Computer Architecture Job Vacancies

51 to 75 of 87 Computer Architecture Jobs

Digital Network Exploitation Analyst 1 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
cybersecurity data across multiple OSI network layers, bringing a solid understanding of logical and physical IP core infrastructure, communication devices, their network connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance … systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of … may count as 6 months of experience). Qualifications: An Associate's Degree with 4 years of experience A Bachelor's Degree with 2 years of experience Degree in Computer Science is required. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 2 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience or Bachelor's Degree with 5 years of experience, Master's Degree with 3 years of experience, or PhD with 2 years of experience Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Completion of military training in a relevant area such More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 3 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience A Bachelor's Degree with 8 years of experience A Master's Degree with 6 years or experience A PhD with 4 years of experience A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Position requires active Security Clearance with appropriate Polygraph Pay More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst 4 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 4 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems … experience A Bachelor's Degree with 11 years of experience A Master's Degree with 9 years or experience A PhD with 7 years of experience A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Position requires active Security Clearance with appropriate Polygraph Pay More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Staff Performance Modelling Engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
Arm Limited
across Arm, from modelling, RTL, FPGA, Silicon and software Explore and challenge the limits of IP and system performance capabilities. Required Skills and Experience : At least 4 years SoC architecture, SoC and/or SW performance analysis experience. Understanding of computer architecture and microarchitecture concepts such as cache hierarchy, memory access efficiency, multi-core architecture and … with working on pre-silicon platforms such as Models, RTL simulation, emulation or FPGA. Experience of the Arm architecture. University degree (or equivalent experience) or PhD in Electronic Engineering, Computer Science, Mathematics, Data Analytics or a related field. In Return: You will get to utilise your engineering skills to build support for the technologies and influence millions of devices More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

C++ Developer - Up to £185,000 + Bonus + Package

London, UK
Hybrid / WFH Options
Hunter Bond
systems and hardware-level optimization What You’ll Bring Expert knowledge of modern C++ (11/14/17/20) with a performance-first mindset Strong understanding of computer architecture and CPU-level tuning Experience with concurrency, multi-threading, and scalable system design Why This Role? Immediate Impact – Your code directly shapes global trading outcomes Innovation-Focused … Work on advanced systems optimization and architecture Work with the Best – Join a close-knit team of world-class engineers Accelerated Career Path – Flat structure, technical ownership, and fast growth Apply now or reach out directly: obloom@hunterbond.com More ❯
Posted:

Remote Machine Learning Compiler Engineer - Gensyn

London, United Kingdom
Hybrid / WFH Options
Blockchain Works
optimizations-particularly GPU-specific optimizations. Highly self-motivated with excellent verbal and written communication skills. Comfortable working in an applied research environment-with extremely high autonomy. Nice to haves: Architecture understanding-full understanding of a computer architecture specialized for training NN graphs (Intel Xeon CPU, GPUs, TPUs, custom accelerators). Rust experience-systems level programming experience in … Rust. Open-source contributions to Compiler Stacks. Compilation understanding-strong understanding of compilation in regards to one or more High-Performance Computer architectures (CPU, GPU, custom accelerator, or a heterogeneous system of all such components). Proven technical foundation-in CPU and GPU architectures, numeric libraries, and modular software design. Deep Learning understanding-both in terms of recent architecture More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Performance Modelling Engineer

London, UK
Flux Computing
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Functional Simulator: Design, build, and maintain a functional simulator of the OPTU subsystem and full … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
Posted:

Performance Modelling Engineer

City of London, London, United Kingdom
Flux Computing
on delivering impact and innovation at speed. The Role We’re searching for a Performance Modelling Engineer to create and own the analytical and simulation models that steer OTPU architecture and software evolution. You will build functional simulators as well as high-fidelity, cycle-accurate models of our optical compute system. This role is critical to explore “what-if … design spaces, and deliver insights that directly influence our software, hardware, and optical roadmaps. This role sits at the crossroads of hardware architecture, software tooling and machine-learning workload analysis, perfect for an engineer who loves data-driven decision-making and fast iteration. Responsibilities Functional Simulator: Design, build, and maintain a functional simulator of the OPTU subsystem and full … GPUs, ASICs, or accelerators Strong coding ability in C++ and Python; experience with discrete-event or cycle-accurate simulators (e.g., gem5, SystemC, custom in-house). Solid grasp of computer-architecture fundamentals: memory systems, interconnects, queuing theory, Amdahl/Gustafson analysis. Familiarity with machine-learning workloads and common frameworks (PyTorch, TensorFlow, JAX). Comfort reading RTL or schematics More ❯
Posted:

Senior / Staff Digital Design Engineer

London, England, United Kingdom
Flux Computing
in the lab. Proficiency using MATLAB/Simulink or Python/NumPy for algorithm modelling, fixed‐point analysis and test‐vector generation. Solid grounding in digital signal‐processing concepts, computerarchitecture fundamentals and semiconductor device physics. Excellent communication and cross‐functional collaboration abilities; thrives in a fast‐moving, ambiguous environment. Nice to have Tape‐out experience at More ❯
Posted:

Principal Digital Electronics Design Engineer with Security Clearance

Cambridge, Massachusetts, United States
Ed Wallach Search Group
and teach best practices to less experienced engineers. • Performs other duties as assigned. Skills/Abilities • Proficiency in electronic design, microprocessor or embedded computing. • Understanding of design and general computer architecture. • Ability to write detailed design specifications. • Computer programming and coding abilities. • Excellent verbal and written communication skills. • Excellent mathematical skills. • Excellent organizational skills and attention to detail. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cryptologic Computer Scientist with Security Clearance

Maryland, United States
MultiLingual Solutions Inc
in the Washington, D.C. Metropolitan area, MLS is accessible 24/7 to respond to short-fused, ongoing and surge requirements worldwide. Position Description: We are actively hiring Cryptologic Computer Scientists to join our team. Cryptologic Computer Scientists use computer science skills, expertise, and tradecraft to analyze information and solve intelligence analysis, discovery, and Cybersecurity problems. The … solutions may involve analysis of adversaries' software, information fusion, information analysis, and rapid prototyping and DevOps. The Contractor shall use requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computer architecture, discrete math, programming language theory, and data structures) and apply them to each problem to provide state-of-the-art analysis, techniques, tools … years' experience or; - MS + 3-9 years' experience or; - PhD + 2-7 years' experience Required: - Degree must be from an accredited university in STEM related field; specifically, Computer Science, Computer Engineering, Mathematics, Applied Mathematics or related Engineering or Mathematics Field. - Relevant experience must be in computer systems research simulation/model development and prototyping; software More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

CNDA with Security Clearance

Maryland, United States
A3 Missions, LLC
175k-$210k Certifications: (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Degree Type: Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following … foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming … computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). Years More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst (DNEA) with Security Clearance

Annapolis Junction, Maryland, United States
SSATI
polygraph is required • Eight (8) years of experience as a DNEA and a bachelors degree. A bachelors degree may be substituted for two extra years of experience. Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Staff Compiler Engineer

Cambridge, Cambridgeshire, United Kingdom
Hybrid / WFH Options
Arm Limited
Arm is looking for an engineer with compiler toolchain development experience to join the team that develops instruction set architecture for data processing. You will work closely with computer architects to help in exploring and identifying improvement opportunities both in architecture as well as on how it is deployed/adopted. Responsibilities: Exploration and development of new … CPU architecture: providing feedback on how new architecture fits into Arm's compiled code ecosystem. Identify weak spots and areas for improvement. Propose new solutions when the existing architecture is not sufficient. Prototyping of new CPU architecture features in experimental static and dynamic compilers. Test the viability of new compiler optimizations, based on new architectural concepts. … Find additional opportunities for improvement in compiled code. Assist with deploying new compiler techniques for the Arm architecture: help the transition from new architecture to actual product development. Assist compiler engineers on the implementation of novel concepts. Provide micro-architecture teams with representative workloads showing what code a compiler would generate in production software. Required Skills and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Digital Network Exploitation Analyst (DNEA) Level 1 - 4 with Security Clearance

Maryland, United States
Tailored Access, LLC
data to attain and share insights Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Design Verification Engineer

United Kingdom
Apple Inc
in low power embedded graphics cores. This includes deep understanding of the micro-architectural details of their block and how it works within the broader GPU design. A strong computer architecture background, preferably in graphics, and a strong foundation in verification methodology will be used to close testing coverage with high confidence. Description Use SystemVerilog, UVM and C++ … debug design and environment issues. Build functional coverage points, analyze coverage, and improve test environment to target coverage holes. Build automated verification flows for block verification. Minimum Qualifications Strong computer architecture background, preferably in graphics. Strong foundation in verification methodology. Preferred Qualifications Work with other block and core level engineers to ensure seamless verification flow. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Digital Design & Verification Engineer - Graduate / Juniorss

Hertfordshire, England, United Kingdom
Hybrid / WFH Options
MicroTECH Global Ltd
and RTL designers in an iterative development cycle Design Requirements 0-2 years of experience in RTL design using SystemVerilog or VHDL Solid foundation in digital logic design and computer architecture Exposure to or strong interest in GPU, AI accelerators, or vector processors Familiarity with RISC-V ISA is a plus, not a mustUnderstanding of pipelining, memory hierarchies … DFT, floorplanning)Experience using EDA tools (e.g., Synopsys, Cadence, or similar) during academic or internship projects Scripting knowledge in Python, TCL, or equivalent languagesBS or MS in Electrical Engineering, Computer Engineering, or a related discipline Verification Requirements0-2 years of hands-on experience with hardware verification (academic or internship projects count)Familiar with SystemVerilog and basic UVM conceptsInterest or … exposure to functional coverage, assertions, and constrained-random testing Understanding of GPU/AI workloads or RISC-V architecture is a plusExperience using simulators like VCS, Questa, or ModelSimComfortable with scripting languages (Python, Perl, or TCL)Strong problem-solving skills and willingness to dive into debugging and analysisBS or MS in Electrical Engineering, Computer Engineering, or a related More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Digital Network Exploitation Analyst/DNEA (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
to attain and share insights distill, document, contextualize and share your findings-including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers. Qualifications: Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:

DNEA with Security Clearance

Maryland, United States
Acclaim Technical Services
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Maryland, United States
Acclaim Technical Services
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst Level 3 with Security Clearance

Maryland, United States
ELEVI Associates, LLC
insights distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. 4 years' applicable experience with a PhD … years' applicable experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst Level 3 MD with Security Clearance

Annapolis Junction, Maryland, United States
ELEVI Associates, LLC
insights distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. 4 years' applicable experience with a PhD … years' applicable experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Manufacturing Test Engineer with Security Clearance

Palmdale, California, United States
PlanIT Group LLC
both written and verbal, are required as this position requires extensive interface with peers, customers, associate contractors, management, and touch labor across varied disciplines on a daily basis. General computer architecture and/or communications bus architecture knowledge . Previous experience with engineering releases and configuration change control . Flight Line Experience LabView experience. Experience with MS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Subsea Cable System Engineer

london, south east england, united kingdom
Hybrid / WFH Options
BT Group
To provide and lead specialised technical support to customers and distant ends as required. SKILLS YOU'LL NEED Mandatory: Driving licence. Ability to travel. Valid Passport. Fibre Network Knowledge. Computer competent. Problem solver. Working alone. Team working. Ability to communicate effectively at all levels. Field Engineering. Ability to work in water Have a good level of fitness Be competent … advanced level of knowledge in Digital Transmissions systems and techniques Fibre testing, splicing, jointing and optical fault location Advanced IT Networking skills (Operating systems, IP routing, Networking, Server management, computer architecture and repair) BENEFITS BT Pension scheme, minimum 5% Employee contribution, BT contribution 10% From January 2025, equal family leave: receive 18 weeks at full pay, 8 weeks More ❯
Posted:
Computer Architecture
10th Percentile
£54,625
25th Percentile
£62,500
Median
£76,250
75th Percentile
£78,750
90th Percentile
£82,500