Profileimage by Max Ruas Splunk and DevOps engineer from EDINBURGH

Max Ruas

available

Last update: 18.01.2018

Splunk and DevOps engineer

Company: MaxIT
Graduation: Red Hat RHCSA and Splunk Power User
Hourly-/Daily rates: show
Languages: English (Limited professional) | Italian (Elementary) | Portuguese (Native or Bilingual) | Spanish (Elementary)

Attachments

max-ruas-cv-2018.docx

Skills

  • SPLUNK: Been developing some of the views and searches and working with CLI on Splunk to administer some of the tasks also been heavily involved in the back end administration like promoting apps across the cluster or adding a new peer. I am a Splunk Power User Certified.
  • PYTHON: I have written a script that takes a user’s full name and email and then opens an account on the Splunk server and sends an email with the username and password to the email provided for the user
  • PUPPET: I have worked with a puppet engineer helping on changing classes for user and have completed the puppet learning VM in my free time at home
  • ANSIBLE: I have had a chance to develop scripts to deploy configurations using this technology
  • UNIX/LINUX: I have been involved in administrating tasks as user management and sudoers + hosts file implementation or modification of a port on squid or any other BAU tasks
  • MYSQL: I have been exposed and created new tables or altered existing ones
  • PSQL: CACI used postgress database giving me the opportunity to learn a bit about it
  • BASH: I am comfortable in a bash environment
  • LDAP: I have been added to a project to work with authenticating SPLUNK using LDAP also managing users using this technology.
  • TRIP-WIRE: I have been given an opportunity to work with trip-wire to diagnose traffic between hosts to pin down a root cause of authentication between Splunk and LDAP server.
  • LOCAL-WIKI: I have helped in adding or modifying pages to help users on their BAU tasks
  • ACTIVE DIRECTORY: I have experience of user administration involving this technology
  • AWS: CACI Company used AWS and at times I helped to configure route53 check tuning and performance when needed.
  • GIT: I Have used GIT to integrate with an Ansible script. I worked with a colleague to create a CIS benchmark to deploy security configuration.
     
  • SKYSCAPE: CACI used this technology and often I worked with it, creating new Vapps and VMs + configuring VShield, and its VMs.

Project history

Tata Consultancy Services – Munich                              Dec2017 – 10-02-2018
Splunk Administrator
I have joined TCS in Munich in the hope of one year contract but unfortunately the end client signed the deal with a different supplier making me return to the Market.
Royal Bank of Scotland – Edinburg                                    Aug2016- Dec2017
Splunk administrator
After one year here in RBS I have learned and adapted well in their way of work.
Always seeking ways to improve or learn a new technology by attending DevOps meetings or Splunk user meet ups in Napier University.
I have now an intern apprentice that helps me with the admin, tuning and trouble-shooting while helping me to cling to my knowledge by reviewing them when needed to help.
I also help an external team set up to look at first-line issues.
My main role in RBS is to help all teams on boarding to reach production.
I do this by advising/showing/helping them to understand how to meet their requirement by making sure it fits in RBS module and standards.
After development I promote all apps after discussing retention and licence,
Some times they retention and volume of data succeeds our hardware in place, we then work out with projects to implement a new indexer and this in many cases is implemented by me.
Monitise, London                                                                                 Mar 2016 – Aug 2016 
DevOps Engineer
I have re-started with Monitise and have been involved with many technologies as reflected above and I have joined the team for Systems Operations to administer the  Splunk platform.
CACI, London                                                                                         Nov 2015 - Mar 2016
DevOps Engineer
Improved best practices, automated settings through bash scripts, set up backup and restoration procedure with netbuilder and added security layers through iptables VShield and SELinux. Supported the deployment and maintaining of web based sites (LAMP stack) with central logging using Elasticsearch/Logstash. Managed and tuned Databases replication for high availability and improved performance. Using Nagios and Zymon as monitoring tool for servers and network health.
Monitise, London                                                                                  Aug 2014 - Nov 2015
Junior DevOps Engineer
I was responsible for creating and managing server for the Splunk platform. Maintaining and tuning the IT Infrastructure (Solaris and Red Hat Linux). Resolving and implementing day-to-day tasks this included clearing our queue of tickets managed by service now Or/and Jira. Implemented a central authentication through LDAP for Splunk. I’ve developed and

Local Availability

Open to travel worldwide
Any

Other

CERTIFICATIONS
                                                                                                       
RHCSA (Red Hat Certified System Administrator) - Dec 2013
License 130-190-796
https://www.redhat.com/rhtapps/certification/verify/?certId=130-190-796
Splunk Power User certified.
                                                                                                 
Experienced RHCSA certified Linux Systems Administrator/DevOps Engineer with a strong will to learn and grow professionally. Currently Max is a Splunk Power User. Having started learning Linux “hands on” 3+ years ago, Max is at ease with Splunk, Linux CLI and classic tools such as vim or bash, he has a basic understanding of modern tools such as Ansible/Puppet for configuration management, Jenkins for continuous integration and AWS.
Max have worked with splunk for 3years+ now consequently has a strong experience as Splunk admin and developer with knowledge in Extracting, Transforming, Analysing, Visualizing, and presenting data from diverse business areas, experienced in Parsing, Indexing, Searching concepts and Hot, Warm, Cold, Frozen bucketing for data retention.
Max has a Good knowledge about Splunk architecture and various components (indexer, forwarder, search heads, deployment server/SHcluster), Heavy and Universal forwarder.
I have gained experience in Preparing, arranging and testing the Splunk search strings and operational strings. I have worked on large datasets to generate insights by using Splunk to monitor technologies like Cloudera and Informatica.
  
Experience in developing using SPL (Splunk processing language) and dashboards targeted at understanding application performance and capacity analysis.
Experience in working with Splunk authentication and permissions, I have significant experience in supporting large scale Splunk deployments and controlling access to the data set.
Expert in installing SPLUNK apps for Linux, UNIX environments and Windows environment.
Knowledge on Configuration files in Splunk default and local dirs (props.conf, transforms.conf, output.conf, serverclass.conf, authentication.conf/authorized.conf, metadata etc)
I have had experience in creating Knowledge Objects such as time chart attributes such as Tags, Event Types, creating dashboards and reports using XML.
Also in creating dashboard from search, Scheduled searches of inline search vs scheduled search in a dashboard with various types of charts Alert settings Knowledge of app creation, users and roles access permissions.
TECHNICAL EXPERIENCE
  • SPLUNK: Been developing some of the views and searches and working with CLI on Splunk to administer some of the tasks also been heavily involved in the back end administration like promoting apps across the cluster or adding a new peer. I am a Splunk Power User Certified.
  • PYTHON: I have written a script that takes a user’s full name and email and then opens an account on the Splunk server and sends an email with the username and password to the email provided for the user
  • PUPPET: I have worked with a puppet engineer helping on changing classes for user and have completed the puppet learning VM in my free time at home
  • ANSIBLE: I have had a chance to develop scripts to deploy configurations using this technology
  • UNIX/LINUX: I have been involved in administrating tasks as user management and sudoers + hosts file implementation or modification of a port on squid or any other BAU tasks
  • MYSQL: I have been exposed and created new tables or altered existing ones
  • PSQL: CACI used postgress database giving me the opportunity to learn a bit about it
  • BASH: I am comfortable in a bash environment
  • LDAP: I have been added to a project to work with authenticating SPLUNK using LDAP also managing users using this technology.
  • TRIP-WIRE: I have been given an opportunity to work with trip-wire to diagnose traffic between hosts to pin down a root cause of authentication between splunk and ldap server.
  • LOCAL-WIKI: I have helped in adding or modifying pages to help users on their BAU tasks
  • ACTIVE DIRECTORY: I have experience of user administration involving this technology
  • AWS: CACI Company used AWS and at times I helped to configure route53 check tuning and performance when needed.
  • GIT: I Have used GIT to integrate with an Ansible script. I worked with a colleague to create a CIS benchmark to deploy security configuration.
     
  • SKYSCAPE: CACI used this technology and often I worked with it, creating new Vapps and VMs + configuring VShield, and its VMs.
EMPLOYMENT HISTORY
Tata Consultancy Services – Munich                              Dec2017 – 10-02-2018
Splunk Administrator
I have joined TCS in Munich in the hope of one year contract but unfortunately the end client signed the deal with a different supplier making me return to the Market.
Royal Bank of Scotland – Edinburg                                    Aug2016- Dec2017
Splunk administrator
After one year here in RBS I have learned and adapted well in their way of work.
Always seeking ways to improve or learn a new technology by attending DevOps meetings or Splunk user meet ups in Napier University.
I have now an intern apprentice that helps me with the admin, tuning and trouble-shooting while helping me to cling to my knowledge by reviewing them when needed to help.
I also help an external team set up to look at first-line issues.
My main role in RBS is to help all teams on boarding to reach production.
I do this by advising/showing/helping them to understand how to meet their requirement by making sure it fits in RBS module and standards.
After development I promote all apps after discussing retention and licence,
Some times they retention and volume of data succeeds our hardware in place, we then work out with projects to implement a new indexer and this in many cases is implemented by me.
Monitise, London                                                                                 Mar 2016 – Aug 2016 
DevOps Engineer
I have re-started with Monitise and have been involved with many technologies as reflected above and I have joined the team for Systems Operations to administer the  Splunk platform.
CACI, London                                                                                         Nov 2015 - Mar 2016
DevOps Engineer
Improved best practices, automated settings through bash scripts, set up backup and restoration procedure with netbuilder and added security layers through iptables VShield and SELinux. Supported the deployment and maintaining of web based sites (LAMP stack) with central logging using Elasticsearch/Logstash. Managed and tuned Databases replication for high availability and improved performance. Using Nagios and Zymon as monitoring tool for servers and network health.
Monitise, London                                                                                  Aug 2014 - Nov 2015
Junior DevOps Engineer
I was responsible for creating and managing server for the Splunk platform. Maintaining and tuning the IT Infrastructure (Solaris and Red Hat Linux). Resolving and implementing day-to-day tasks this included clearing our queue of tickets managed by service now Or/and Jira. Implemented a central authentication through LDAP for Splunk. I’ve developed and helped on maintaining and improving Splunk.
Profileimage by Max Ruas Splunk and DevOps engineer from EDINBURGH Splunk and DevOps engineer
Register