KYC Analyst
As part of this role, you will be expected to study and gain expert knowledge about KYC, Transaction Monitoring, AML regulations, Counter-Terrorist Financing regulations, and rigorous Customer Due Diligence compliance. This role shall conduct/review and analyze information procured from the digital channel and ensure that Know Your Customer and Customer Due Diligence for new account opening and maintenance of existing customer accounts is in compliance with local regulations as well as ING’s global procedures. They will ensure that the KYC due diligence requirements for client onboarding or renewal of existing client is complete and accurate also in timely manner as required by ING.
If you are good at:
• Carrying out background checks: collecting and monitoring all relevant documents concerning the identity of the customer, as well as gaining insight into their business, ownership structure and financial transactions
• Analyze, review and evaluate client onboarding information and documents to fulfill KYC (Know Your Clients) requirements.
• Prepare client-specific KYC related analysis as required.
• Provide reporting of KYC progress and identify roadblock for corrective actions.
• Activity check and analysis of existing documents and obtain new documents if any changes/discrepancies are observed.
• Ensure hits/alerts generated from name screening for onboarding are handled in accordance with
ING procedures and meet standards for both quality and deadlines.
If you are:
• A professional and mature individual displaying the following behaviours:
• Has high analytical skills, multitasking skills and has the ability to use a wide range of analytical tools and systems.
• Has a background/knowledge in Wholesale and Retail banking
• A candidate that has at least a Bachelor's/College Degree, Economics, Finance/Accountancy/Banking, Business Studies/Administration/Management or equivalent.
If you can:
• Conduct first line of defense name screening for customers with alerts. Able to identify false positives to be escalated to second line of defense.
• Review submitted images against ID documents and review information submitted against supporting documents uploaded (i.e. Government IDs, Proof of Address and etc.)
• Articulate and report flags for discrepancies
• Closure of flagged items