

Splunk Engineer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Engineer in Melbourne, FL, on a contract basis with a pay rate of "unknown". Requires 5+ years of Splunk Core and ITSI experience, strong AWS knowledge, and proficiency in Linux/Unix. Splunk Admin Certification is a plus.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
-
ποΈ - Date discovered
September 12, 2025
π - Project duration
Unknown
-
ποΈ - Location type
On-site
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Melbourne, FL
-
π§ - Skills detailed
#Macros #REST API #Unix #"ETL (Extract #Transform #Load)" #Scripting #Visualization #DevOps #Hadoop #AWS EC2 (Amazon Elastic Compute Cloud) #Logging #Monitoring #Automation #JavaScript #Python #REST (Representational State Transfer) #Scala #Security #Deployment #AWS (Amazon Web Services) #Databases #SaaS (Software as a Service) #Cloud #Splunk #Clustering #Data Ingestion #Indexing #EC2 #Linux #Documentation #API (Application Programming Interface)
Role description
Job Title: Splunk - L3 Engineer
Location: Melbourne, FL
Job Type: Contract
Job Summary:
We are seeking an experienced and highly skilled Splunk L3 Engineer to join our infrastructure and monitoring team. The ideal candidate will have deep technical expertise in designing, implementing, and supporting Splunk solutions in both On-Premises and SaaS environments, especially in large-scale enterprise or service provider networks. The role demands hands-on experience across the full Splunk ecosystem (Core & ITSI), including clustering, onboarding, heavy forwarders, data parsing/indexing, and integration with cloud and third-party systems.
Key Responsibilities:
β’ Design, implement, configure, and support Splunk deployments (Search Heads, Indexers, Forwarders, Clustered Environments) in On-Prem and SaaS models.
β’ Maintain and enhance multi-site clustered environments with high availability and scalability.
β’ Lead log onboarding activities using diverse data ingestion methods: Monitoring, DB Connect, HEC, Syslog, and REST API.
β’ Develop efficient and reusable SPL queries, Dashboards, Reports, Macros, and other knowledge objects.
β’ Design and implement custom Heavy Forwarders for specific log ingestion and transformation requirements.
β’ Implement data ingestion and parsing best practices:
β’ Inputs (inputs.conf)
β’ Parsing (props.conf, transforms.conf)
β’ Indexing (indexes.conf)
β’ Create data summaries via Summary Indexing, Report Acceleration, and Data Model Acceleration.
β’ Ensure Splunk environment is compliant with standard operating procedures and security policies.
β’ Integrate AWS log sources (e.g., CloudWatch, EC2, CloudTrail, Kinesis) into Splunk.
β’ Collaborate with internal teams to drive automation and visibility improvements.
β’ Support and optimize Splunk ITSI implementation, ensuring service reliability and monitoring efficiency.
β’ Act as a subject matter expert and provide L3-level support for Splunk-related incidents and requests.
Required Skills & Qualifications:
β’ 5+ years of hands-on experience with Splunk Core and ITSI in complex environments.
β’ Proven expertise in log ingestion, correlation, and visualization.
β’ Strong knowledge of Linux/Unix systems and tools such as rsyslog, syslog-ng, net-snmp.
β’ Experience working with cloud platforms, especially AWS (EC2, CloudWatch, Kinesis, etc.).
β’ Strong scripting knowledge in Python, JavaScript, or other relevant languages for integrations.
β’ Proficient understanding of logging protocols like Syslog and SNMP.
β’ Excellent problem-solving skills and attention to detail.
β’ Strong documentation, communication, and stakeholder engagement skills.
Nice to Have:
β’ Splunk Admin Certification (or equivalent advanced training).
β’ Experience with databases and server-side scripting.
β’ Exposure to Hadoop, MapReduce, or other data analytics platforms.
β’ Background in DevOps, Software Engineering, or Infrastructure Automation.
β’ Experience building and maintaining enterprise dashboards and alerts for operations teams.
Job Title: Splunk - L3 Engineer
Location: Melbourne, FL
Job Type: Contract
Job Summary:
We are seeking an experienced and highly skilled Splunk L3 Engineer to join our infrastructure and monitoring team. The ideal candidate will have deep technical expertise in designing, implementing, and supporting Splunk solutions in both On-Premises and SaaS environments, especially in large-scale enterprise or service provider networks. The role demands hands-on experience across the full Splunk ecosystem (Core & ITSI), including clustering, onboarding, heavy forwarders, data parsing/indexing, and integration with cloud and third-party systems.
Key Responsibilities:
β’ Design, implement, configure, and support Splunk deployments (Search Heads, Indexers, Forwarders, Clustered Environments) in On-Prem and SaaS models.
β’ Maintain and enhance multi-site clustered environments with high availability and scalability.
β’ Lead log onboarding activities using diverse data ingestion methods: Monitoring, DB Connect, HEC, Syslog, and REST API.
β’ Develop efficient and reusable SPL queries, Dashboards, Reports, Macros, and other knowledge objects.
β’ Design and implement custom Heavy Forwarders for specific log ingestion and transformation requirements.
β’ Implement data ingestion and parsing best practices:
β’ Inputs (inputs.conf)
β’ Parsing (props.conf, transforms.conf)
β’ Indexing (indexes.conf)
β’ Create data summaries via Summary Indexing, Report Acceleration, and Data Model Acceleration.
β’ Ensure Splunk environment is compliant with standard operating procedures and security policies.
β’ Integrate AWS log sources (e.g., CloudWatch, EC2, CloudTrail, Kinesis) into Splunk.
β’ Collaborate with internal teams to drive automation and visibility improvements.
β’ Support and optimize Splunk ITSI implementation, ensuring service reliability and monitoring efficiency.
β’ Act as a subject matter expert and provide L3-level support for Splunk-related incidents and requests.
Required Skills & Qualifications:
β’ 5+ years of hands-on experience with Splunk Core and ITSI in complex environments.
β’ Proven expertise in log ingestion, correlation, and visualization.
β’ Strong knowledge of Linux/Unix systems and tools such as rsyslog, syslog-ng, net-snmp.
β’ Experience working with cloud platforms, especially AWS (EC2, CloudWatch, Kinesis, etc.).
β’ Strong scripting knowledge in Python, JavaScript, or other relevant languages for integrations.
β’ Proficient understanding of logging protocols like Syslog and SNMP.
β’ Excellent problem-solving skills and attention to detail.
β’ Strong documentation, communication, and stakeholder engagement skills.
Nice to Have:
β’ Splunk Admin Certification (or equivalent advanced training).
β’ Experience with databases and server-side scripting.
β’ Exposure to Hadoop, MapReduce, or other data analytics platforms.
β’ Background in DevOps, Software Engineering, or Infrastructure Automation.
β’ Experience building and maintaining enterprise dashboards and alerts for operations teams.