

Net2Source Inc.
Splunk Engineer
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Engineer in Chicago, IL, with a contract length of "unknown" and a pay rate of "unknown." Requires 3-5 years of Splunk development experience, proficiency in SPL, and knowledge of scripting languages.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
Unknown
-
🗓️ - Date
November 27, 2025
🕒 - Duration
Unknown
-
🏝️ - Location
On-site
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
Chicago, IL
-
🧠 - Skills detailed
#DevOps #Cloud #Splunk #Python #Data Manipulation #Logging #Observability #Automation #Scripting #Monitoring #Visualization #Compliance #Grafana #Prometheus #Agile #Security #Bash
Role description
Title- Splunk Engineer
Location- Chicago, IL
Must Have Skills:
• at least 3–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
• Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
• Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
• Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
• Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
• Understanding of security and compliance requirements in logging and monitoring.
• Ability to work independently and collaboratively in a fast-paced, agile environment.
• Strong analytical and problem-solving skills with attention to detail.
• Excellent communication skills to translate technical findings into business-relevant insights."
What You'll Do -
As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. You’ll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives.
Key Responsibilities:
• Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events.
• Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports.
• Optimize and troubleshoot existing Splunk configurations to improve performance and usability.
• Integrate data sources into Splunk using forwarders, APIs, and custom scripts.
• Support incident response and root cause analysis by providing relevant Splunk data and insights.
• Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage.
• Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities.
Preferred Qualifications -
• at least 4–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
• Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
• Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
• Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
• Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
• Understanding of security and compliance requirements in logging and monitoring.
• Ability to work independently and collaboratively in a fast-paced, agile environment.
• Strong analytical and problem-solving skills with attention to detail.
• Excellent communication skills to translate technical findings into business-relevant insights.
Title- Splunk Engineer
Location- Chicago, IL
Must Have Skills:
• at least 3–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
• Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
• Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
• Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
• Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
• Understanding of security and compliance requirements in logging and monitoring.
• Ability to work independently and collaboratively in a fast-paced, agile environment.
• Strong analytical and problem-solving skills with attention to detail.
• Excellent communication skills to translate technical findings into business-relevant insights."
What You'll Do -
As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. You’ll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives.
Key Responsibilities:
• Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events.
• Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports.
• Optimize and troubleshoot existing Splunk configurations to improve performance and usability.
• Integrate data sources into Splunk using forwarders, APIs, and custom scripts.
• Support incident response and root cause analysis by providing relevant Splunk data and insights.
• Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage.
• Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities.
Preferred Qualifications -
• at least 4–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
• Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
• Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
• Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
• Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
• Understanding of security and compliance requirements in logging and monitoring.
• Ability to work independently and collaboratively in a fast-paced, agile environment.
• Strong analytical and problem-solving skills with attention to detail.
• Excellent communication skills to translate technical findings into business-relevant insights.






