Independent Consultant
Architecture/Planning
Banking/Mortgage
Computer Networking
Computer Software/Engineering
Computer/Network Security
Government Administration
Information Technology/IT
Management Consulting
Security/Investigations
United States
English
Mr. Brill is a Cyber Security & Splunk Engineer with over 14 years of experience in security, consulting, data analytics, risk management,
systems engineering, project management, and dashboarding. He holds the highest level Splunk certifications, GIAC GMON certification,
and a master’s degree in systems engineering. He has proven success in a variety of challenging business situations spanning cultures,
technologies, industries, and business models. He continues to build his skillset by working on high profile cyber engagements with
geographically dispersed teams to achieve sustainable business growth. Mr. Brill’s unique skillset coupled with his global and military law enforcement experience makes him extremely flexible and innovative, with proven leadership, security, and teamwork skills in both high-stress and time-critical situations.
Career Highlights:
• Architected 40TB/day ingest AWS gov cloud Splunk deployment for large U.S. gov agency.
• First installation of Cribl LogStream in a government environment.
• Heavy use of Agile/Scrum methodology in ServiceNow.
• Transitioned legacy SIEM technology, ArcSight, over to Splunk Enterprise and Splunk Enterprise Security. End to end implementation and tuning.
• Created custom install scripts for Linux and Windows for use with a configuration management tool, CA-PAM, for managing Splunk configurations on thousands of client servers/machines.
• Stood up Splunk Enterprise Pilot in AWS Government cloud. Configured AWS and ServiceNow integrations.
• Installed and configured Splunk Enterprise stand-alone instance
• Performed technical assessment of Splunk environment and corrected over 6,000 errors in the Splunk environment
• Reviewed Splunk logical and physical architecture for compliance with best practices
• Helped customer estimate license sizing and growth projections for future Splunk scaling.
• Advanced troubleshooting of Splunk installation issues for pharmaceutical company
• Trained company’s Splunk administrators on best practices for data onboarding
• Installed/configured the NetApp application and technology add-on to assist with Columbus, OH police officer body camera data
• Configured SSL encryption on all Splunk servers across enterprise Splunk environment.
• Managed a large effort for using Splunk as an automation tool to replicate business logic previously completed by manual processes in a custom SQL Database solution.
• Integrated multiple data sources into a centralized Big Data Analytics Intelligence Platform for optimal visualizations - establishing executive-level dashboards and reports to make risk-based decisions for remediation/mitigation of identified issues.
• Launched a Splunk dashboard solution to automate 15 Key Performance Indicators (KPIs) and radically increased enterprise security for Zurich Insurance Group.
• Developed an approach to import, correlate, and normalize disparate data sets of structured and unstructured data including: Plans of Actions and Milestones (POAMs), risk-based decisions (RBDs), network/operating system vulnerability scan data, database vulnerability scan data and compliance scan data, in order to improve the overall cyber posture of the enterprise.
• Analyzed/planned quarterly cyber application release schedule for 12 applications to ensure seamless implementation for the client.
• Coordinated with 10 developers and engineers to implement Identity and Access Management (IdAM) and Access-Based-Access-Control (ABAC) security solutions for the entire Department of Defense (DoD).
● Lead Splunk Engineer and architect for 30 person team on 40TB AWS cloud Splunk deployment for large U.S. gov agency.
● Developed complex indexation strategy and account delegation model for 50+ sites for aggregation into one centralized location.
● First installation of Cribl, log streaming consolidation and correlation technology, for a large U.S. federal entity.
● Tuned Splunk searches taking 2+ hours down to less than a few seconds over billions of events across entire government agency.
● Cleaned up poorly performed data onboarding
● Utilized field aliases, tags, eventtypes for the Common Information Model (CIM)
● Created better correlated searches in enterprise security for real time use of Security Operations Center (SOC)
● Aided Managed Detection & Response (MDR/MSSP) team with data quality issues for 60+ data sources over 3 customers
● Created correlation searches in Splunk Enterprise Security for missing sourcetypes, indexes or forwarders on all MSSP segments.
● Developed advanced regular expressions for 300+ field extractions, field aliases for proper CIM compliance.
● Utilized Github repository as a change control measure to commit changes to index clusters, heavy forwarders and deployers.
● Stood up Splunk Enterprise Pilot in AWS Government Cloud
● Troubleshot issues with AWS gov cloud and a hardened enclave environment (HCE)
● Configured ServiceNow integration to work with Splunk flawlessly
● Troubleshot Splunk installation issues for pharmaceutical company
● Trained company’s Splunk administrators on best practices for data onboarding
● Installed and configured Splunk Enterprise stand-alone instance
● Transitioned legacy SIEM technology, ArcSight, over to Splunk Enterprise and Splunk Enterprise Security
● Stood up full implementation of Splunk and Splunk Enterprise Security, 6 TB ingest rate/day.
● Onboarded data from over 20 sources, syslog and security applications
● Created custom install scripts for Linux and Windows used to install Splunk on hundreds of client servers/machines
● Full Splunk environment upgrade from v 6.6 to 7.0.3
● Live demo to customer of how to correctly use the Splunk data model and map fields to CIM format
● Created 20 correlation searches and alerts with the Splunk Security Essentials App
● Performed technical assessment of Splunk environment and found over 6000 errors in the environment
● Reviewed Splunk logical and physical architecture for compliance with best practices
● Helped customer estimate license sizing and growth projections for future Splunk scaling.
● Installed/configured the NetApp application and technology add-on to assist with Columbus, OH police officer body camera data
● Configure SSL encryption on all Splunk servers across enterprise Splunk environment.
● Administered Splunk implementation work to migrate all financial asset and risk data into Splunk for the Zurich enterprise.
● Designed and developed enterprise dashboards from real-time vulnerability data using advanced searches and reports, data models,
macros, summary indexes, load jobs, user permissions, tokens and drilldowns.
● Translated CISO/CTO requirements into a powerful proof of concept (POC) solution, for replication of business intelligence, data
correlation, and automation into Splunk - enabling more informed c-suite decisions.
● Created custom configurations in Splunk to handle use case/content development from various data sources dashboard creation efforts
and developed a configuration migration plan to migrate asset and risk data from Data Mart into Splunk.
● Managed a large effort for using Splunk as an automation tool to replicate business logic previously completed by manual processes
in a custom SQL Database solution.
● Launched a Splunk dashboard solution to automate 15 Key Performance Indicators (KPIs) and radically increased enterprise security
for Zurich Insurance Group.
● Created 50+ advanced Splunk search queries to analyze and report client data findings, improving network cyber threat visibility.
● Integrated multiple data sources into a centralized Big Data Analytics Intelligence Platform for optimal visualizations - establishing
executive-level dashboards and reports to make risk-based decisions for remediation/mitigation of identified issues.
● Responsible for developing an approach to import, correlate, and normalize disparate data sets of structured and unstructured data
including: Plans of Actions and Milestones (POAMs), risk-based decisions (RBDs), network/operating system vulnerability scan data,
database vulnerability scan data and compliance scan data, in order to improve the overall cyber posture of the enterprise.
● Gathered, aggregated, correlated, analyzed, and visualized security data to highlight trends, issues with processes, prioritized
mitigations, and recommended remediation approaches to improve security posture of the organization.
● Developed visualizations depicting vulnerabilities and organizational trends in patch management to highlight gaps for improvement.
● Analyzed/planned quarterly cyber application release schedule for 12 applications to ensure seamless implementation for the client.
● Coordinated with team of 10+ developers and engineers to implement Identity and Access Management (IdAM) and Access-Based-
Access-Control (ABAC) security solutions for the entire Department of Defense (DoD).
● Established executive-level dashboards and reports to make risk-based decisions for remediation/mitigation of identified issues.
● Managed staff of 15+ in combat/non-combat operations, ensuring security for Balad Air Base, Iraq – a critical U.S. military outpost.
● Coordinated and dispatched on-duty patrol activities in community of 14,500+ during routine, emergency, and contingency operations.
● Directed full spectrum threat response and protection for over $700M in property, equipment, and supplies – zero loss of life.
● Led teams during 13 indirect fire attacks; identified impact site of unexploded ordinances, established cordons/evacuated personnel.
● Lead Splunk Engineer and architect for 30 person team on 40TB AWS cloud Splunk deployment for large U.S. gov agency.
● Developed complex indexation strategy and account delegation model for 50+ sites for aggregation into one centralized location.
● First installation of Cribl, log streaming consolidation and correlation technology, for a large U.S. federal entity.
● Tuned Splunk searches taking 2+ hours down to less than a few seconds over billions of events across entire government agency.
● Performed Cyber threat hunting operations for U.S. Health and Human Services Office of Inspector General.
● Managed Security Services Provider (MSSP) data on-boarding and Splunk Enterprise Security CIM compliance Engineer.
● Aided Managed Detection & Response (MDR/MSSP) team with data quality issues for 60+ data sources over 3 customers
● Created correlation searches in Splunk Enterprise Security for missing sourcetypes, indexes or forwarders on all MDR segments.
● Developed advanced regular expressions for 300+ field extractions, field aliases for proper CIM compliance.
● Utilized Github repository as a change control measure to commit changes to index clusters, heavy forwarders and deployers.
• Stood up Splunk Enterprise Pilot in AWS Government Cloud and troubleshot issues in a hardened enclave environment (HCE).
• Configured ServiceNow integration with Splunk flawlessly, and correcting Splunk installation issues for pharmaceutical company.
• Trained company’s Splunk administrators on best practices for data onboarding
• Transitioned legacy SIEM technology, ArcSight, over to Splunk Enterprise and Splunk Enterprise Security
• Stood up full implementation of Splunk and Splunk Enterprise Security, 6 TB ingest rate/day.
• Onboarded data from over 20 sources, syslog and security applications, and completed full Splunk environment upgrades
• Created custom install scripts for Linux and Windows used to install Splunk on hundreds of client servers/machines
• Live demo to customer of how to correctly use the Splunk data model and map fields to CIM format
• Created 100+ correlation searches and alerts with the Splunk Security Essentials App
• Performed technical assessment of Splunk environment and found over 6000 errors in the environment
• Reviewed Splunk logical and physical architecture for compliance with best practices, license estimation and growth projections
• Installed/configured the NetApp application and technology add-on to assist with Columbus, OH police officer body camera data
• Configure SSL encryption on all Splunk servers across enterprise Splunk environment.
Clients served: U.S. Army | Lilly Pharmaceutical | Virginia National Guard | HQ DHS | Nutanix | City of Columbus Ohio
• Administered Splunk implementation work to migrate all financial asset and risk data into Splunk for the Zurich enterprise.
• Designed and developed enterprise dashboards from real-time vulnerability data using advanced searches and reports, data models,
macros, summary indexes, load jobs, user permissions, tokens and drilldowns.
• Translated CISO/CTO requirements into a powerful proof of concept (POC) solution, for replication of business intelligence, data
correlation, and automation into Splunk - enabling more informed c-suite decisions.
• Created custom configurations in Splunk to handle use case/content development from various data sources dashboard creation
efforts and developed a configuration migration plan to migrate asset and risk data from Data Mart into Splunk.
• Managed a large effort for using Splunk as an automation tool to replicate business logic previously completed by manual processes.
Page 2 of 2
• Launched a Splunk dashboard solution to automate 15 Key Performance Indicators (KPIs) and radically increased enterprise security
• Created 50+ advanced Splunk search queries to analyze and report client data findings, improving network cyber threat visibility.
• Integrated multiple data sources into a centralized Big Data Analytics Intelligence Platform for optimal visualizations - establishing
executive-level dashboards and reports to make risk-based decisions for remediation/mitigation of identified issues.
• Responsible for developing an approach to import, correlate, and normalize disparate data sets of structured and unstructured data
including: Plans of Actions and Milestones (POAMs), risk-based decisions (RBDs), network/operating system vulnerability scan
data, database vulnerability scan data and compliance scan data, in order to improve the overall cyber posture of the enterprise.
• Gathered, aggregated, correlated, analyzed, and visualized security data to highlight trends, issues with processes, prioritized
mitigations, and recommended remediation approaches to improve security posture of the organization.
• Developed visualizations depicting vulnerabilities and organizational trends in patch management to highlight gaps for improvement.
• Analyzed/planned quarterly cyber application release schedule for 12 applications to ensure seamless implementation for the client.
• Coordinated with team of 10+ developers and engineers to implement Identity and Access Management (IdAM) and Access-Based-
Access-Control (ABAC) security solutions for the entire Department of Defense (DoD).
• Established executive-level dashboards and reports to make risk-based decisions for remediation/mitigation of identified issues.
Clients served: Zurich/Famer’s Insurance | U.S. Internal Revenue Service (IRS) | Defense Manpower Data Center (DMDC)