less experienced engineers and provide thoughtful, constructive feedback. • Performs other duties as assigned. Skills/Abilities • Proficiency in electronic design, microprocessor or embedded computing. • Understanding of design and general computer architecture. • Ability to write detailed design specifications. • Computer programming and coding abilities. • Excellent verbal and written communication skills. • Excellent mathematical skills. • Excellent organizational skills and attention to detail. More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers by improving, protecting, and defending our Nation's Security. Job Description: We … are searching for someone to design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. You will create solutions derived from forensics and attack attribution, facilitate protection of critical networks and active systems, and conduct knowledge discovery of passive and active systems, or other cryptologic computer science mission support. The right candidate … will apply requisite computer science skills (operating systems, compiler theory, databased theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, and data structure) to each problem to provide state-of -the-art techniques, tools, and approaches. The Level 3 Cryptologic Computer Scientist shall possess the following capabilities: Design, develop, deliver, and operate solutions to hard More ❯
and high-performance personal computers. This includes deep understanding of the micro-architectural details of each block and how it works within the broader GPU design.A strong graphics or computerarchitecture background, and foundation in digital design techniques and a preferred background in verification methodology will be used to close testing coverage with high confidence . Description As … complex graphics IPs to high-quality closure.As you progress, you'll take on increasing responsibilities within the team, including creating and executing verification plans and negotiating program objectives with Architecture, Design, and Software teams. Minimum Qualifications BS/MS/PhD in Computer Engineering, Electronic Engineering or related field Strong knowledge of computerarchitecture, general purpose … microprocessor or memory sub-system micro-architecture in lieu of graphics experience Excellent planning, collaboration and communication skills Preferred Qualifications Prior DV or Design contribution to complex IP at Unit, Sub-system, or Top-level Knowledge of verification languages and methodologies More ❯
cybersecurity data across multiple OSI network layers, bringing a solid understanding of logical and physical IP core infrastructure, communication devices, their network connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance … systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of … may count as 6 months of experience). Qualifications: An Associate's Degree with 4 years of experience A Bachelor's Degree with 2 years of experience Degree in Computer Science is required. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerMore ❯
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 2 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience or Bachelor's Degree with 5 years of experience, Master's Degree with 3 years of experience, or PhD with 2 years of experience Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 3 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience A Bachelor's Degree with 8 years of experience A Master's Degree with 6 years or experience A PhD with 4 years of experience A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Position requires active Security Clearance with appropriate Polygraph Pay More ❯
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 4 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience A Bachelor's Degree with 11 years of experience A Master's Degree with 9 years or experience A PhD with 7 years of experience A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Position requires active Security Clearance with appropriate Polygraph Pay More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
across Arm, from modelling, RTL, FPGA, Silicon and software Explore and challenge the limits of IP and system performance capabilities. Required Skills and Experience : At least 4 years SoC architecture, SoC and/or SW performance analysis experience. Understanding of computerarchitecture and microarchitecture concepts such as cache hierarchy, memory access efficiency, multi-core architecture and … with working on pre-silicon platforms such as Models, RTL simulation, emulation or FPGA. Experience of the Arm architecture. University degree (or equivalent experience) or PhD in Electronic Engineering, Computer Science, Mathematics, Data Analytics or a related field. In Return: You will get to utilise your engineering skills to build support for the technologies and influence millions of devices More ❯
systems and hardware-level optimization What You’ll Bring Expert knowledge of modern C++ (11/14/17/20) with a performance-first mindset Strong understanding of computerarchitecture and CPU-level tuning Experience with concurrency, multi-threading, and scalable system design Why This Role? Immediate Impact – Your code directly shapes global trading outcomes Innovation-Focused … Work on advanced systems optimization and architecture Work with the Best – Join a close-knit team of world-class engineers Accelerated Career Path – Flat structure, technical ownership, and fast growth Apply now or reach out directly: obloom@hunterbond.com More ❯
optimizations-particularly GPU-specific optimizations. Highly self-motivated with excellent verbal and written communication skills. Comfortable working in an applied research environment-with extremely high autonomy. Nice to haves: Architecture understanding-full understanding of a computerarchitecture specialized for training NN graphs (Intel Xeon CPU, GPUs, TPUs, custom accelerators). Rust experience-systems level programming experience in … Rust. Open-source contributions to Compiler Stacks. Compilation understanding-strong understanding of compilation in regards to one or more High-Performance Computer architectures (CPU, GPU, custom accelerator, or a heterogeneous system of all such components). Proven technical foundation-in CPU and GPU architectures, numeric libraries, and modular software design. Deep Learning understanding-both in terms of recent architectureMore ❯
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Functional Simulator: Design, build, and maintain a functional simulator of the OPTU subsystem and full … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Functional Simulator: Design, build, and maintain a functional simulator of the OPTU subsystem and full … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
in the lab. Proficiency using MATLAB/Simulink or Python/NumPy for algorithm modelling, fixed‐point analysis and test‐vector generation. Solid grounding in digital signal‐processing concepts, computer‐architecture fundamentals and semiconductor device physics. Excellent communication and cross‐functional collaboration abilities; thrives in a fast‐moving, ambiguous environment. Nice to have Tape‐out experience at More ❯
and teach best practices to less experienced engineers. • Performs other duties as assigned. Skills/Abilities • Proficiency in electronic design, microprocessor or embedded computing. • Understanding of design and general computer architecture. • Ability to write detailed design specifications. • Computer programming and coding abilities. • Excellent verbal and written communication skills. • Excellent mathematical skills. • Excellent organizational skills and attention to detail. More ❯
in the Washington, D.C. Metropolitan area, MLS is accessible 24/7 to respond to short-fused, ongoing and surge requirements worldwide. Position Description: We are actively hiring Cryptologic Computer Scientists to join our team. Cryptologic Computer Scientists use computer science skills, expertise, and tradecraft to analyze information and solve intelligence analysis, discovery, and Cybersecurity problems. The … solutions may involve analysis of adversaries' software, information fusion, information analysis, and rapid prototyping and DevOps. The Contractor shall use requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, and data structures) and apply them to each problem to provide state-of-the-art analysis, techniques, tools … years' experience or; - MS + 3-9 years' experience or; - PhD + 2-7 years' experience Required: - Degree must be from an accredited university in STEM related field; specifically, Computer Science, Computer Engineering, Mathematics, Applied Mathematics or related Engineering or Mathematics Field. - Relevant experience must be in computer systems research simulation/model development and prototyping; software More ❯
175k-$210k Certifications: (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Degree Type: Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following … foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming … computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). Years More ❯
polygraph is required • Eight (8) years of experience as a DNEA and a bachelors degree. A bachelors degree may be substituted for two extra years of experience. Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
Arm is looking for an engineer with compiler toolchain development experience to join the team that develops instruction set architecture for data processing. You will work closely with computer architects to help in exploring and identifying improvement opportunities both in architecture as well as on how it is deployed/adopted. Responsibilities: Exploration and development of new … CPU architecture: providing feedback on how new architecture fits into Arm's compiled code ecosystem. Identify weak spots and areas for improvement. Propose new solutions when the existing architecture is not sufficient. Prototyping of new CPU architecture features in experimental static and dynamic compilers. Test the viability of new compiler optimizations, based on new architectural concepts. … Find additional opportunities for improvement in compiled code. Assist with deploying new compiler techniques for the Arm architecture: help the transition from new architecture to actual product development. Assist compiler engineers on the implementation of novel concepts. Provide micro-architecture teams with representative workloads showing what code a compiler would generate in production software. Required Skills and More ❯
data to attain and share insights Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in low power embedded graphics cores. This includes deep understanding of the micro-architectural details of their block and how it works within the broader GPU design. A strong computerarchitecture background, preferably in graphics, and a strong foundation in verification methodology will be used to close testing coverage with high confidence. Description Use SystemVerilog, UVM and C++ … debug design and environment issues. Build functional coverage points, analyze coverage, and improve test environment to target coverage holes. Build automated verification flows for block verification. Minimum Qualifications Strong computerarchitecture background, preferably in graphics. Strong foundation in verification methodology. Preferred Qualifications Work with other block and core level engineers to ensure seamless verification flow. More ❯
Hertfordshire, England, United Kingdom Hybrid / WFH Options
MicroTECH Global Ltd
and RTL designers in an iterative development cycle Design Requirements 0-2 years of experience in RTL design using SystemVerilog or VHDL Solid foundation in digital logic design and computerarchitecture Exposure to or strong interest in GPU, AI accelerators, or vector processors Familiarity with RISC-V ISA is a plus, not a mustUnderstanding of pipelining, memory hierarchies … DFT, floorplanning)Experience using EDA tools (e.g., Synopsys, Cadence, or similar) during academic or internship projects Scripting knowledge in Python, TCL, or equivalent languagesBS or MS in Electrical Engineering, Computer Engineering, or a related discipline Verification Requirements0-2 years of hands-on experience with hardware verification (academic or internship projects count)Familiar with SystemVerilog and basic UVM conceptsInterest or … exposure to functional coverage, assertions, and constrained-random testing Understanding of GPU/AI workloads or RISC-V architecture is a plusExperience using simulators like VCS, Questa, or ModelSimComfortable with scripting languages (Python, Perl, or TCL)Strong problem-solving skills and willingness to dive into debugging and analysisBS or MS in Electrical Engineering, Computer Engineering, or a related More ❯
to attain and share insights distill, document, contextualize and share your findings-including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers. Qualifications: Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
insights distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. 4 years' applicable experience with a PhD … years' applicable experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance More ❯