Jobs at CruiTek

View all jobs

Splunk Engineer

Albany, NY · Information Technology

Splunk Engineer 

Duration: 1-year contract with possible extension
Location: Hybrid in Albany, NY (Onsite every other week for 3 days preferred) or Remote (EST hours required)
Rate: Competitive market rate

No Corp-to-Corp or 1099. No 3rd parties.

Qualifications:
•    Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience)
•    Proven experience as a Splunk Engineer with a focus on Splunk SaaS
•    Strong knowledge of Splunk architecture, components, and deployment methodologies
•    Experience with Splunk Enterprise Security (ES) and IT Service Intelligence (ITSI) is a plus
•    Proficiency in creating and managing Splunk dashboards, reports, and alerts
•    Familiarity with scripting languages (e.g., Python, Bash) and automation tools
•    Excellent problem-solving skills and the ability to troubleshoot complex technical issues
•    Strong communication and interpersonal skills, with the ability to work effectively in a team environment
•    Splunk certifications (e.g., Splunk Certified Admin, Splunk Certified Architect) are preferred.
•    Strong understanding of Splunk search language (SPL) and data manipulation techniques
•    Experience with data collection methods and data ingestion pipelines
•    Proficiency in creating visualizations and dashboards within Splunk
•    Knowledge of IT operations, system logs, and network protocols
•    Ability to troubleshoot issues related to data processing and analysis within Splunk
•    Familiarity with cloud computing concepts and potential experience with AWS (preferred) or other cloud platforms
•    Adherence to Splunk Best Practices

Responsibilities:
•    Setting up data sources to collect logs, events, and metrics from various systems (EC2, applications, network devices) into the Splunk cloud
•    Defining data collection strategies, including data parsing and field extraction rules
•    Developing complex Splunk search queries to identify trends, patterns, and anomalies in data
•    Creating custom visualizations (charts, graphs, tables) to effectively present data insights on dashboards
•    Utilizing Splunk’s search functions to troubleshoot issues, investigate incidents, and perform root cause analysis
•    Configuring real-time alerts based on specific search criteria to proactively notify teams of critical events
•    Managing alert thresholds and escalation procedures
•    Monitoring Splunk system health and performance
•    Designing and building interactive dashboards to provide key performance indicators (KPIs) and insights to stakeholders
•    Customizing dashboard layouts and access controls for different user groups
•    Managing Splunk user accounts and permissions to ensure data security and compliance
•    Defining roles and assigning appropriate access levels for different user groups

Share This Job

Powered by