

Splunk Engineer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Engineer in Reston, VA, offering a 12-month contract at $45/hr W2 or $50/hr C2C. Key skills include Splunk administration, AWS integration, Python scripting, and enterprise security experience. On-site work is required.
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
400
-
ποΈ - Date discovered
September 3, 2025
π - Project duration
More than 6 months
-
ποΈ - Location type
On-site
-
π - Contract type
W2 Contractor
-
π - Security clearance
Unknown
-
π - Location detailed
Reston, VA
-
π§ - Skills detailed
#Data Enrichment #Indexing #Data Ingestion #Python #API (Application Programming Interface) #AWS (Amazon Web Services) #Security #Splunk #Scripting #Visualization #Cloud #"ETL (Extract #Transform #Load)" #S3 (Amazon Simple Storage Service)
Role description
Title: Splunk Engineer
Location: Reston, VA
Duration: 12 Months Contract
Interview: Phone & F2F Final
Rate: $45/hr W2 & $50/hr C2C all inc
Key Responsibilities:
β’ Experience: Proven experience as a Splunk Administrator and Developer. You should be comfortable with both the administrative and development aspects of the Splunk platform.
β’ Troubleshooting: Strong problem-solving skills with the ability to diagnose and resolve complex Splunk issues.
β’ Cloud: Solid understanding of AWS and experience integrating AWS services like CloudTrail, CloudWatch, and S3 with Splunk.
β’ Scripting: Proficiency in Python for automating Splunk tasks, data enrichment, and API integrations.
β’ Security: A deep understanding of enterprise security concepts and experience using Splunk for threat detection and incident response.
β’ Diagnose and resolve complex Splunk issues related to performance, search, and indexing.
β’ Monitor Splunk's health and proactively implement solutions to improve system reliability and uptime.
β’ Performance Tune the environment by optimizing search queries, improving indexing strategies, and enhancing data ingestion processes.
β’ Develop and implement custom Splunk dashboards and visualizations that translate complex data into clear, actionable insights for security and business stakeholders.
β’ Collaborate with teams to understand their requirements and build dashboards that address specific security and operational needs.
β’ Leverage Splunk Enterprise Security (ES) to build and maintain threat detection and incident response capabilities.
β’ Create and fine-tune correlation searches and risk-based alerts to identify and respond to security threats effectively Log Integration
β’ Onboard and integrate logs from a wide range of sources, including servers, cloud platforms (AWS), applications, and security tools.
β’ Normalize and parse raw data using props.conf and transforms.conf to ensure consistency and usability.
Title: Splunk Engineer
Location: Reston, VA
Duration: 12 Months Contract
Interview: Phone & F2F Final
Rate: $45/hr W2 & $50/hr C2C all inc
Key Responsibilities:
β’ Experience: Proven experience as a Splunk Administrator and Developer. You should be comfortable with both the administrative and development aspects of the Splunk platform.
β’ Troubleshooting: Strong problem-solving skills with the ability to diagnose and resolve complex Splunk issues.
β’ Cloud: Solid understanding of AWS and experience integrating AWS services like CloudTrail, CloudWatch, and S3 with Splunk.
β’ Scripting: Proficiency in Python for automating Splunk tasks, data enrichment, and API integrations.
β’ Security: A deep understanding of enterprise security concepts and experience using Splunk for threat detection and incident response.
β’ Diagnose and resolve complex Splunk issues related to performance, search, and indexing.
β’ Monitor Splunk's health and proactively implement solutions to improve system reliability and uptime.
β’ Performance Tune the environment by optimizing search queries, improving indexing strategies, and enhancing data ingestion processes.
β’ Develop and implement custom Splunk dashboards and visualizations that translate complex data into clear, actionable insights for security and business stakeholders.
β’ Collaborate with teams to understand their requirements and build dashboards that address specific security and operational needs.
β’ Leverage Splunk Enterprise Security (ES) to build and maintain threat detection and incident response capabilities.
β’ Create and fine-tune correlation searches and risk-based alerts to identify and respond to security threats effectively Log Integration
β’ Onboard and integrate logs from a wide range of sources, including servers, cloud platforms (AWS), applications, and security tools.
β’ Normalize and parse raw data using props.conf and transforms.conf to ensure consistency and usability.