Net2Source Inc.

Splunk Engineer

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Engineer in Chicago, IL, with a contract length of "unknown" and a pay rate of "unknown." Requires 3-5 years of Splunk development experience, proficiency in SPL, and knowledge of scripting languages.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
Unknown
-
🗓️ - Date
November 27, 2025
🕒 - Duration
Unknown
-
🏝️ - Location
On-site
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
Chicago, IL
-
🧠 - Skills detailed
#DevOps #Cloud #Splunk #Python #Data Manipulation #Logging #Observability #Automation #Scripting #Monitoring #Visualization #Compliance #Grafana #Prometheus #Agile #Security #Bash
Role description
Title- Splunk Engineer Location- Chicago, IL Must Have Skills: • at least 3–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting. • Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI. • Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk. • Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation. • Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus). • Understanding of security and compliance requirements in logging and monitoring. • Ability to work independently and collaboratively in a fast-paced, agile environment. • Strong analytical and problem-solving skills with attention to detail. • Excellent communication skills to translate technical findings into business-relevant insights." What You'll Do - As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. You’ll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives. Key Responsibilities: • Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events. • Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports. • Optimize and troubleshoot existing Splunk configurations to improve performance and usability. • Integrate data sources into Splunk using forwarders, APIs, and custom scripts. • Support incident response and root cause analysis by providing relevant Splunk data and insights. • Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage. • Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities. Preferred Qualifications - • at least 4–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting. • Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI. • Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk. • Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation. • Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus). • Understanding of security and compliance requirements in logging and monitoring. • Ability to work independently and collaboratively in a fast-paced, agile environment. • Strong analytical and problem-solving skills with attention to detail. • Excellent communication skills to translate technical findings into business-relevant insights.