Splunk Engineer

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk Engineer in Reston, VA, offering a 12-month contract at $45/hr W2 or $50/hr C2C. Key skills include Splunk administration, AWS integration, Python scripting, and enterprise security experience. On-site work is required.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
400
-
πŸ—“οΈ - Date discovered
September 3, 2025
πŸ•’ - Project duration
More than 6 months
-
🏝️ - Location type
On-site
-
πŸ“„ - Contract type
W2 Contractor
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Reston, VA
-
🧠 - Skills detailed
#Data Enrichment #Indexing #Data Ingestion #Python #API (Application Programming Interface) #AWS (Amazon Web Services) #Security #Splunk #Scripting #Visualization #Cloud #"ETL (Extract #Transform #Load)" #S3 (Amazon Simple Storage Service)
Role description
Title: Splunk Engineer Location: Reston, VA Duration: 12 Months Contract Interview: Phone & F2F Final Rate: $45/hr W2 & $50/hr C2C all inc Key Responsibilities: β€’ Experience: Proven experience as a Splunk Administrator and Developer. You should be comfortable with both the administrative and development aspects of the Splunk platform. β€’ Troubleshooting: Strong problem-solving skills with the ability to diagnose and resolve complex Splunk issues. β€’ Cloud: Solid understanding of AWS and experience integrating AWS services like CloudTrail, CloudWatch, and S3 with Splunk. β€’ Scripting: Proficiency in Python for automating Splunk tasks, data enrichment, and API integrations. β€’ Security: A deep understanding of enterprise security concepts and experience using Splunk for threat detection and incident response. β€’ Diagnose and resolve complex Splunk issues related to performance, search, and indexing. β€’ Monitor Splunk's health and proactively implement solutions to improve system reliability and uptime. β€’ Performance Tune the environment by optimizing search queries, improving indexing strategies, and enhancing data ingestion processes. β€’ Develop and implement custom Splunk dashboards and visualizations that translate complex data into clear, actionable insights for security and business stakeholders. β€’ Collaborate with teams to understand their requirements and build dashboards that address specific security and operational needs. β€’ Leverage Splunk Enterprise Security (ES) to build and maintain threat detection and incident response capabilities. β€’ Create and fine-tune correlation searches and risk-based alerts to identify and respond to security threats effectively Log Integration β€’ Onboard and integrate logs from a wide range of sources, including servers, cloud platforms (AWS), applications, and security tools. β€’ Normalize and parse raw data using props.conf and transforms.conf to ensure consistency and usability.