Year Up United is a one-year or less, intensive job training program that provides young adults with in-classroom skill development, access to internships and/or job placement services, and personalized coaching and mentorship. Year Up United participants More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience All Levels: Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
A Senior ASIC Hardware Engineer specifies, designs, verifies, tests, and documents Application-Specific Integrated Circuits. The engineer develops the architecture, designs circuits and/or HDL, performs simulations, performs physical layout, verifies and tests designs. Job Description: Duties/Responsibilities • Design and simulate circuits at transistor-level to implement architecture and requirement specifications • Contribute to system-level design … including floor-planning, and simulate circuits using extracted parasitics. • Perform other duties as assigned Skills/Abilities • Proficiency in integrated circuit design • Understanding of integrated circuits, semiconductors, and general computerarchitecture • Ability to write detailed design specifications • Ability to manage small technical teams • Excellent verbal and written communication skills • Excellent mathematical skills • Excellent organizational skills and attention to More ❯
closely with cross-functional teams, including Quantitative Research, Engineering, and Traders. Skill Set Requirements: Minimum 2 years experience in the full ASIC or FPGA design life cycle, including hardware architecture, RTL coding, simulation, verification, system integration, and testing. Experience working in Verilog, System Verilog, and either Python or C++. Strong working knowledge of FPGA design flow or physical design. … Ability to work in a Linux environment. Exposure to network- and system-level protocols, packet-based data processing, and computer architecture. Excellent problem-solving skills, with strengths in conducting research and gathering data. Must be adaptable and team-oriented. Minimum Bachelors Degree in Computer Engineering, Computer Science, or related. Financial experience is not required. Contact If this More ❯
We are seeking a Senior Analog/Mixed Signal ASIC Design Engineer to join our team in the Silicon Architecture group. Members of our group lead the design of integrated circuits from conceptual phases through detailed design, implementation, verification, test and delivery to our customers. Designers in the Silicon Architecture group are responsible for developing initial architectural concepts … conducting chip level-planning with implementation team, and providing inputs to verification and test planning. Job Description: Duties/Responsibilities • Design and simulate circuits at transistor-level to implement architecture and requirement specifications • Contribute to system-level design • Optimize hardware designs for performance, power, and cost • Evaluate the hardware feasibility of complex algorithms and requirements • Independently contribute to complex … including floor-planning, and simulate circuits using extracted parasitics. • Perform other duties as assigned Skills/Abilities • Proficiency in integrated circuit design • Understanding of integrated circuits, semiconductors, and general computerarchitecture • Ability to write detailed design specifications • Ability to manage small technical teams • Excellent verbal and written communication skills • Excellent mathematical skills • Excellent organizational skills and attention to More ❯
delivering impact and innovation at speed. The Role We’re searching for a Staff Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Ownership: Define and deliver the technical vision and roadmap for your team that unlocks key … strategic technical and business goals that are essential to the success of Flux. Collaboration: Partner closely with all engineering teams to help shape our overall system architecture and delivery while ensuring models reflect reality and reality meets performance goals. Champion Modelling: Educate peers on modelling methodology and champion data-driven design culture. Functional Simulator: Design, build, and maintain a More ❯
delivering impact and innovation at speed. The Role We’re searching for a Staff Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Ownership: Define and deliver the technical vision and roadmap for your team that unlocks key … strategic technical and business goals that are essential to the success of Flux. Collaboration: Partner closely with all engineering teams to help shape our overall system architecture and delivery while ensuring models reflect reality and reality meets performance goals. Champion Modelling: Educate peers on modelling methodology and champion data-driven design culture. Functional Simulator: Design, build, and maintain a More ❯
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Project Ownership: Own and deliver projects on your team's roadmap that unlock key high … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Project Ownership: Own and deliver projects on your team's roadmap that unlock key high … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
and you can assume that we will provide you with the best FV training to get you started. All we expect from you is a passion for digital design, computerarchitecture and problem-solving. There is a substantial amount of hands-on work on formal verification of processors, GPU blocks, networking designs or AI/ML. The work More ❯
Through projects like OpenTitan we partner with organisations such as ETH Zürich, G+D Mobile Security, Google, Nuvoton, Seagate, and Western Digital. We also maintain close links to researchers in computerarchitecture at the University of Cambridge amongst other research communities. The team is based in Cambridge, UK, amongst the Silicon Fen's ecosystem of high tech startups. Our More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Arm Limited
developers debugging performance problems through our learning paths. Required Skills and Experience: Proven experience identifying and resolving performance issues in server and cloud contexts with a deep understanding of computer architecture. Familiarity with performance profiling and monitoring tools (e.g., VTune, New Relic, Datadog, AppDynamics, Grafana, Prometheus). A passion and history of writing and sharing technical knowledge. Proficient in … both high and low level programming preferably with C++ and Python. "Nice To Have" Skills and Experience: Applicable knowledge of the Arm architecture and how it differs from x86. Technical leadership roles and responsibilities. In Return: You'll get the opportunity to work at the cutting edge of compute and performance analysis, solving meaningful challenges that impact developers across More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Arm Limited
developers debugging performance problems through our learning paths. Required Skills and Experience: Proven experience identifying and resolving performance issues in server and cloud contexts with a deep understanding of computer architecture. Familiarity with performance profiling and monitoring tools (e.g., VTune, New Relic, Datadog, AppDynamics, Grafana, Prometheus). A passion and history of writing and sharing technical knowledge. Proficient in … both high and low level programming preferably with C++ and Python. "Nice To Have" Skills and Experience: Applicable knowledge of the Arm architecture and how it differs from x86. Technical leadership roles and responsibilities. In Return: You'll get the opportunity to work at the cutting edge of compute and performance analysis, solving meaningful challenges that impact developers across More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
to improve verification efficiency and coverage. Required Skills and Experience : Solid understanding of SoC Verification (using C Testcases), hardware description and verification languages e.g. SystemVerilog, Verilog, VHDL. Understanding of Computerarchitecture, bus protocols (e.g., AXI, AHB), and peripherals. Experience with Tcl, Python or other scripting languages. "Nice To Have" Skills and Experience : Experience with ARM-based designs and More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
to improve verification efficiency and coverage. Required Skills and Experience: Solid understanding of SoC Verification (using C Testcases), hardware description and verification languages e.g. SystemVerilog, Verilog, VHDL. Understanding of Computerarchitecture, bus protocols (e.g., AXI, AHB), and peripherals. Experience with Tcl, Python or other scripting languages. "Nice To Have" Skills and Experience: Experience with ARM-based designs and More ❯
and teach best practices to less experienced engineers. • Performs other duties as assigned. Skills/Abilities • Proficiency in electronic design, microprocessor or embedded computing. • Understanding of design and general computer architecture. • Ability to write detailed design specifications. • Computer programming and coding abilities. • Excellent verbal and written communication skills. • Excellent mathematical skills. • Excellent organizational skills and attention to detail. More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers by improving, protecting, and defending our Nation's Security. Job Description: We … are searching for someone to design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. You will create solutions derived from forensics and attack attribution, facilitate protection of critical networks and active systems, and conduct knowledge discovery of passive and active systems, or other cryptologic computer science mission support. The right candidate … will apply requisite computer science skills (operating systems, compiler theory, databased theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, and data structure) to each problem to provide state-of -the-art techniques, tools, and approaches. The Level 3 Cryptologic Computer Scientist shall possess the following capabilities: Design, develop, deliver, and operate solutions to hard More ❯
and high-performance personal computers. This includes deep understanding of the micro-architectural details of each block and how it works within the broader GPU design.A strong graphics or computerarchitecture background, and foundation in digital design techniques and a preferred background in verification methodology will be used to close testing coverage with high confidence . Description As … complex graphics IPs to high-quality closure.As you progress, you'll take on increasing responsibilities within the team, including creating and executing verification plans and negotiating program objectives with Architecture, Design, and Software teams. Minimum Qualifications BS/MS/PhD in Computer Engineering, Electronic Engineering or related field Strong knowledge of computerarchitecture, general purpose … microprocessor or memory sub-system micro-architecture in lieu of graphics experience Excellent planning, collaboration and communication skills Preferred Qualifications Prior DV or Design contribution to complex IP at Unit, Sub-system, or Top-level Knowledge of verification languages and methodologies More ❯
analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities. Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration … testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). There are multiple levels available for the Digital Network … Years' related experience DNEA LEVEL 3: Bachelor's degree and 8 Years' related experience DNEA LEVEL 4: Bachelor's degree and 11 Years' related experience Degree must be in Computer Science or related fields (Engineering, Mathematics) Other degrees may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitectureMore ❯