e.g. creating reports handling incidents data ingestion).
Document Splunk customizations integration processes and automation to ensure consistency across teams.
Skills:
1. Experience and Technical Expertise:
Strong experience (3 years) working with Splunk in a security operations environment.
Deep knowledge of Splunks components (indexers forwarders search heads and deployment servers).
Experience in creating and tuning SPL queries developing Splunk apps and managing Splunk Enterprise Security (ES).
Hands-on experience in data parsing normalization and event correlation using Splunk.
Proficient in integrating third-party tools such as firewalls intrusion detection systems (IDS) and vulnerability scanners with Splunk.
2. Security Knowledge:
Strong understanding of SIEM use cases for security monitoring and incident detection.
Knowledge of network security endpoint security cloud security and threat intelligence integration within a SIEM context.
Experience in detecting and responding to cybersecurity threats (e.g. malware DDoS attacks insider threats APTs).
3. Cloud and Hybrid Environments:
Experience with hybrid environments where on-premises and cloud data sources are integrated into Splunk.
Familiarity with deploying and managing Splunk in cloud environments (e.g. AWS Azure Google Cloud).
4. Collaboration and Communication:
Strong communication skills to work with cross-functional teams (SOC IT Compliance etc.) and translate security data into actionable business insights.
Ability to communicate technical information effectively to both technical and non-technical stakeholders.
5. Problem-Solving and Troubleshooting:
Strong troubleshooting skills particularly when dealing with complex data integration or performance issues in a Splunk environment.
Ability to identify root causes of security issues and design effective solutions using Splunk.
6. Data Analytics and Reporting Skills:
Ability to design and build custom dashboards reports and alerts to provide actionable insights from security data.
Proficiency in data visualization to communicate findings to both technical and non-technical stakeholders.
Knowledge of KPI and metric tracking for security and operational effectiveness.
7. Scripting and Automation:
Proficiency in scripting languages such as Python Bash or PowerShell for automation tasks.
Experience with Splunk REST API or SDKs to automate processes or integrate Splunk with other tools in the ecosystem.
Experience: 5 Years
Full-Time