Hire freelance Splunk

Find and hire skilled Splunk freelancers with Wono and get work done on a secure and flexible community-driven platform.
Browse top 18 freelancers by category - to view all resumes click:
Bammidi Sai
security analyst soc Bammidi Sai, Websites, IT & Software
DXC Technology Dec 2017 to Present (3 years 6 months)Available to join in 15 Days or less Serving as Threat Analyst, my responsibilities was to research , investigate and report incidents. Working platforms included HP ArcSight Logger/ESM and Categorization of alerts supported Triaging for better prioritization. Performing investigation of high priority alerts to detect Threats/Incidents. Monitoring and completing second level analysis incidents .Detailed reporting of the incident with proper artifact and necessary recommendations.Development and deployment of use-cases supported Client requirement. Performing Threat profiling with reference to Assets available to make custom use cases. Fine tuning of existing use-cases. Analyzing data generated by different analytical models supported end device type. thorough analysis on the user behavior, end point and Network behavior supported analytical models.Performing historical based analysis to spot True Positive incidents by connecting dots.Comparing previous day’s incidents with the Analytical models to spot persistent threats. Perform analysis [weekly/monthly] on alerts triggered and suggest improvements/recommendations supported an equivalent .Research and Investigation of Botnets, C&C, Ransomware and Phishing attacks within the network.Served as Analyst in SOC operations for real-time monitoring, analyzing logs from various security/Industrial appliances by using HP ArcSight ESM console, ArcSight Logger, L1 connectivity and troubleshooting of logging issues
Websites, IT & Software
Computer Security
Manoj Kumar
Security Analyst Manoj Kumar, Websites, IT & Software
  3.3 years of overall experience as Security Analyst on Arcsight ESM.  Real time monitoring of Network Security components and devices such as Firewall, Routers, Manage 24x7 operations at SOC, including event monitoring which includes incident detection, tracking and analyzing on real time basis, report generation.  Aggregating and Correlating the Logs and Configuring Reports, Queries, Rules, Filters, Dashboards, Real Time Alerts and Console Resource Operations.  Create Log monitoring reports on daily, weekly and monthly basis in order to maintain strict SLA adherence.  Comprehensive Knowledge on Implementation of ESM Components (Connectors, Console). Good Knowledge in Implementation of Smart Connectors.  Provide 1st level of threat response for Security Event Management team at Security Operations Center (SOC).  Motivated team player and can adapt and learn new technologies, tools and applications.  Monitor events, Log analysis and Investigate incident a daily basis.  Regular health checks monitoring, and reporting.  Escalate issues as per the escalation matrix to the operation heads or senior authorities for faster and better resolution.  Importing IOCS in active list based on the recent attack.  Creating an incident ticketing, Analysing, Managing and Tracking security incidents to closure by coordinating with different teams.  Raising true positive incidents to respective stack holders and taking appropriate actions  Blocking suspicious and poor reputed IP’s on Firewall.  Pulling and analysing logs for the investigation cases  Generating reports and sending to stack holders for audit purpose  Well-versed with complete event annotation, incident management, attack analysis.  Good knowledge on networking concepts including OSI layers, TCP/IP, Ports, WAN and LAN concepts.  Worked in 24x7 Operational support.
Websites, IT & Software
Franklin Asong
Cyber Security Analyst Franklin Asong, Websites, IT & Software
• Work with ISSO and Security team to Access Security Controls selected, Create SAP, ROE where Vulnerability scanning and penetration testing procedures are included in the assessment, conduct assessment meeting kickoff and security Control meeting with ISSO and System Owner .Assessment finding result are stored on the (RTM) or Test case and all weakness noted be reported in our SAR report. Knowledge of SAN-20 and ISO 27001 Security controls and Mapping with NIST • Communicate between multiple clients to perform POA&M remediation for CAP remediation. Handled internal communications within Office of Information Security and external communications with several different divisions daily. Maintain excellent working relationships with both internal and external customers using communication skills • Provides services as security controls assessors (SCAs) and perform as an integral part of the Assessments and Authorizations process to include A&A scanning, documentation, reporting and analysis requirements. Analyzed current threats to information security and systems. Analyze security findings and data. Published reports and keeps metrics for client systems • Security Documentation: Perform updates to System Security Plans (SSP) Using NIST 800-18 as a guide to develop SSP, Risk Assessments, and Incident Response Plans, create Change Control procedures • Assures that the Information Systems Security department's policies, procedures, and practices as well as other systems user groups are following FISMA, NIST, and general agency standards • Reviews documentation to include System Security Plan NIST 800-18 as a guide, Authorization to Operate (ATO),Security Assessment report(SAR) using NIST800-30 as a guide, FIPPS 199 System Categorization using NIST 800-60 Vol1/Vol2 based on confidentiality, integrity and availability (CIA), policy and procedures, e-authentication, privacy threshold analysis (PTA), privacy impact analysis (PIA), contingency plan (CP) and interconnection security agreement as per NIST 800-47 , certification and accreditation (C&A) packages and system standard operating procedures Write finding and recommendation on the assessment and outline how the findings should be address and what evidence should be presented as proved of its remediation. Screenshot should be
Websites, IT & Software
Information Security
use cookies. By continuing to use this website you consent to our cookies policy. Privacy Policy