Senior Principal Telemetry Architect

Cambridge
2 months ago
Applications closed

Related Jobs

View all jobs

Principal Security Engineer

Senior or Principal Security Consultant (Risk Management)

Principal Cyber Security Consultant - Hybrid

Cyber Security Engineer

Principal Security Consultant // 12+ month contract

Principal Security Architect

Job Overview: 

  

Do you want to craft the next-generation telemetry architecture for Windows on ARM platform, extracting the maximum performance and power efficiency from the latest process and packaging technologies? In the Central Technology Group of ARM, we have a diverse set of engineers covering all aspects of SoC system architecture. 

You have the chance to create high-impact changes daily by solving challenging technical problems in next generation compute devices! You will tackle challenging development work to help kickstart projects, run sophisticated proof-of-concepts, and be a technical leader from the front. 

  

Responsibilities: 

Engage with engineering leadership and product planning teams to develop technology roadmap. 

Translate technology requirements into platform architecture, encompassing hardware, software, tools and other components. 

Design and implement telemetry frameworks for laptops and PCs to capture real-time data on hardware, firmware, OS, and application performance. 

Develop in-band and out-of-band data collection mechanisms to monitor system health, power management, battery life, thermal performance, and CPU/GPU usage. 

Work with OS vendor frameworks such as Windows Telemetry, Diagnostics Management, and ETW/WPR. 

Align with infrastructure telemetry architects on industry standards such as DMTF, DASH, Redfish, OpenTelemetry, and Bulk Telemetry (OCP) to build a cutting-edge, standardized telemetry solution. 

Analyze competitive solutions, including Intel vPro and Intel Active Management Technology (AMT), to build platform remote management capabilities. 

Collaborate with hardware (Arm platform architecture, SoC architects) and software teams to intercept and integrate telemetry solutions across different system layers, including firmware, kernel, drivers, OS, and remote/cloud access. 

Develop secure telemetry data management models, both on-chip and off-chip. 

Work closely with Microsoft and Arm platform customers to refine telemetry requirements and ensure alignment with industry needs. 
 

Required Skills and Experience: 

Proven track record in PC/Laptop (Windows on ARM) SoC Architecture or related work experience 

Deep technical background and credibility 

Experience in firmware development, platform architecture, or telemetry solutions. 

Knowledge of PC/laptop hardware, BIOS/UEFI, firmware, and OS (Windows/Linux). 

Experience with performance analysis and cloud telemetry solutions is a plus. 

Knowledge of power management, thermal profiling, and system health diagnostics in modern computing devices. 

Expertise in one or more of these technology domains would be desirable: Power, Thermal & Limits Management, Platform security, Reset & Boot, 2.5D/3D advanced packaging and chiplets, Chipset Platform Architecture 

Proven track record to drive progress in an ambiguous environment 

Collaborative and influential across organizations 

Excellent communication and interpersonal skills and ability to work across multiple teams 
 

Nice to have: 

Bachelor of Science degree in EE/ECE/CE/CS or related field required, MS or PhD highly desired 
 

In return: 

  

Arm is at the heart of the world's most advanced digital products. Our technology enables the generation of new markets and transformation of industries and society. We craft scalable, energy efficient-processors and related technologies. Our innovative technology is licensed by Arm Partners who have shipped more than 50 billion Systems on Chip containing our intellectual property. Together with our Connected Community, we are breaking down barriers to innovation for developers, designers, and engineers, ensuring a fast, reliable route to market for leading electronics companies. 

  

#LI-TE! 

  

 

Accommodations at Arm

At Arm, we want our people to Do Great Things. If you need support or an accommodation to Be Your Brilliant Self during the recruitment process, please email . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process.

Hybrid Working at Arm

Arm’s approach to hybrid working is designed to create a working environment that supports both high performance and personal wellbeing. We believe in bringing people together face to face to enable us to work at pace, whilst recognizing the value of flexibility. Within that framework, we empower groups/teams to determine their own hybrid working patterns, depending on the work and the team’s needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you.

Equal Opportunities at Arm

Arm is an equal opportunity employer, committed to providing an environment of mutual respect where equal opportunities are available to all applicants and colleagues. We are a diverse organization of dedicated and innovative individuals, and don’t discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.