Hi There! I’m Brandon Yates | Lead Splunk Professional Services Security Consultant
Dedicated, highly motivated, dedicated, detail-oriented and conscientious individual having demonstrable and exceptional background in Marine Corps intelligence analysis and experience as a Network Security Engineer in various processes includingcyber security concepts which comprises intrusion detection, firewall principles, malicious software, methods of authentication and administrative support as well as its processes, management and approach, a competent, enthusiastic and positive individual who has apassion for providing top-notch network security. Dedicated team player having strong communication skills, Display a strong passion towards project completion with an unwavering commitment towards redefining and surpassing an organization’s set goa
Follow Me
Linkedin
Github
Facebook
Twitter
Use Case Template
Use Case Template Each section of the use case template is below in a heading style with the instructions on populating that section between square brackets. General advice on implementing the use case is given in angle brackets. After this, build a document with these headings, populate it with information relevant to your organization, your …
Use Case Template
Before I moved over to the PS world, I was a Splunk admin who thought he had it all figured out. I had been working with Splunk for almost three years before I made the jump and got hit with the realization that I didn’t know near as much as I thought I did. I …
Dos and Donts of Splunking Your Syslog
Syslog is plentiful in all environments, no matter what the size may be and Splunking your syslog is something that inevitably happens, one way or another. And believe it or not, there are tons of ways you can Splunk that data. As a Splunk Professional Services Consultant, I’ve seen many ways that customers send that …
ES Implementation Checklist
Introduction Almost every customer that purchases Splunk’s Enterprise Security will also use Professional Services to implement the product. This guide will serve as a checklist to help you ensure you are prepared for the most successful Enterprise Security deployment as possible. We will identify the Who, What, Why, and How of a successful ES deployment. …