

CBTS
Sr Splunk Engineer(no Third Party, Only W2)
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Sr Splunk Engineer, offering a W2 contract for 6 months at a competitive pay rate. Requires 5+ years of Splunk administration, active Splunk certifications, cloud deployment experience, and strong SPL proficiency.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
Unknown
-
🗓️ - Date
April 3, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Unknown
-
📄 - Contract
W2 Contractor
-
🔒 - Security
Unknown
-
📍 - Location detailed
Irving, TX
-
🧠 - Skills detailed
#Macros #Scripting #Monitoring #Automation #GCP (Google Cloud Platform) #Compliance #Azure #Ansible #Deployment #PCI (Payment Card Industry) #Python #AWS (Amazon Web Services) #Security #Infrastructure as Code (IaC) #Splunk #Cloud #Terraform #Bash
Role description
Job Description:
Required
5+ years of hands-on experience with Splunk platform administration, with significant
depth in Splunk Enterprise Security.
Active Splunk certifications required: Splunk Enterprise Certified Admin and/or Splunk
ES Certified Admin.
Proven experience managing Splunk deployments in cloud environments (AWS, Azure,
or Google Cloud Platform).
Deep understanding of security monitoring, log management, SIEM operations, and
event correlation at enterprise scale.
Working knowledge of PCI DSS, SOX, and NIST CSF compliance frameworks and how
they translate into SIEM use cases and reporting requirements.
Strong SPL (Search Processing Language) proficiency, including complex statistical
commands, lookups, macros, and data models.
Experience with Splunk infrastructure components: indexers, search heads,
heavy/universal forwarders, deployment servers, and cluster management.
Excellent communication skills with the ability to translate complex technical concepts for
non-technical stakeholders.
Preferred
Experience in large-scale retail or similarly complex, high-transaction-volume
environments.
Familiarity with Splunk SOAR (formerly Phantom) and security automation/orchestration
workflows.
Background in detection engineering, threat hunting, or SOC operations.
Additional certifications such as CISSP, GIAC (GCIA, GCIH), or cloud security
credentials (AWS Security Specialty, AZ-500).
Experience with Infrastructure as Code (Terraform, Ansible) for Splunk deployment
management.
Scripting proficiency in Python, Bash, or PowerShell for automation and custom
integrations.
Job Description:
Required
5+ years of hands-on experience with Splunk platform administration, with significant
depth in Splunk Enterprise Security.
Active Splunk certifications required: Splunk Enterprise Certified Admin and/or Splunk
ES Certified Admin.
Proven experience managing Splunk deployments in cloud environments (AWS, Azure,
or Google Cloud Platform).
Deep understanding of security monitoring, log management, SIEM operations, and
event correlation at enterprise scale.
Working knowledge of PCI DSS, SOX, and NIST CSF compliance frameworks and how
they translate into SIEM use cases and reporting requirements.
Strong SPL (Search Processing Language) proficiency, including complex statistical
commands, lookups, macros, and data models.
Experience with Splunk infrastructure components: indexers, search heads,
heavy/universal forwarders, deployment servers, and cluster management.
Excellent communication skills with the ability to translate complex technical concepts for
non-technical stakeholders.
Preferred
Experience in large-scale retail or similarly complex, high-transaction-volume
environments.
Familiarity with Splunk SOAR (formerly Phantom) and security automation/orchestration
workflows.
Background in detection engineering, threat hunting, or SOC operations.
Additional certifications such as CISSP, GIAC (GCIA, GCIH), or cloud security
credentials (AWS Security Specialty, AZ-500).
Experience with Infrastructure as Code (Terraform, Ansible) for Splunk deployment
management.
Scripting proficiency in Python, Bash, or PowerShell for automation and custom
integrations.






