SIEM / Splunk / QRadar (9 records)

ID Candidate Summary* Location Relocation % Willing to Travel
This Sr. Security Analyst has worked in cybersecurity 5 years. He has a strong technical background in enterprise networks. He currently a Sr. Security Team Lead at SAIC over 6 people. He has implmented and configured SIEM's such as Splunk. He has used IBM Site Protector (IDS), Splunk Enterprise Security, Burp Suite, Volatility and various other security tools for security event detection and analysis. In his prior 8 years of experience, he was a network analyst and systems architect.
Arlington, Virgnia
Yes, For the right opportunity
Splunk Architect with 2 years of experience building Splunk apps. Has created 7 applications and has built out new menus.
Primary Splunk SME which works with client to integrate applications with Splunk.
Expert level Python development expertise.
10 years as a network engineer which provides a robust foundation for security work.
5 years working with Juniper and CIsco firewalls.
One recent new feature he built processes outputs in CES formats them and imports them into ArcSight
San Francisco Bay
For the right opportunity
Heads down Splunk Architect/Developer with 6 years of experience developing dashboards, integrations and applications.
Not a solutions architect but a solid analyst/developer.
Arlington, TX
Strong SIEM and QRadar Consultant with 3 years as a technical SIEM Lead. He has installation and configuration experience as well as report configuration. He can upgrade or install QRadar or SIEM software from scratch. Conduct technical investigation of current log sources for integration with QRadar. Create multiple dashboards within QRadar. Create reports of security interest for review on QRadar. He is only looking to work remotely and travel as needed.
3 years working with Splunk, Additional 2 years of experience developing BI solutions using Tableau.
Previously an IT Security Administrator for 4 years so he knows the how and why to work with security data.
Developed many complex Enterprise security Dashboards in Splunk.
Has strong perl scripting skills.
Python used to create Splunk apps.
- Almost 4 yrs of Splunk experience and was involved in the integration of Splunk at ExxonMobil.
- He has experience in Solution Design, architect, deployment and configuration of Splunk components (forwarders, indexers, search heads) and development (creation of dashboards, reports, alerts and Splunk integration.
- He has created 15 dashboards.
- He has strong scripting skills (shell and javascript) He has reawd python code but not created but would be a quick study.
- He is a Splunk Certified Associate.
- He owns a home in Houston and is not willing to relocate but willing to travel 25% of the time.
Houston, TX
4 yrs of Splunk Development experience working at BofA and Nike creating logs, creating dashboards, etc. He has experience writing complex scripts to extract data from logs. He is located in Dallas/Ft Worth area and willing to relocate anywhere.
Ft Worth
Primary Splunk developer for a major insurance company. He has developed from scratch over 10 applications, 40 data models, and a ton of Splunk dashboards.
Works on PCI, Enterprise Security, IT Modules. Utilizes other functionality to build custom user behavior analytics.
San Francisco Bay
Very impressive Certified QRadar Professional, He was the lead on Mass Mutual, Computer Associates, HSDC Bank.
He has implemented systems with 100's of thousands of devices which aggregated to 100's of collectors and redundant collectors which were divided up into zones.
IBM Certified Contractor.
New York City