Elements and Performance Criteria
- Identify and analyse global risks and vulnerabilities
- Identify a range of ML/TF risks and vulnerabilities potentially impacting on the organisation including cross border transactions
- Research, analyse and assess types of unusual activity relevant to the industry and/or organisation
- Explore a range of investigative techniques and analytical tools to detect suspicious matters relating to ML/TF
- Assess risk profile of different organisational portfolios and determine allocation of resources to monitor transactions
- Evaluate approaches for monitoring transactions appropriate for identified risks and vulnerabilities
- Review analytical tools and reporting systems
- Analyse the capabilities of the organisation’s manual and automatic systems and assess the appropriateness for different risk scenarios
- Evaluate the effectiveness of the organisation’s automated transaction monitoring software in detecting unusual transaction activity
- Review training programs to encourage staff to use intuition in further investigating unusual matters
- Review and evaluate organisational processes for triggering and monitoring alerts and creating suspicious matter reports
- Analyse the process and organisational procedures for evidence based investigations
- Evaluate the processes and procedures for performing periodic effectiveness monitoring
- Monitor the performance of analytical tools and reporting systems
- Manage the investigation of alerts and generation of suspicious matter reports
- Investigate alerts that have been triggered based on detection rules and prioritise those with the highest risk score
- Analyse alerts to determine if activity requires further investigation
- Ensure organisational procedures are followed for initiating an investigative activity or case
- Analyse and review processes related to investigated cases where no action was taken and cases escalated to a suspicious matter report level to determine whether the actions taken were appropriate
- Implement effective feedback loops to ensure continuous improvement and training of staff
- Analyse and report suspicious transactions
- Analyse trends in data related to alerts, activities investigated and suspicious matters reported to determine the effectiveness of reporting systems
- Oversee the provision of feedback to relevant staff on decisions regarding reports into suspicious transactions and activities
- Prepare internal reports on suspicious transactions and activities according to organisational procedures
- Prepare reports on suspicious transactions and activities for regulators, including cross border regulators, following required reporting formats
- Manage sensitivities and protocols relating to privacy and confidentiality of information when working with multiple regulators or reporting bodies