CBTS

Sr Splunk Engineer(no Third Party, Only W2)

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Sr Splunk Engineer, offering a W2 contract for 6 months at a competitive pay rate. Requires 5+ years of Splunk administration, active Splunk certifications, cloud deployment experience, and strong SPL proficiency.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
Unknown
-
🗓️ - Date
April 3, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Unknown
-
📄 - Contract
W2 Contractor
-
🔒 - Security
Unknown
-
📍 - Location detailed
Irving, TX
-
🧠 - Skills detailed
#Macros #Scripting #Monitoring #Automation #GCP (Google Cloud Platform) #Compliance #Azure #Ansible #Deployment #PCI (Payment Card Industry) #Python #AWS (Amazon Web Services) #Security #Infrastructure as Code (IaC) #Splunk #Cloud #Terraform #Bash
Role description
Job Description: Required 5+ years of hands-on experience with Splunk platform administration, with significant depth in Splunk Enterprise Security. Active Splunk certifications required: Splunk Enterprise Certified Admin and/or Splunk ES Certified Admin. Proven experience managing Splunk deployments in cloud environments (AWS, Azure, or Google Cloud Platform). Deep understanding of security monitoring, log management, SIEM operations, and event correlation at enterprise scale. Working knowledge of PCI DSS, SOX, and NIST CSF compliance frameworks and how they translate into SIEM use cases and reporting requirements. Strong SPL (Search Processing Language) proficiency, including complex statistical commands, lookups, macros, and data models. Experience with Splunk infrastructure components: indexers, search heads, heavy/universal forwarders, deployment servers, and cluster management. Excellent communication skills with the ability to translate complex technical concepts for non-technical stakeholders. Preferred Experience in large-scale retail or similarly complex, high-transaction-volume environments. Familiarity with Splunk SOAR (formerly Phantom) and security automation/orchestration workflows. Background in detection engineering, threat hunting, or SOC operations. Additional certifications such as CISSP, GIAC (GCIA, GCIH), or cloud security credentials (AWS Security Specialty, AZ-500). Experience with Infrastructure as Code (Terraform, Ansible) for Splunk deployment management. Scripting proficiency in Python, Bash, or PowerShell for automation and custom integrations.