
Suljettu
Julkaistu
Maksettu toimituksen yhteydessä
I’m building out a small SOC stack and need an expert to wire Wazuh and Splunk together so I get clean, searchable logs from my firewalls. The core goal is streamlined log management—no SIEM correlation rules, threat-hunting work, or incident-response playbooks at this stage—just reliable collection, parsing, and visualization. Here’s what I need done: • Deploy or fine-tune Wazuh agents/managers to ingest all firewall events (the devices are already exporting Syslog today). • Configure Splunk inputs, indexes, and props/transforms so the data is correctly tagged, timestamped, and CIM-compliant. • Build a starter dashboard and a couple of saved searches that prove the data is landing and searchable. • Hand over concise documentation: major config snippets, any custom field extractions, and step-by-step instructions so I can replicate the setup in staging. Success to me is simple: I can reboot a firewall, see the logs pour into Wazuh, watch them appear in real time inside Splunk, and run a search that returns the event within seconds. If you’ve connected Wazuh feeds to Splunk before, this should be a quick engagement—let’s get it done.
Projektin tunnus (ID): 40196282
11 ehdotukset
Etäprojekti
Aktiivinen 12 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
11 freelancerit tarjoavat keskimäärin ₹23 227 INR tätä projektia

Hi there, I understand your need for a streamlined, reliable connection between Wazuh and Splunk to manage firewall logs with real-time visibility. With my extensive experience in Linux server management, network security, and data visualization, I will ensure your SOC stack is efficient and precise. - Deploy and fine-tune Wazuh agents/managers for accurate firewall event collection - Configure Splunk inputs, indexes, and CIM-compliant props/transforms for clean, searchable logs - Build a starter dashboard plus saved searches to validate log ingestion and searchability - Provide clear documentation with config snippets and replication steps for your staging environment **Skills:** ✅ Wazuh agent deployment and tuning ✅ Splunk inputs and CIM compliance ✅ Linux server and network administration ✅ Firewall Syslog ingestion and parsing ✅ Documentation and dashboard creation **Certificates:** ✅ Microsoft® Certified: MCSA | MCSE | MCT ✅ cPanel® & WHM Certified CWSA-2 I’m ready to start immediately and deliver a seamless setup within 5 days. Which firewall models are you using, and do you have existing Wazuh agents deployed that we should fine-tune? Best regards,
₹15 000 INR 5 päivässä
6,8
6,8

Hi, I can wire Wazuh → Splunk cleanly so your firewall syslogs are reliably ingested, parsed, and searchable—without overengineering this into a full SOC workflow. I’ll: - Configure Wazuh manager/agents to ingest all firewall Syslog events - Set up Splunk inputs, indexes, and props/transforms for clean timestamps, tagging, and CIM-aligned fields - Create a small validation dashboard plus a couple of saved searches to prove real-time ingestion - Hand over concise docs with config snippets and repeatable steps The end state you described—reboot a firewall, see logs in Wazuh, search them in Splunk within seconds—is exactly how I validate setups. I’ve connected Wazuh feeds to Splunk before and can get this done quickly. Best,
₹25 000 INR 7 päivässä
1,5
1,5

Speaking from a background rooted in exemplary cloud computing and Linux proficiency, my team and I are uniquely positioned to masterfully configure your Wazuh-Splunk stack. We understand the primary goal of this engagement is not only reliable collection, parsing, and visualization but also the creation of concise documentation for future reference. Our frontend experts' knowledge in Firbase adds immense value in automating repetitive backend tasks and enabling seamless communication between frontend and backend aspects of your project. Lastly, epitomizing our full-stack harmony is our commitment to 'hand-over' knowledge throughout projects. We prioritize empowering our partners with comprehensive step-by-step instructions and major config snippets that guarantee effortless replication of setups in different environments. With us on your team you will not only meet but exceed each criterion in your task-list – from seeing logs pour into Wazuh upon firewall rebooting in real-time within Splunk – leaving you on a path of exceptional efficiency with a clear roadmap for future stages towards SIEM correlation rules, threat-hunting work, or incident-response playbooks.
₹25 000 INR 7 päivässä
1,0
1,0

Hello there, I reviewed your project Wazuh & Splunk Log Management and understood the requirements at a high level. I focus on delivering clear, stable, and maintainable solutions aligned with the actual scope, I can work with Linux, Cloud Computing, Cisco and follow a clean development process with proper structure and error handling. If this aligns with what you’re looking for, please come to chat to discuss further. Best regards
₹12 500 INR 7 päivässä
0,0
0,0

I’ve already worked on setting up Wazuh → Splunk pipelines where the goal was simple and reliable log flow, not SIEM rules or threat hunting. Since your firewalls are already sending Syslog, I’d just focus on making sure Wazuh is ingesting and parsing everything cleanly, then wiring that into Splunk with proper inputs, sourcetypes, timestamps, and CIM-aligned fields. I’ll also put together a basic dashboard and a couple of saved searches so you can clearly see logs landing in real time and quickly validate things like a firewall reboot or traffic spike. I’ll document the key configs and steps so you can easily repeat the setup in staging later.
₹12 500 INR 3 päivässä
0,0
0,0

I have prior experience onboarding data to Splunk. Given that your firewalls are already forwarding Syslog, my approach would be to ensure Wazuh is accurately receiving and parsing the logs, followed by a clean integration into Splunk with correctly configured inputs, sourcetypes, timestamps, and CIM-aligned field mappings. In addition, I will design a basic dashboard and create a few saved searches to enable real-time visibility of incoming logs and facilitate quick validation of events such as firewall reboots or traffic spikes. All key configurations and steps will be thoroughly documented to allow seamless replication of the setup in a staging environment when required.
₹28 000 INR 5 päivässä
0,0
0,0

I’m a Senior DevSecOps / SOC Engineer with 8+ years of hands-on SIEM experience, including Wazuh and Splunk integrations for firewall and infrastructure logs. I can set this up end to end with a clean, reliable flow: Tune Wazuh manager/agents to ingest and normalize all firewall Syslog events Configure Splunk inputs, indexes, and props/transforms so logs are correctly parsed, timestamped, and CIM-compliant Validate real-time ingestion from firewall → Wazuh → Splunk Build a starter dashboard and a few saved searches to prove visibility and searchability Deliverables: Working Wazuh → Splunk log pipeline Verified real-time log flow after firewall restart Basic dashboard + saved searches Concise handover documentation (configs, field extractions, replication steps) No correlation rules, no threat hunting—just clean ingestion, parsing, and visibility. If you already have Syslog flowing, this will be a quick, focused engagement, and I can start immediately.
₹25 000 INR 7 päivässä
0,0
0,0

Hi, I can help you wire Wazuh and Splunk together to achieve reliable, real-time log ingestion and searchability from your firewalls. I’ll focus specifically on clean collection, correct parsing, and visualization — without overcomplicating the setup with SIEM correlation or playbooks. My approach is to ensure syslog events flow consistently into Wazuh, are forwarded and indexed properly in Splunk (inputs, indexes, props/transforms), and appear correctly timestamped and searchable within seconds. I’ll also build a starter dashboard with a few saved searches to validate the pipeline end-to-end, and provide concise documentation with key config snippets and step-by-step instructions so you can replicate the setup in staging. I’m comfortable working on Linux environments and can start right away. Best regards, Eduard
₹18 000 INR 5 päivässä
0,0
0,0

Im already doing wazuh + virus total and everything wazuh + splunk on ubuntu servers so I think it's made for me. Price is negotiable.
₹34 500 INR 7 päivässä
0,0
0,0

Hello, I can help you wire Wazuh and Splunk together so firewall logs are collected, parsed, and searchable end-to-end. I’ll configure Wazuh to ingest all firewall Syslog events and ensure clean forwarding into Splunk. On the Splunk side, I’ll set up inputs, indexes, and props/transforms so logs are correctly timestamped, tagged, and searchable, with consistent field extractions aligned to CIM where applicable. To confirm everything is working, I’ll build a simple dashboard and a few saved searches that show logs arriving in near real time. You’ll be able to reboot a firewall, see logs hit Wazuh, watch them appear in Splunk, and retrieve the event within seconds. I’ll also provide concise documentation with key config snippets and step-by-step instructions so you can easily replicate the setup in staging. This engagement is focused purely on log collection, parsing, and visualization — no SIEM correlation or IR workflows. Ready to start immediately. Best regards, Hemani Reddy
₹35 000 INR 10 päivässä
0,0
0,0

Bhanang, India
Liittynyt toukok. 17, 2021
₹750-1250 INR/ tunnissa
₹12500-37500 INR
$15-25 USD/ tunnissa
$30-250 USD
$250-750 USD
$150-250 USD
$250-750 USD
£250-750 GBP
₹750-1250 INR/ tunnissa
$750-1500 USD
₹1500-12500 INR
$10-30 USD
$250-750 USD
$30-250 USD
$30-250 CAD
$10-60 USD
£20-250 GBP
$10-50 AUD/ tunnissa
$250-750 CAD
₹600-1500 INR
$1500-3000 USD