About your role:
You will leverage Fiserv's approved standard set of monitoring tools, such as Splunk, Dynatrace, CA ASM, Sitescope, Extrahop, Spectrum, CA PM, Moogsoft, and more, to empower operations teams in proactively identifying and remediating issues. Your expertise will span a wide range of monitoring techniques, including dashboarding, alerting mechanisms, and the creation of custom solutions. By leveraging these techniques, you will ensure that operations teams can effectively monitor the health of applications throughout the organization.
What you’ll do:
- Developing end-to-end monitoring dashboards, alerts, and reports using tools such as Splunk, Dynatrace, Extrahop, CA ASM, and Sitescope for both on-premise and cloud applications.
- Possessing expert-level knowledge and understanding of the SPL language in Splunk and building complex queries to extract insights.
- Applying expertise in implementing summary indexes, KV stores, lookups, and data model acceleration to optimize search performance and reporting within Splunk.
- Managing Splunk data, including onboarding data from various sources such as logs, DB connect, HTTP Event Collector (HEC), and utilizing Splunk REST APIs for querying and updating data, enabling seamless integration and automation.
- Creating and deploying Splunk configuration files (inputs.conf, props.conf, transforms.conf) to ensure proper data ingestion, parsing, and transformation according to specific requirements and Implement configurations for line breaking, timestamp extraction and time zone setting, data masking, and data filtering.
- Onboarding applications onto Dynatrace and creating visibility for processes and services utilizing advanced techniques in Dynatrace.
- Enabling monitoring for cloud container platforms such as Kubernetes, OpenShift, PCF, Azure Kubernetes Services, and Elastic Kubernetes Services.
- Creating advanced scripts (Selenium based) to emulate user behavior in monitoring tools such as CA ASM, Sitescope, and Dynatrace for synthetic monitoring efforts.
Experience you’ll need to have:
- 10+ years of experience in implementing monitoring and performance engineering practices, showcasing your expertise in this domain.
- 10+ years of scripting or software development experience, highlighting your proficiency in developing scripts or software solutions.
- 7+ years of experience using monitoring tools such as Splunk, Dynatrace, CA ASM, Sitescope, NPM tools (e.g., Extrahop), or equivalent tools.
- 6+ years of experience working with large-scale financial systems architectures, demonstrating your understanding of complex system environments.
- Splunk 9.x Power User and Splunk 9.x Admin Certifications are required.
- Bachelor’s degree in Computer Science, Information Technology, or a related field, and/or equivalent military experience.
Experience that would be great to have:
- Splunk Architect certification is optional.
How you’ll work:
- This role requires being on-call during non-standard and/or overnight hours on a rotational basis.
- This role requires use of a computer and audio equipment.
Important information about this role:
- This is a full-time, direct-hire position, and no contract options for unsolicited agency submissions will be considered.
#L1CD
#SplunkArchitecture
#ExtraHop
R-10366085