Splunk Engineer - USC or GC Only

⭐ - Featured Role | Apply direct with Data Freelance Hub
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
440
-
πŸ—“οΈ - Date discovered
September 9, 2025
πŸ•’ - Project duration
Unknown
-
🏝️ - Location type
Unknown
-
πŸ“„ - Contract type
Unknown
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Greater Chicago Area
-
🧠 - Skills detailed
#Scripting #Grafana #Python #Data Manipulation #Monitoring #Compliance #Visualization #Agile #Automation #Bash #Security #Cloud #Logging #Splunk #Observability #Prometheus #DevOps
Role description
Splunk Engineer - USC or GC only Location: Riverwoods, IL Available positions - 2 "What You'll Do" As a Splunk Developer, you will play a key role in designing, developing, and maintaining Splunk dashboards, alerts, and reports that provide actionable insights across our systems and applications. You’ll collaborate with cross-functional teams to ensure data is collected, parsed, and visualized effectively to support operational and security objectives. Key Responsibilities: β€’ Develop and maintain Splunk dashboards, queries, and alerts to monitor system performance, application health, and security events. β€’ Work with stakeholders to gather requirements and translate them into effective Splunk visualizations and reports. β€’ Optimize and troubleshoot existing Splunk configurations to improve performance and usability. β€’ Integrate data sources into Splunk using forwarders, APIs, and custom scripts. β€’ Support incident response and root cause analysis by providing relevant Splunk data and insights. β€’ Collaborate with DevOps, Security, and Infrastructure teams to ensure comprehensive logging and monitoring coverage. β€’ Stay current with Splunk best practices, new features, and industry trends to continuously improve our observability capabilities. "Preferred Qualifications" β€’ at least 3–5 years of hands-on experience with Splunk development, including dashboard creation, query optimization, and alerting. β€’ Strong proficiency in SPL (Search Processing Language) and familiarity with Splunk Enterprise Security or ITSI. β€’ Experience integrating data from various sources (e.g., syslog, APIs, cloud services) into Splunk. β€’ Knowledge of scripting languages such as Python, Bash, or PowerShell for data manipulation and automation. β€’ Familiarity with log management and observability tools beyond Splunk (e.g., ELK stack, Grafana, Prometheus). β€’ Understanding of security and compliance requirements in logging and monitoring. β€’ Ability to work independently and collaboratively in a fast-paced, agile environment. β€’ Strong analytical and problem-solving skills with attention to detail. β€’ Excellent communication skills to translate technical findings into business-relevant insights.