Splunk Cloud Engineer
Apply on
As a Splunk Cloud Engineer for Observability, your team owns the management of our monitoring tools and the best practices for using those tools to provide total visibility into our systems. Splunk is the primary tool for logging at our company. This role requires a vision and strategy for getting the most value from our Splunk investment, implement and refine governance practices, as well handling hands on admin tasks and tiers 1-3 support across a disparate organization.
As a successful candidate for this role, you will maintain and improve Splunk Cloud health through proactive governance and administration. You will perform upgrades to Splunk Cloud, backup data, manage chargeback costing, and integrate with the various applications and tools. You will on-board data from external sources and enhance data for specific projects. You will be responsible for scaling platform deployments, securing Splunk Cloud, troubleshooting, and documenting. Finally, the role works with multiple internal teams, including Splunk TAMs, to resolve issues and empower our end users.
A day in the life:
Splunk Governance and Best Practices documentation, training colleagues
Getting data in, field extractions, sourcetype optimization
Splunk Cloud administration: roles and capabilities, users, Apps, HEC tokens, indexes, etc
Build and optimize a large-scale Splunk infrastructure
Splunkbase Add-ons and Apps administration, installation, configuration, maintenance
Internal Splunk app deployment for indexer-based sourcetype updates
Splunk use-case design and implementation (for business problems, understanding the Splunk architecture requirements for scalability, security, and performance)
Build and maintain Splunk Cloud components (Universal Forwarders, Heavy Forwarders, HEC, Add-ons, etc)
Managing ingestion/SVC usage, and communicating chargeback data
Work with Splunk Support for maintenance/update requirements
Create data retention policies
Splunk Cloud architecture security
Documentation, how-to article or technical advisory creation
College degree in computer science/engineering or related field
Minimum 4+ years of experience with Splunk in one of the following areas: IT Operations, compliance, dev ops, network security, and system security, supporting security event management tools (SIEMs)
Minimum 2+ years of experience with rule and advanced logic creation within Splunk
Technical background in infrastructure technologies
Strong understanding of SPL, search and dashboard optimization
Knowledge of:
o PII / CCPA / GDPR rules
o Enterprise Single Sign-On
o Docker and Kubernetes
o CCM tools, such as Ancible, Puppet, Chef, etc.
o Atlassian Suite tools
o Cloud Solutions especially AWS services
o Experience with Linux
A track record delivering quality results on complex cross-functional projects
Analytical and problem-solving capabilities
Strong verbal and written communication skills. Must be able to communicate with a wide variety of audiences, both business and technical.
Bonus
Expertise in other monitoring tools such as AppDynamics, New Relic, SignalFX, Thousand Eyes, etc.
Knowledge of OpenTelemetry, experience with OpenTelemetry API/SDK
Knowledge and implementation experience with Splunk Connect for Kubernetes (SCK)
Interpersonal Must Haves
Acknowledges the presence of choice in every moment and takes personal responsibility for their life.
Possesses an entrepreneurial spirit and continuously innovates to achieve great results.
Communicates with honesty and kindness, and creates the space for others to do the same.
Leads with courage, knowing the possibility of greatness is bigger than the fear of failure.
Fosters connection by putting people first and building trusting relationships.
Integrates fun and joy as a way of being and working, aka doesn t take themselves too seriously.