What are the responsibilities and job description for the Splunk Engineer position at CruiTek?
Splunk Engineer
Duration: 1-year contract with possible extension
Location: Hybrid in Albany, NY (Onsite every other week for 3 days preferred) or Remote (EST hours required)
Rate: Competitive market rate
No Corp-to-Corp or 1099. No 3rd parties.
Qualifications:
• Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience)
• Proven experience as a Splunk Engineer with a focus on Splunk SaaS
• Strong knowledge of Splunk architecture, components, and deployment methodologies
• Experience with Splunk Enterprise Security (ES) and IT Service Intelligence (ITSI) is a plus
• Proficiency in creating and managing Splunk dashboards, reports, and alerts
• Familiarity with scripting languages (e.g., Python, Bash) and automation tools
• Excellent problem-solving skills and the ability to troubleshoot complex technical issues
• Strong communication and interpersonal skills, with the ability to work effectively in a team environment
• Splunk certifications (e.g., Splunk Certified Admin, Splunk Certified Architect) are preferred.
• Strong understanding of Splunk search language (SPL) and data manipulation techniques
• Experience with data collection methods and data ingestion pipelines
• Proficiency in creating visualizations and dashboards within Splunk
• Knowledge of IT operations, system logs, and network protocols
• Ability to troubleshoot issues related to data processing and analysis within Splunk
• Familiarity with cloud computing concepts and potential experience with AWS (preferred) or other cloud platforms
• Adherence to Splunk Best Practices
Responsibilities:
• Setting up data sources to collect logs, events, and metrics from various systems (EC2, applications, network devices) into the Splunk cloud
• Defining data collection strategies, including data parsing and field extraction rules
• Developing complex Splunk search queries to identify trends, patterns, and anomalies in data
• Creating custom visualizations (charts, graphs, tables) to effectively present data insights on dashboards
• Utilizing Splunk’s search functions to troubleshoot issues, investigate incidents, and perform root cause analysis
• Configuring real-time alerts based on specific search criteria to proactively notify teams of critical events
• Managing alert thresholds and escalation procedures
• Monitoring Splunk system health and performance
• Designing and building interactive dashboards to provide key performance indicators (KPIs) and insights to stakeholders
• Customizing dashboard layouts and access controls for different user groups
• Managing Splunk user accounts and permissions to ensure data security and compliance
• Defining roles and assigning appropriate access levels for different user groups