Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Favour Bam

Upper Marlboro,MD

Summary

Splunk engineer experienced implementing Splunk best practices in enterprise environments. I have built Splunk environments to be resilient and highly available. Experienced in monitoring, tuning, troubleshooting, and deploying applications in Cloud and virtualized infrastructures. Team oriented and the willingness to learn. I look forward to bringing my values to your operations.

Overview

6
6
years of professional experience
6
6
Certification

Work History

Splunk Engineer

TechforwardLLC
02.2019 - Current


  • Installed and configured Splunk enterprise on Linux an Windows systems
  • Onboarded O365, DUO & SalesForce API ingestion leveraging Splunk Technical Add-ons
  • Configured windows and linux universal forwarders to send their internal logs to Splunk
  • Pushed inputs apps from the Cluster Master to disable web access and enable listening
  • Pushed deployment apps for from the deployments server to clients
  • Troubleshot Splunk forwarder issues on Windows servers via PowerShell and services menu
  • Troubleshot and tuning configurations file issues leveraging btool and spec files
  • Installed and configured universal forwarder to monitor and forward logs to Splunk.
  • Implemented end-to-end upgrade of Splunk Enterprise
  • Collaborated with automation team to upgrade forwarders via Ansible
  • Configured syslog server to listen to traffic on UDP & TCP ports 514 via rsyslog service
  • Configured Heavy Forwarder by pushing outputs app from the Deployment Server
  • Collaborated with a security engineer to consolidate logs from Palo Alto, Cyberark, Tanium appliances on syslog servers
  • Validated incoming and outgoing data traffic to syslog servers via tcpdump
  • Implemented Whitelist & Backlist to monitor or exclude specific files in directories
  • Built a Multisite indexer Cluster sandbox for testing new onboarding use cases and Splunk upgrades
  • Pushed the Splunk Add-on for Windows from the Cluster master to the cluster peers, and validated the bundle was pushed
  • Conducted weekly health checks via the monitoring console to mitigate issues in the environment
  • Created deployment apps on a deployment server, associated it with the proper serverclasses, and validated the app was deployed
  • Created dynamic, static, and scheduled report dashboards
  • Created multi-panel and dropdown dashboards to track authentication events
  • Created an App and restricted access to Knowledge Objects (Reports, Dashboards, and Alerts) for just the Data Security Team
  • Created a tabular visualizations for Malware Detection using single panel, line, and bar charts to show hosts infected
  • Used Splunk best practices to filter specific fields via the use of field operators, keyword searches, and table commands
  • Utilized eval functions like round, case, if, match, concatenate to normalize fields for better visualizations
  • Utilized stats function like sum, values, avg, min, max, dc, and count for data ingestion validation
  • Applied Splunk best practices for efficient searches queries by specifying indexes, utilizing timepicker, specifying mode, and utilizing filtering commands

Linux Administrator

TechforwardLLC
07.2017 - 01.2019
  • Configured sudoers files in Linux to elevate privileges for users
  • Modified sshd config in Linux to enable password authentication
  • Subscribed and configured EC2 instances in AWS
  • Implemented security groups to restrict inbound access to instances
  • Leveraged AWS CLI to pull files from s3 buckets
  • Leveraged IAM service to gain access to servies
  • Backed up files to S3 Buckets
  • Securely authenticated to remote Linux Servers
  • Created Key Pairs for secure authentication to Linux servers
  • Utilized Linux command line utilities like ifconfig, netstat, and netstat validate and troubleshoot network issues
  • Securely copied files in Linux from Windows to Linux
  • Utilized Linux command like chmod, and chown to assign access to Linux resources
  • Validated and managed the status of services in Linux using systemctl utility to check, stop, restart, or start services
  • Securely authenticated to remote Linux Instances using Putty ssh client
  • Utilized the “tracert” and “ping” commands to troubleshoot and validate network connectivity
  • Created and modify user accounts and groups in Linux
  • Troubleshoot Linux Servers for configuration and password issues
  • Utilized Linux commands lines such as ps, top, and uptime to review server functionality

Education

BS Degree - Biology & Natural Science

University of Science And Arts of Oklahoma
Oklahoma
05.2021

Skills

  • Operating Systems: RHEL 7 & 8, Windows Server 2012, 2019,AWS Linux,Ubuntu, MacOs Sonoma, Solaris
  • Log Analysis Tool: Splunk, Universal Forwarder, Heavy Forwarder
  • Cloud: AWS-EC2, Public/private key pairs, security groups, S3,IAMAWS CLI
  • Networking Protocols: TCP, UDP, IP, DNS, LAN, WAN, HTTPS, SSH
  • Security Technologies: Palo Alto, Cisco, TCPDump, Vagrant, Putty/SSH
  • File Sharing: WINSCP, SCP, rsync
  • Troubleshooting: Software updates Server Hardening Hardware failure Application & Services
  • Network Troubleshooting: Ping, tracert, traceroute, ncat, netstat lsof,wget
  • Builds: Splunk distributed environment AWS Sandbox
  • Data Consolidation: rsyslog
  • Server Monitoring: Splunk Monitoring Console, Nagios,
  • Applications: Vagrant, WinScp, PowerShell, Putty, MtPutty

Certification


  • Splunk Enterprise Certified Admin
  • Splunk Core Certified Power User
  • Splunk Core Certified User
  • Security +
  • CCOE Stream Admin Certified
  • CCOE Stream User Certified


Timeline

Splunk Engineer

TechforwardLLC
02.2019 - Current

Linux Administrator

TechforwardLLC
07.2017 - 01.2019

BS Degree - Biology & Natural Science

University of Science And Arts of Oklahoma
Favour Bam