Splunk Administrator

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Administrator with 3+ years of hands-on experience, offering a contract for $65-$70 per hour. Located in Washington, DC, it requires strong Linux skills, familiarity with security technologies, and a bachelor's degree or equivalent experience.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
560
-
πŸ—“οΈ - Date discovered
September 28, 2025
πŸ•’ - Project duration
Unknown
-
🏝️ - Location type
Hybrid
-
πŸ“„ - Contract type
Unknown
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Washington, DC 20024
-
🧠 - Skills detailed
#"ETL (Extract #Transform #Load)" #Computer Science #Normalization #Vulnerability Management #Azure #Firewalls #Regular Expressions #Security #Linux #Splunk #Documentation #Consulting #Macros #Data Quality #Unix #Data Modeling #Cybersecurity #Compliance
Role description
Description Ascension Consulting is seeking a Splunk Administrator to support enterprise cybersecurity operations. This role is responsible for administering, maintaining, and optimizing Splunk platforms within a mission-critical federal environment. The administrator will ensure reliable log ingestion, efficient search and reporting, and seamless support to analysts and engineers who rely on Splunk for threat detection, forensics, and compliance reporting. This is an excellent opportunity for an IT professional with hands-on Splunk administration experience who thrives in federal environments and is eager to advance operational security capabilities. Responsibilities: Administer and maintain Splunk Enterprise and Splunk ES, ensuring availability, performance, and stability Manage log ingestion pipelines, including syslog servers, Windows Event Collectors, and application connectors Onboard and normalize new data sources, validate data quality, and ensure mapping to the Common Information Model (CIM) Create, maintain, and optimize Splunk knowledge objects (field extractions, lookups, macros, event types, tags, etc.) Develop and tune dashboards, reports, and alerts to support incident response operations and compliance requirements Monitor Splunk license consumption and system capacity; make recommendations for scaling and optimization Troubleshoot Splunk forwarders, search head, and indexer issues to maintain operational continuity Implement KV stores, lookups, and data model acceleration to improve search and reporting performance Support security use case development in Splunk ES for security incident response analysts Assist end users with queries, dashboards, and reporting needs, providing mentorship in SPL and best practices Maintain documentation, including SOPs, technical designs, and architecture references Monitor Splunk infrastructure health and contribute to proactive capacity planning Participate in team meetings, planning sessions, and technical reviews Qualifications Requirements: Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, Engineering, or related technical discipline; OR 7+ years of equivalent IT experience 3+ years of hands-on Splunk administration experience in enterprise environments Current or recent Splunk Certified Administrator certification preferred Strong Linux command line experience; familiarity with Windows and Unix system administration Demonstrated experience with Splunk ES, CIM, and advanced search/reporting commands Knowledge of log ingestion methods, normalization, and baselining techniques Experience with regular expressions (regex) for field extractions and data parsing Familiarity with security technologies such as endpoint protection, IDS/IPS, firewalls, and vulnerability management Strong troubleshooting skills across distributed IT infrastructures Excellent written and verbal communication skills, with the ability to document technical processes and collaborate across teams Preferred Qualifications: Experience in a Security Operations Center (SOC) environment Experience with data modeling, use case development, and alert tuning Familiarity with NIST and federal cybersecurity frameworks (e.g., FISMA, OMB, FedRAMP) Security certifications such as Security+, CISSP, or GSEC Experience with other SIEM tools (e.g., ELK, Azure Sentinel) Clearance Requirement: Must be eligible to obtain a U.S. Public Trust Clearance β€’ β€’ This hybrid role requires a minimum of three on-site days per week in Washington, DC β€’ β€’ Job Type: Contract Pay: $65.00 - $70.00 per hour Application Question(s): Do you have Splunk Enterprise Certified Architect certification? Are you based in the DC/MD/VA region? What is your visa status or are you a US citizen How many years of hands-on Splunk administration experience do you have? Work Location: Hybrid remote in Washington, DC 20024