Staff Verification IP Applications Engineer

Sheffield
3 weeks ago
Applications closed

Related Jobs

View all jobs

Staff IP / SoC Verification Engineer

Staff/Principal SoC Design Engineer

Staff/Principal SoC Design Engineer

Security Consultant (Hybrid, UK - 1 day per week with possible to increase)

Cloud Security Architect

Staff Graphics Engineer – OEM Engagements

The Verification IP (VIP) team develops and maintains a suite of tools used for the verification of various Arm Hardware IP products. The team provides reliable, accurate, consistent and well documented VIP for standard interface protocols, that are used by all Arm engineering design and verification teams.

Job Description:

This is an excellent opportunity for a highly skilled and experienced Applications Engineer with a solid background in hardware verification to join the VIP team. In this fast-paced technical role, you will be the go-to technical adviser for VIP users across Arm, driving successful integration of our VIP products into IP, Subsystem or SoC test benches.

Responsibilities:

Drive adoption of VIP within test benches and support users with integration of new Protocol features and improvements

Offer hands-on technical guidance on VIP bring up and prototype new solutions in testbenches

Conduct training sessions, workshops, and webinars to enable users in standard methodologies for VIP based verification and be a key point of contact for all VIP users

Develop and maintain example test benches, scripts, and user documentation that illustrate VIP adoption in real-world scenarios

Communicate with all the VIP users on a regular basis and provide detailed feedback to the team on VIP improvements

Provide remote and occasional onsite support to VIP users in Arm offices across the world as and when required

Required Skills and Experience :

Experience of IP and SoC verification with deep knowledge of verification processes and methodologies

Experience of using SystemVerilog and UVM with sound understanding of object-oriented design, data structures and algorithms

Experience in Test bench construction including VIP integration, Test bench component design and implementation

Excellent problem-solving and debugging skills and a methodical approach to solving complex hardware and software issues

Excellent communication, teamwork and networking skills

Hard-working, self-motivated with the ability to work well individually and as part of a team

“Nice To Have” Skills and Experience :

Hands-on knowledge of Arm Architecture and AMBA protocols such as CHI, AXI, DTI etc

Experience with Emulation based or Acceleration based Verification IP

Knowledge of software development techniques and workflows such as Continuous Integration

Use of Artificial Intelligence (AI) tools and assistants to aid day to day work

In Return:

You will play a vital role in the successful verification of multiple Arm products by driving efficient use of VIP in user test benches. By acting as a key link between the VIP team and the user community, you will be able to develop your technical leadership and influencing skills and become an established and recognised VIP expert within Arm.

 

#LI-SM1

 

Accommodations at Arm

At Arm, we want our people to Do Great Things. If you need support or an accommodation to Be Your Brilliant Self during the recruitment process, please email . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process.

Hybrid Working at Arm

Arm’s approach to hybrid working is designed to create a working environment that supports both high performance and personal wellbeing. We believe in bringing people together face to face to enable us to work at pace, whilst recognizing the value of flexibility. Within that framework, we empower groups/teams to determine their own hybrid working patterns, depending on the work and the team’s needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you.

Equal Opportunities at Arm

Arm is an equal opportunity employer, committed to providing an environment of mutual respect where equal opportunities are available to all applicants and colleagues. We are a diverse organization of dedicated and innovative individuals, and don’t discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.