

Splunk Engineer - USC or GC Only
β - Featured Role | Apply direct with Data Freelance Hub
π - Country
United States
π± - Currency
$ USD
-
π° - Day rate
440
-
ποΈ - Date discovered
September 9, 2025
π - Project duration
Unknown
-
ποΈ - Location type
Unknown
-
π - Contract type
Unknown
-
π - Security clearance
Unknown
-
π - Location detailed
Greater Chicago Area
-
π§ - Skills detailed
#Scripting #Grafana #Python #Data Manipulation #Monitoring #Compliance #Visualization #Agile #Automation #Bash #Security #Cloud #Logging #Splunk #Observability #Prometheus #DevOps
Role description
Splunk Engineer - USC or GC only
Location: Riverwoods, IL
Available positions - 2
"What You'll Do"
As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. Youβll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives.
Key Responsibilities:
β’ Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events.
β’ Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports.
β’ Optimize and troubleshoot existing Splunk configurations to improve performance and usability.
β’ Integrate data sources into Splunk using forwarders, APIs, and custom scripts.
β’ Support incident response and root cause analysis by providing relevant Splunk data and insights.
β’ Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage.
β’ Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities.
"Preferred Qualifications"
β’ at least 3β5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
β’ Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
β’ Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
β’ Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
β’ Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
β’ Understanding of security and compliance requirements in logging and monitoring.
β’ Ability to work independently and collaboratively in a fast-paced, agile environment.
β’ Strong analytical and problem-solving skills with attention to detail.
β’ Excellent communication skills to translate technical findings into business-relevant insights.
Splunk Engineer - USC or GC only
Location: Riverwoods, IL
Available positions - 2
"What You'll Do"
As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. Youβll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives.
Key Responsibilities:
β’ Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events.
β’ Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports.
β’ Optimize and troubleshoot existing Splunk configurations to improve performance and usability.
β’ Integrate data sources into Splunk using forwarders, APIs, and custom scripts.
β’ Support incident response and root cause analysis by providing relevant Splunk data and insights.
β’ Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage.
β’ Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities.
"Preferred Qualifications"
β’ at least 3β5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting.
β’ Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI.
β’ Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk.
β’ Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation.
β’ Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus).
β’ Understanding of security and compliance requirements in logging and monitoring.
β’ Ability to work independently and collaboratively in a fast-paced, agile environment.
β’ Strong analytical and problem-solving skills with attention to detail.
β’ Excellent communication skills to translate technical findings into business-relevant insights.