:
ARM crafts the technology that is at the heart of sophisticated digital products, from wireless, networking and consumer entertainment solutions to imaging, automotive, security and storage devices. ARM improves peoples lives by enabling the intelligence in affordable, easy-to-use electronic products that transform the way we live and work. We work in partnership with a global network of leading technology companies which are using our low-power technology. Together we are crafting the future of a better world.
ARMs CPU group develops high performance CPU cores that drives many of todays digital devices. Customers demand high quality and reliable IP, as the cost of design iterations is very high and shorter design cycles means that re-spins can be disastrous for the success of a product. Against this background, ARM has adopted a 'right-first-time\' methodology and recognizes the need for dedicated verification engineers to work with the design team. Verification of ARM CPUs is a tough challenge!! At ARM, several complementary methodologies are used to ensure that no bugs go undetected. ARM CPU Verification Engineers have and develop specialist skills and knowledge and apply both hardware and software skills to the validation task. They work closely with the designers to understand various areas of the design, so that the features are thoroughly validated. This requires an insight both of the \'big picture\' at the architectural level and of the detail at the implementation level.
Today, the worlds digital infrastructure is composed of a complex and vibrant network of devices, software, services, and systems designed to sense, compute, and act on data. The scale weve reached has shone a brighter spotlight on security.
Any vulnerability along this powerful compute continuum threatens to seed distrust among users, compromise valuable data, and imperil our digital future.
Whether its a new hack or a ransomware attack, quite a few vulnerabilities involve higher stakes. Arm continues to enhance new hardware and software based security solutions and strategies.
Verification stimulus plays a major role in many ways towards proving existing vulnerabilities, hunting for new ones and ensuring that the mitigations are thoroughly validated.
Developing stimulus for security vulnerabilities requires an insight into firmware and hardware security.
Job Requirements: Key Account abilities:
Technical Contribution as part of Project teams to deliver effective ARM CPU IPs
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.