Jobs
Interviews

1 Splunk Dashboard Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 8.0 years

9 - 15 Lacs

bengaluru

Hybrid

Key Responsibilities Process Day to day Operational issues, requests and Project tasks Incident response and resolution within SLA's with excellent analytical and troubleshooting skills Providing all the necessary details to leads about the issue, steps taken, recommendation and any other relevant information Ticket Status Check and Update Respond to False Positive Alerts Incident Escalation and Progress Monitoring Create, review, update, and maintain Standard Operating Procedures. Prepare RCA for the escalated incidents. Perform the Shift handovers Security Incident Response: Leads the escalation as a point for security incidents. Analyze & investigate cyber threats on a real-time/day-to-day basis, involving alerts review, log analysis, and event/incident correlations. Prepare Document and Maintain Procedures, Response Plan, Runbooks, and associated processes for continuous improvement. Assist Analyst for security event and initial incident response to detected threats. Regularly review and recommend changes to policies or controls as needed to enhance security. Identifies potential gaps and offers solutions to include internal team needs, product improvements and client security posture. Develop reporting with focused messages to enable the stakeholders to understand their and responsibilities. Train and mentor, the peers and juniors in the team. SPLUNK Managing Splunk components such as indexer, forwarder, search head, etc Prepare Splunk dashboards. Install, Configure and Troubleshoot Universal forwarders. Triage of non-security alerts based on priority, problem identification and escalation. Escalate to designated contacts within Stratogent and Customer for issues outside SOPs, or when SOPs fail to resolve the issue. Work directly with delivery teams or customers to gather logging requirements. Convert Logging requirements into Splunk designs following best practices. Perform environment health checks. Update and / or create technical documentation. Must-have Skills: Prior Working Experience Must have worked on Splunk Performing incident handling, evidence acquisition, endpoint and Network,and Security Incident management Customer-focused Excellent communication skills (reading, writing, speaking and listening) Highly self-motivated and directed. Excellent attention to detail. Flexibility and willingness to work on different and multiple technologies Ability to effectively prioritize, organize and execute tasks in a high-pressure environment Good to have skills: Prior Work Experience Worked on any of the IAM and PAM tools. Certifications in Enterprise Admin or Cloud Admin of Splunk is an advantage Prior training and certification in communication is added advantage

Posted 2 hours ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies