Posted:1 week ago| Platform:
On-site
Full Time
As Lead Splunk, Your Role And Responsibilities Would Include Hands-on experience in the SIEM domain Deep understanding of Splunk backend operations (UF, HF, SH, and Indexer Cluster) and architecture Strong knowledge of Log Management and Splunk SIEM. Understanding of log collection, parsing, normalization, and retention practices. Expertise in optimizing logs and license usage. Solid understanding of designing, deploying, and implementing scalable SIEM architecture. Understanding of data parsimony as a concept, especially in terms of German data security standards. Working knowledge of integrating Splunk logging infrastructure with third-party observability tools like ELK and DataDog. Experience in identifying the security and non-security logs and applying appropriate filters to route the logs correctly. Expertise in understanding network architecture and identifying the components of impact. Proficiency in Linux administration. Experience with Syslog. Proficiency in scripting languages like Python, PowerShell, or Bash for task automation. Expertise with OEM SIEM tools, preferably Splunk. Experience with open-source SIEM/log storage solutions like ELK or Datadog. Strong documentation skills for creating high-level design (HLD), low-level design (LLD), implementation guides, and operation manuals. Skills: siem,linux administration,team collaboration,communication skills,architecture design,python,parsing,normalization,retention practices,powershell,data security,log management,bash,splunk,log collection,documentation,syslog,incident response,data analysis Show more Show less
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Gurugram, Haryana, India
0.0 - 0.0 Lacs P.A.
Gurugram, Haryana, India
0.0 - 0.0 Lacs P.A.