To provide proactive and reactive strategic and operational intelligence reports to domestic and international stakeholders in order to combat money laundering and terrorist financing
EDUCATION, SKILLS AND EXPERIENCE
- University Degree with specialisation in Computer or Digital Forensics.
- Working towards Postgraduate qualification in a related field such as computer science, information technology, cybersecurity, public management or criminal justice will be advantageous.
- Six years' experience in cybercrime or cybersecurity investigations relevant field.
- Six years’ experience with intelligence analysis tools, methods and the intelligence life cycle
- Skills and knowledge on Blockchain, an Ethereum Java or Python Developer
- Proven ability to understand and explain the behaviours of different types of complex organisations, from criminal syndicates to financial enterprises.
- Certifications in intelligence analysis or specific OSINT tools (i2 Analyst Notebook, i2 Base Essentials, Maltego or TRM Labs) will be advantageous
- Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their financial intelligence operations.
- Familiarity with cyber threats, defences, motivations and techniques.
- Understanding of cybersecurity principles, threats, and defences, especially related to blockchain applications.
- Must have advanced skills to deploy Open-Source technology from Open-Source Software Platforms (Linux).
- Must have the ability to conduct thorough online research and evaluate the credibility of information sources.
- Must be able to lead a team through project management techniques.
- Cyber Security - Understand different operating systems and network security concepts.
- Internet capabilities - Understand Domain Name Services (DNS), Transmission.
- Control Protocols over the Internet Protocol (TCP / IP), Small Mail Transfer Protocol (SMTP), IMAP, Secure Shell (SSH), Hyper Text Transfer Protocol Secure (HTTPS) and Secure Sockets Layer (SSL).
- Working knowledge of how malicious code operates and technical vulnerabilities are exploited.
- Understand the tactics, tools and procedures used by cyber criminals, especially the dark web and The Union Ring network.
- Produces timely written recommendations and assessments.
- Knowledge in foreign languages is a plus.
KEY PERFORMANCE AREAS
Identify user specifications for the acquisition of technical equipment needed to gather and analyse open-source material relevant to the production of financial intelligence.Use specialised technology from various sources including crypto asset blockchains, the internet, dark web, deep web, social media platforms and any other place authorised by the FIC to gather the information.Determine, setup, apply and maintain technical equipment to gather open-source material as directed by the FIC over a short - to long term duration.Deploy suitable measures in the information gathering cycle to ensure FIC is not contravening section 60(1) when executing its functions under section 4 (a) of the Act.Ensure compliance to relevant legislation when gathering information from open source and blockchainsDevelop and implement SOPs to gather and analyse open-source material relevant to the production of financial intelligenceAnalyse data and produce reports that are relevant to the production of timely financial intelligence.Produce complex reports which contain possible inferences and conclusions for medium term planning purposesLead briefings and presentations with internal and external FIC stakeholders and clientsDisseminate information requested (once it has been approved) as per agreed timelines and specifications.Ensure aggregation and utilisation of relevant technical equipmentPerform quality assurance tests for ensuring data integrity and quality.Resolve technical equipment’s problems, queries and error reports in an accurate and timely mannerReview the production of technical assessments or forecasts from open-source information and blockchain platforms concerning AML / CFT or proceeds of crime.Perform technical surveillance countermeasures for the FIC.Support information gathering requirements within the departmentAct as a lead assigning and reviewing work to othersConduct training as and when requiredPerform any other ad hoc duties as assigned