

Share
As a Customer Success Engineer for Strategic Accounts, you’ll be the technical quarterback for Orca’s largest and most complex customers in Brazil and across Latin America. You’ll partner closely with executives, architects, and security teams to ensure they unlock the full value of the Orca Platform, driving adoption, expanding use cases, and shaping long-term cloud security strategies.
You’ll combine deep technical expertise with strategic relationship management, serving as the bridge between our customers and Orca’s product, engineering, and go-to-market teams. From on-site meetings to executive workshops, you’ll ensure customers achieve measurable outcomes and view Orca as a critical part of their cloud security transformation.
Bonus:
These jobs might be a good fit

Share
Essential Responsibilities:
Expected Qualifications:
Additional Responsibilities & Preferred Qualifications
Preferred Qualifications:
facing,technical work experience.
Technically minded, with a proventrack recordof adopting and masteringnew technologiesand tools.
Confident communicator – equally comfortable speaking to a merchant CEO (Chief Executive Officer), CTO (Chief Technology Officer), or development team.
Demonstrated knowledge of web technologies and can learn new languages and services like JavaScript, PHP, Java, HTTP, HTML, JSON, etc.
Troubleshooting experience with API calls (SOAP, REST,GraphQL)
Understanding of basic SQL Commands and data analysis
Prepared to be on call toassistwith out-of-businesshours
Our Benefits:
PayPal provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, pregnancy, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state, or local law. In addition, PayPal will provide reasonable accommodations for qualified individuals with disabilities. If you are unable to submit an application because of incompatible assistive technology or a disability, please contact us at
Any general requests for consideration of your skills, please
These jobs might be a good fit

Share
Essential Responsibilities:
Expected Qualifications:
Highly important requirement on language capability:
Proficient in Portuguese and Spanish and has good comms skills in English as well.
Our Benefits:
Any general requests for consideration of your skills, please
These jobs might be a good fit

Share
Your key responsibilities
In this role you will predominantly:
To qualify for the role, you must have
Ideally, you’ll also have
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
If you can demonstrate that you meet the criteria above, please contact us as soon as possible.In compliance with the requirements of the Whistleblower Protection Act, our company has established the Procedure for reporting breaches of law and undertaking appropriate follow-up actions. Any misconduct should be reported through the EY Ethics Hotline.
These jobs might be a good fit

Share
Skills and Attributes for Success
Significant working security experience and knowledge in the design, implementation, and operation of security controls in one of the following areas:
• Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment;
• Application Security - Experience with the design of security controls for multi-tier business solutions, including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture;
• Cloud Security – Technical understanding of virtualization, cloud infrastructure, and public cloud offerings, as well as experience designing security configuration and controls within cloud-based solutions in Microsoft Azure, Google GCP, Amazon AWS, and other vendors;
• Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures, including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions;
• Identity and Access Management - Experience in design and integration of identity and access management based on Active Directory and Federation technologies.
To qualify for the role, you must have experience in
Extensive experience in implementing, advising on, and consulting about security configurations across complex IT architectures, including cloud environments (primarily Microsoft's, but also including a range of IaaS, PaaS, and SaaS offerings from multiple vendors) and on-premises solutions. In-depth knowledge of IT system architecture concepts and cloud technologies, along with associated technologies such as Identity and Access Management (IAM), network security, firewalls, software development best practices, systems auditing, system hardening, and other security principles as outlined in ISO27001, OWASP, and related security standards. Proficiency in interpreting security reports (SAST and DAST) and testing outcomes for applications, providing advice on necessary corrections and security measures based on policies and non-functional requirements. A degree in Computer Science or a related field. Excellent communication skills, fluency in English (knowledge of Spanish is an advantage), and the ability to collaborate with stakeholders ranging from developers and architects to business leaders and EY's clients.
Ideally, you’ll also have
• Operational Security – Experience in defining operational models and procedures for business solutions, including the operation and maintenance of infrastructure and application security controls.
• Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, NIST CSF, FEDRAMP, CSA, and CIS Controls.
• Cloud security certifications such as AZ-300 Azure Architect Technologies.
• Product Management – Working with a broader business team on aspects of security that affect all phases, from concept to design to implementation and then operational support.
Requirements:
· Advanced degree in Computer Science or a related discipline, or equivalent work experience;
· Professional certifications such as CISSP, CCSP, CISM, or equivalent security certifications;
· Fluent in English and Spanish.
· Certifications: CISSP, CCS, CISM, or similar;
· Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:
· Previous working experience in Big 4 or big consulting firms;
· Operational Security – Experience;
· Occasional travel.
Key Responsibilities:
· This position is a leading role in designing, developing, and accessing all aspects of security for market-leading regional and global systems based primarily on Cloud technologies. As a security consultant for the regions, you will be an individual contributor capable of supporting multiple project teams operating in the latest technologies of Cloud-based, Agile developed systems, using automated deployment from CI/CD pipelines. In other words, it is not just an audit or oversight role, but one that requires detailed participation in the design, implementation, and certification of security controls across solutions. This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technologies such as IAM, network security, AI, user account management, audit and logging, and other security concepts as outlined in ISO27001/2, OWASP, and related regional security standards. Also, the successful candidate should have knowledge of 3rd party security assessments and applicability of SOC2 and SOC2 reports, and concepts of vendor risk management.
These jobs might be a good fit

Share
Our EDGE practice serves as an accelerant of TP Documentation services. In this role, you will have the opportunity to participate in TP Documentation and EY Technology and processes trainings to help develop your career through a broad scope of engagements, mentoring and formal learning.
Your key responsibilities
You’ll be heavily involved at all stages of the Transfer Pricing documentation project lifecycle, making this a high-profile opportunity to take on a wide range of responsibilities and diversify your skills and experience. It’s all about translating information from a variety of sources into quantitative and qualitative deliverables for our clients.
Skills and attributes for success
To qualify for the role you must have
What we look for
We’re interested in intellectually curious people, with the ability to adjust to change and thrive in a constantly evolving environment. You’ll need to be someone who is capable of asking the tough
questions, and independently driving their own career and learning initiatives. You’ll also need excellent organizational skills and a proven record of multitasking and working effectively across multiple projects. So, if you’re ready to contribute your big ideas and make a measurable difference right from the start, this role is for you.
What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .
These jobs might be a good fit

Share
Main Responsibilities
This Security Consultant position will play a key role in the development and implementation of all security aspects for complex global applications based on Microsoft Azure technology and, more broadly, the Microsoft technology stack. The role is primarily that of an individual contributor capable of supporting multiple project teams, including detailed participation in implementation, certification of security controls across various projects/applications. This requires knowledge of multiple IT system architectures and cloud technologies, as well as supporting technologies such as IAM, network security, firewalls, user account management, auditing and logging, and other security concepts as described in ISO27001, OWASP, and related security standards.
Skills and Attributes for Success
Significant experience in implementing and operating security controls in one of the following areas:
Agile and DevOps Methodologies – Experience as a contributing member of a balanced team in an Agile or DevOps development environment;
Application Security – Experience in designing security controls for multilayered business solutions, including application-level access and authorization management, tenancy and data isolation, encryption, and logging. Hands-on familiarity with REST APIs and microservices architecture;
Cloud Security – Technical understanding of virtualization, cloud infrastructure, and public cloud offerings, plus experience in designing configuration and security controls for cloud-based solutions in Microsoft Azure, Google GCP, Amazon AWS, and other providers;
Infrastructure Security – Experience integrating common infrastructure security technologies and solutions into business solution architectures, including identity and access management, intrusion detection and prevention, security monitoring, and data encryption solutions;
Identity and Access Management (IAM) – Experience in designing identity and access management based on Active Directory and integration with IDaaS and Federation technologies.
To qualify for the role, you must have experience in:
Extensive experience in implementing, advising, and consulting on security configurations in complex IT architectures, including cloud environments (primarily Microsoft, but also covering a variety of IaaS, PaaS, and SaaS offerings from multiple vendors) and on-premises solutions. In-depth knowledge of IT system architecture concepts and cloud technologies, along with associated technologies such as Identity and Access Management (IAM), network security, firewalls, software development best practices, system auditing, system hardening, and other security principles as described in ISO27001, OWASP, and related security standards. Proficiency in interpreting security reports (SAST and DAST) and testing results for applications, providing advice on required fixes and security measures based on policies and non-functional requirements. A degree in Computer Science or a related field. Excellent communication skills, fluency in English (Spanish knowledge is an advantage), and the ability to collaborate with stakeholders ranging from developers and architects to business leaders and EY clients.
Ideally, you will also have:
Preferred candidates will have additional experience and knowledge in one or more of the following areas:
Operational Security – Experience in defining operational models and procedures for business solutions, including operation and maintenance of infrastructure and application security controls.
Information Security Standards – Knowledge of common information security standards, such as ISO 27001/27002, NIST CSF, FEDRAMP, CSA, and CIS Controls.
Cloud Security Certifications – Such as AZ-300 Azure Architect Technologies.
Product Management – Working with broader business teams on security aspects that affect all phases, from concept to design, implementation, and then operational support.
Requirements:
Bachelor’s degree in Technology or related fields;
Experience in implementation and consulting on security configurations in complex IT architectures, including cloud environments;
Strong knowledge of IT system architecture, identity and access management, and security principles in accordance with ISO27001 and OWASP standards;
Knowledge of programming language: Python;
Advanced English for corporate/business communication.
Desirable:
Certifications: CISSP, Security+, CISA;
Spanish language skills;
Availability for occasional travel.
Key Responsibilities:
Support internal application development teams, as well as onboarding suppliers and their applications, ensuring alignment with EY security policies and international best practices;
Collaborate effectively with multiple project teams, ensuring security certification in a dynamic and constantly evolving environment;
Interpret security reports and apply corrective measures, essential to maintaining the integrity and protection of developed solutions.
These jobs might be a good fit

As a Customer Success Engineer for Strategic Accounts, you’ll be the technical quarterback for Orca’s largest and most complex customers in Brazil and across Latin America. You’ll partner closely with executives, architects, and security teams to ensure they unlock the full value of the Orca Platform, driving adoption, expanding use cases, and shaping long-term cloud security strategies.
You’ll combine deep technical expertise with strategic relationship management, serving as the bridge between our customers and Orca’s product, engineering, and go-to-market teams. From on-site meetings to executive workshops, you’ll ensure customers achieve measurable outcomes and view Orca as a critical part of their cloud security transformation.
Bonus:
These jobs might be a good fit