build scripts and CI/CD automation Keywords: Verilog, SystemVerilog, FPGA, IC, Xilinx, RTL, simulation, synthesis, verification, validation, I2C, SPI, USB, AMBA, mixed signal, firmware Another top job from ECM, the high-tech recruitment experts. Even if this job's not quite right, do contact us now - we may well more »
Buckingham, Buckinghamshire, South East, United Kingdom
Hunter Selection
role in all aspects of product testing, from R&D to product release. Prioritise and manage workload to meet deadlines. Develop and utilise software, firmware, and hardware testing tools for product testing tasks. Write and execute product testing plans and strategies. Identify and improve product testing tools and processes. Knowledge more »
Shepton Mallet, Somerset, South West, United Kingdom
Rhino Recruitment
of PLC Systems and SCADA Systems. Key Responsibilities/Accountabilities: The automation engineering role will be maintaining current functioning control systems. System updates and firmware updates. In future to provide breakdown cover for the cheese production facility. In future it is required that, on completion of a probationary period, the more »
Oxford, Oxfordshire, South East Hybrid / WFH Options
IC Resources
and solve problems. In this role, you will work closely with other ASIC team members, as well as with cross functional teams including architecture, firmware and validation. You will utilise and advance your ASIC verification skills while developing SSD controller ASICs targeting cutting edge silicon technology. Essential qualifications and skills more »
Oxfordshire, England, United Kingdom Hybrid / WFH Options
IC Resources
and solve problems. In this role, you will work closely with other ASIC team members, as well as with cross functional teams including architecture, firmware and validation. You will utilize and advance your ASIC verification skills while developing SSD controller ASICs targeting cutting edge silicon technology. Essential qualifications and skills more »
will be outside of IR35 and will last 12 months initially. To be successful you will ideally have previous experience doing: VHDL verification. FPGA Firmware programming in VHDL Mentor Graphics FPGA Design toolset: QuestaSim, Precision Synthesis Xilinx Zynq Ultrascale+ If you think you would be a good fit apply below more »
Rochester, Kent, South East, United Kingdom Hybrid / WFH Options
Ernest Gordon Recruitment
and existing products Electronic design of modules for the multiplex bus system Electronic support for the off-grid product range Development of low-level firmware Schematic capture and PCB layout The person: Electronics Design Engineer Analogue and Digital design experience PCB Design experience Keywords: Electronics Engineer, PCB, Analogue, Digital, Embedded more »
Berkshire, South East, United Kingdom Hybrid / WFH Options
Defence
techniques and technology trends. Desirable: Experience of DOORS, UML, SEBoK, Enterprise Architect and SysML. Experience of hands-on development of either hardware, software or firmware development, particularly in an embedded environment. Line management experience of a team of 1-5 engineers. Technical management experience of a team of systems engineer more »
London, England, United Kingdom Hybrid / WFH Options
Defence
techniques and technology trends. Desirable: Experience of DOORS, UML, SEBoK, Enterprise Architect and SysML. Experience of hands-on development of either hardware, software or firmware development, particularly in an embedded environment. Line management experience of a team of 1-5 engineers. Technical management experience of a team of systems engineer more »
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Computer Futures
suitable notation techniques Perform hands-on manual/exploratory testing Perform tests on new types of lock and locker user interfaces and their associated firmware Own the various test/QA environments in collaboration with the rest of the Technology team Working with internal and external customers to complete QA more »
projects with relevant technical documentation. To manage all monitoring and alerting functions to meet internal and external customer SLA’s To manage patch/firmware management schedule for all internal and external networking environments. To assist and support with all Business Continuity Planning requirements. To support any emergency Business Continuity more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
abilities: Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as well as network architecture design and documented policies and procedures. Experience developing and documenting system security requirements and conducting requirements gap more »
for the designated COMSEC POC for cryptographic equipment related to deployments, repairs, and upgrades, as well as tracking the order to delivery. •Manages any firmware upgrades for INE devices listed on the COMSEC account. •Manages, monitors, and safeguards active encryption devices (in-network or accessed from outside the network). more »