Splunk Administrator

Morristown, NJ, US • Posted 17 hours ago • Updated 17 hours ago
Full Time
No Travel Required
On-site
Depends on Experience
Fitment

Dice Job Match Score™

👾 Reticulating splines...

Job Details

Skills

  • Splunk
  • Administrator
  • infrastructure
  • Azure
  • Okta
  • Splunk Cloud
  • configuration
  • security
  • analytics

Summary

Title: Splunk Administrator 

Hire Type: Full-Time Permanent  

Location: Alpharetta, GA; Charlotte, NC; Chicago, IL; Conshohocken, PA; Denver, CO; Fargo, ND; Garden City, NY; Houston, TX; Lubbock, TX; Morristown, NJ; Mt Juliet, TN; New York, NY; Purchase, NY; Topeka, KS - Hybrid 

 

Role Summary: The Splunk Administrator is responsible for supporting and maintaining Client’s Splunk Cloud environment and associated log ingestion components. This role ensures reliable data collection across diverse sources, monitors platform health and capacity, and performs ongoing administration, updates, and configuration to support security operations and analytics. 

 

Roles & Responsibilities:  

  • Monitor log ingestion volumes and platform health using custom searches and Splunkbase tools. 

  • Ensure reliable log delivery and troubleshoot ingestion interruptions across supported sources. 

  • Administer intermediate log collection components, including Logstash, syslog, Heavy Forwarders, and related services. 

  • Manage Splunk application configurations on Universal Forwarders using the Splunk Deployment Server. 

  • Perform Universal Forwarder upgrades and maintenance to address security, stability, and version requirements. 

  • Manage and update Splunk applications within the Splunk Cloud environment. 

  • Collaborate with security and infrastructure teams to support onboarding of new log sources. 

  • Document configurations, procedures, and troubleshooting steps for operational use. 

 

Technical Qualification: Hands on experience administering: 

  • 3 to 5 years of hands‑on experience administering Splunk in an enterprise environment. 

  • Splunk Cloud and on prem Splunk infrastructure, including Heavy Forwarders, Deployment Server, and Universal Forwarders. 

  • HTTP Event Collector 

  • Common Splunk Technology Add ons,  including Azure, Okta, and other cloud services. 

  • Splunk data models and data normalization practices. 

  • Splunk features such as alert actions, SAML based authentication, KV store, and lookups. 

  • Splunk role based access controls and permission models. 

  • Data management features including DDAS and reindexing processes. 

Familiarity with: 

  • Azure Event Hubs, Kafka, Log Analytics Workspaces, and cloud based logging pipelines. 

  • Windows Event Collection and Windows Event Forwarding 

 

General Qualification: 

  • Ability to create clear, concise technical documentation for both technical and non‑technical audiences. 

  • Strong analytical and troubleshooting skills with the ability to work independently. 

  • Effective time and priority management in a multi task operational environment. 

  • Strong written and verbal communication skills. 

 

 

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10217276
  • Position Id: 525987-15352-
  • Posted 17 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

New York, New York

8d ago

Easy Apply

Contract, Third Party

Depends on Experience

New York, New York

4d ago

Full-time

USD 147,000.00 - 310,000.00 per year

Hybrid in Jersey City, New Jersey

Today

Full-time

Newark, New Jersey

Yesterday

Easy Apply

Contract, Third Party

Search all similar jobs