Splunk ITSI Engineer - US Citizen/Secret Clearance (no C2C Candidates Please)

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Splunk ITSI Engineer, on-site in Miami, FL, with a contract length of unspecified duration. Pay rate is not mentioned. Requires US Citizenship, active Secret Security Clearance, 5+ years of Splunk experience, and strong ITSI knowledge.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
-
πŸ—“οΈ - Date discovered
September 23, 2025
πŸ•’ - Project duration
Unknown
-
🏝️ - Location type
On-site
-
πŸ“„ - Contract type
Corp-to-Corp (C2C)
-
πŸ”’ - Security clearance
Yes
-
πŸ“ - Location detailed
Miami-Fort Lauderdale Area
-
🧠 - Skills detailed
#ML (Machine Learning) #DevOps #Visualization #Splunk #Cloud #Computer Science #Security #Documentation #Monitoring #Anomaly Detection #Databases #Scala
Role description
Please note that all applicants must be US Citizens and no C2C candidates will be accepted. Summary: β€’ Tier One Technologies has an immediate need for a Splunk ITSI Engineer to design, deploy, and manage the Splunk IT Service Intelligence (ITSI) platform for our US Government client. β€’ This on-site contract-to-hire position will be located in Miami, FL. β€’ Must be a US Citizen and have active Secret Security Clearance. β€’ SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT. Responsibilities: β€’ Deploy and configure Splunk ITSI, including services, entities, KPIs, and glass tables. β€’ Create and manage IT service models that map infrastructure components to business services. β€’ Define and tune Key Performance Indicators (KPIs) to monitor system and service health. β€’ Build Glass Tables and dashboards to provide real-time visualizations for various teams in the organization. β€’ Implement episode review workflows to group related alerts and reduce noise. β€’ Develop and apply anomaly detection models and baseline thresholds for proactive alerting. β€’ Integrate ITSI with alerting and ITSM tools (e.g., ServiceNow) for automated incident response. β€’ Install and configure MLTK (Splunk Machine Learning toolkit). β€’ Build and train service adaptive thresholding. β€’ Collaborate with infrastructure, application, and other teams to onboard data sources and refine service visibility. β€’ Monitor and optimize the performance and scalability of the ITSI environment. β€’ Document architecture, KPIs, service definitions, and procedures. β€’ Install and configure content packs. Qualifications: Required: β€’ Must be a U.S. Citizen with an active Secret Security Clearance. β€’ Bachelor’s degree in Software Engineering, Computer Science, or a related discipline (preferred). β€’ 5+ years of Splunk Core and Splunk Administration experience, with a strong focus on ITSI and a deep understanding of service monitoring. β€’ Proven ability to build and manage services, KPIs, and Glass Tables within Splunk ITSI. β€’ Strong understanding of infrastructure and application monitoring, including logs and metrics. β€’ Experience working with enterprise IT environments (e.g., servers, databases, cloud platforms). β€’ Familiarity with ITIL concepts such as incident, problem, and change management. β€’ Excellent troubleshooting, documentation, and communication skills. Preferred: β€’ Splunk certifications (e.g., Splunk Core Certified Admin, Splunk ITSI Certified Admin). β€’ Experience with ServiceNow or other ITSM tools. β€’ Exposure to DevOps or SRE practices. β€’ Knowledge of machine learning-based anomaly detection and predictive analytics.