Support the proactive identification of strategic networks, state and non-state actors utilizing cyber-enabled methods in the conduct of financial crime, including but not limited to money laundering, terrorist financing, human trafficking, financial fraud, and sanctions evasion through analysis of internal, surface web, deep/dark web (DDW), subscription and social media sources, in collaboration with external stakeholders including research institutions, industry partners, law enforcement, and government agencies. Leverage business analytics, geospatial intelligence, link analysis, and cybercrime expertise to reduce risk exposure to current and emerging threats
* Identify potentially suspicious activity, cyber-enabled financial crime, and extant or emerging cyber-enabled threats, and recommend appropriate remediation to FCC Management, Group, or applicable Governance bodies. * Conduct detailed, thorough reviews based on cyberthreat intelligence to determine scope and depth of suspicious activity. * Integrate cyber threat intelligence with transactional review to identify and highlight potentially suspicious activity enabled by cyber methods. * Draw conclusions and assessments independently and in collaboration with industry partners and based on the findings of research and reviews. * Make recommendations to FCC senior leadership regarding actions to address identified potential cyber-enabled financial crime risks.
Risk * Ensure full understanding of the risk and control environment in area of responsibility. Governance * Deliver 'effective governance'; challenge fellow executives effectively; and work with any local regulators in an open and cooperative manner.
Regulatory & Business Conduct * Display exemplary conduct and live by the Group's Values and Code of Conduct. * Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. * Embed the Group's values and code of conduct to ensure that adherence with the highest standards of ethics, and compliance with relevant policies, processes and regulations among employees form part of the culture. COMPETENCIES (KNOWLEDGE & SKILLS): Technical Competencies Execute Compliance Governance, Frameworks and Models (Advanced) * Ability to understand AML/CTF-related laws, regulations, policies, procedures and standards; familiarity with trends and threats in Bank primary areas of operation * Awareness of cybersecurity, particularly related to financial crime, including regulatory trends and current threats. Software, Applications, Database and Research (Advanced) * Excel, Word, PowerPoint and OneNote; ability to conduct spreadsheet data-management and analysis; research documentation, and construction and delivery of presentations * Ability to convey technical subjects to a broad audience, including proficiency in business writing, research citation methodologies, and oral presentation skills * Knowledge of one or more of the following: business analytics applications (i.e. Tableau, Oracle, Power BI, etc.), link analysis (i.e. Analyst's Notebook, Maltego), and geospatial tools (i.e. ArcGIS) Intelligence Research (Advanced) * Ability to manage data mining and aggregation, conduct complex analytics, and produce non-technical outputs. * Ability to assess complex, ambiguous fact patterns, evaluate cyber-enabled financial crime scenarios, and develop mitigation strategies in concert with fellow FCIU and Group members. Cybersecurity * Ability to leverage expertise in cyber threat landscape to proactively identify cyber-enabled financial crime.
Education, Experience and Accreditation * 5 - 7 years of financial services, intelligence or law enforcement intelligence analytic support with demonstrated success and increasing responsibilities. * Cybersecurity certification indicating baseline expertise in information security, such as CompTIA Security+, CompTIA Network+, GIAC GSEC or equivalent OR at least two years of experience working in information security, such as Security Operations Center, Incident Response or Incident Handling, or Cyber Threat Intelligence / Surveillance * ACAMS certification or equivalent preferred (required within one year of hiring). * Bachelor's degree in finance, accounting, intelligence or information security from an accredited institution, or equivalent.