THE RESPONSIBILITIES: Lead and manage transaction monitoring and fraud processes, including the handling of potential fraud cases and the execution of post-transaction monitoring (rule-based, periodic, and event-driven reviews) in line with internal service level guidelines. Ensure compliance with all relevant regulatory obligations and internal policies and procedures. Report any potential or actual breaches to the More ❯
SAP Security Officer (GSSO), program managers, supervisors, employees, acquisition SAPs and sensitive activities concerning SAP information, industrial and personnel security matters. Assist with developing and maintaining time-phased, event-driven Security Classification Guides (SCGs), Program Security Directives (PSDs), Technology Assessment and Control Plans (TA/CPs), and Program Protection Plans (PPPs). Administer program protection planning efforts, identify More ❯
DHS) client. The analyst would be expected to monitor key intelligence interest areas for the client, produce research-driven intelligence products, and provide rapid responses to address event-driven client information requests. Strong writing capabilities are essential. The analyst is expected to research and evaluate terrorist, state-actor, and cyber threats, and coordinate with partners in the More ❯
a SAP Personnel Vetting Official (SPO) on electron Program Access Request (ePAR) routing chains, generate CONOPs and Continuous Security Plans for review/approval. Provide initial, refresher, and event-driven training for cleared personnel on SAP processes and conduct program indoctrinations. Conduct pre-travel and post-travel briefings, and coordinate documentation with the customer. Review and support facility More ❯