SlideShare a Scribd company logo
JANICE SARNOWSKI
15 Light Street 617-875-9781
Lynn, MA 01905 jsarnowski@msn.com
PROFESSIONA L PROFILE
 25+ years of Financial Services experience in risk management, physical security, customer information security, vendor
management, fraud, retail operations and deposit operations.
 Proven ability in developing and implementing risk management frameworks, policies, programs and systems.
 Significant experience spear-heading risk management initiatives working with all business lines to ensure compliance with risk
mitigation.
 Experienced in Banking Core Applications, Real-time Fraud Monitoring Applications, Risk Assessment Applications, Vendor Due
Diligence Applications, Online Banking and New Account Applications, Remote Deposit Capture Applications, and Microsoft
Office Applications.
 MA Bankers Security Committee member.
COM M ITTEE PARTICIPATION
Compliance Enterprise Risk Change Advisory Board
IT Steering BSA/AML/Fraud Incident Response
Verafin User Community WolfPAC User Group Miser User Group
Bankers Toolbox Community MA Bankers Security Committee AML/BSA SAR Committee
PROJECT M ANAGEM ENT IM PLEM ENTATIONS
Fraud/BSA/AML Monitoring Software In-House Banking Core Retail & Corporate Online Banking
Remote Deposit Capture Bill Payment Services Online Account Opening
Positive Pay Software Branch Capture Mobile Wallet
Branch Openings Document Imaging Systems Teller /Platform Systems
PROFESSIONAL EXPERIENCE
Georgetown Bank, Georgetown, MA
AVP, Security Officer, Risk Manager, BSA Analyst (May 2016 – Present)
 Oversee all aspects of the organization-wide Security, AML/BSA, and Risk Programs. Including but not limited to:
o Physical Security
o Employee Access Control Management
o Vendor Management
o AML/BSA Alert Monitoring and Resolution
o Suspicious Activity and Fraud Monitoring
o Customer High Risk Monitoring and Reporting
o CTR and SAR Filings
o 314A Filing
o OFAC
 Responsible for assisting the VP of Compliance in the development, design and governance of all Bank Security and AML/BSA
regulatory compliance related processes, policies and procedures.
 Ensure sufficient internal controls are in place to promote an effective Security and AML/BSA control environment.
 Perform quarterly high risk assessments to identify levels of risk exposure to the Bank.
 Develop and deliver Security and AML/BSA training to business lines.
 Perform annual review of all Application employee access across all business lines to ensure compliance with Bank Policy.
 Coordinate and oversee an effective Bank Secrecy Act/Anti-Money Laundering/OFAC Compliance Program that is in line with
current industry best practices, regulatory guidance and requirements.
 Enhance, develop, implement and administer the BSA/AML/OFAC/USA Patriot Act monitoring systems to ensure that
appropriate parameters are in place to identify suspicious and/or fraudulent activity.
 Establish and maintain an effective CDD/EDD risk rating and monitoring program to include initial and ongoing assessments,
and review and analysis of unusual/suspicious account activity.
 Establish and maintain appropriate SAR investigation, review and reporting processes that promote consistent decisions;
adequate investigation and research; and complete and detailed documentation.
 Responsible for ensuring all required regulatory reporting is conducted in a timely, accurate, and compliant manner, including
the filing of Currency Transaction Reports (CTRs) and Suspicious Activity Reports (SARs) to FinCEN, as well as, FinCEN
314(a) and 314(b) procedures and reporting.
 Act as internal Security and AML/BSA contact for Federal and State examinations and internal and external independent
auditors. Participate in response to exam and audit concerns and provide corrective action of all Security, AML/BSA related
compliance deficiencies or violations.
 Focus appropriate attention on significant 3d party relationships, assign ownership for those vendor relationships, and ensure
the proper degree of due diligence oversight is exercised both before entering into a contract and throughout the entire term of
the arrangement.
 Make recommendations to the Compliance Officer and senior management when and where appropriate.
 Maintain proficient knowledge of all applicable rules, regulations and regulatory guidance.
Radius Bank, Boston, MA
VP, Security, Information Security, Vendor Management and Interim BSA Officer (2010- May 2016)
 Oversee all aspects of the organization-wide Security, Information Security and Vendor Programs. Including but not limited to:
o Risk Management
o Vendor Management
o Physical Security
o Fraud Monitoring and Alert Resolution
o Employee Access Control Management
o Application Access Control Management
o Social Engineering
o Summons/Subpoena Processing
o BSA Officer
 Developed a formal written information security program that details the internal methods, procedures, and controls used to
protect nonpublic personal information of the bank’s customers. As part of the program, assist business line owners in
performing periodic risk assessments to determine potential areas of concern regarding information security.
 Work with business lines to identify business processes, functions and technologies that contain, store and transmit customer
information and provide guidance in risk assessing each process via the WolfPAC Risk Management Application.
 Manage vendors through the entire life cycle beginning with vendor risk assessment, evaluation and selection through contract
expiration and retirement via WolfPAC.
 Focus appropriate attention on significant 3d party relationships, assign ownership for those vendor relationships, and ensure
the proper degree of due diligence oversight is exercised both before entering into a contract and throughout the entire term of
the arrangement.
 Manage development and implementation of updated security protocols to address lapses created by advances in technology
and criminal strategies.
 Create new loss control and anti-compromise measures to protect physical and information assets.
 Perform daily review of fraud alerts (new account, debit, remote banking, stolen check, kiting) via Verafin’s FRAML Application
and working with business lines to investigate transactions that are suspicious in nature. Collaborate closely with BSA Officer in
this context, reviewing suspicious activity reviews when the BSA officer is away.
 Collaborate with Human Resources, IT, and application administrators to provide/remove access for onboarding/terminating
employees.
 Perform annual review of all Application employee access across all business lines to ensure compliance with Bank Policy.
 Coordinate social engineering training and testing for all new employees and make recommendations to the Chief Risk Officer
for remediation, if needed.
 Log incoming summons/subpoenas and oversee research to ensure required documents are forwarded on a timely basis.
 Generate robust quarterly fraud, information security and vendor reports for senior management, board members and
examiners.
 Developed training materials for BOD.
 Coordinate and assist in the administration of independent, state and federal regulator and auditor examinations and reviews.
 Make recommendations to the Senior Compliance Officer and senior management when and where appropriate.
 Maintain proficient knowledge of all applicable rules, regulations and regulatory guidance.
 Led BSA program again 2010 through 2012.
 Participate in bi-weekly meetings with BSA, AML & Fraud Risk Committee to discuss potential risks and other compliance
related issues.
VP, Deposit Operations Officer (1996-2010)
 Administered all aspects of domestic and international wire transfer processing from initiation to settlement.
 Implemented and oversaw an ACH origination risk assessment, underwriting and approval program.
 Supervised all aspects of ATM Card Management, Settlement and Deployment processes.
 Standardized parameter administration for Core Banking Systems.
 Designed and enhanced policy and procedures to meet bank objectives.
 Managed retail and corporate online banking, new account, and bill payment systems.
 Assisted in the implementation and oversaw a retail and corporate remote deposit capture origination risk assessment and
approval program.
 Collaborated with Human Resources on the hiring process for all operations personal including creation of job descriptions,
goal setting and performance evaluations
 Supervised operations employees creating a safe environment to gain the necessary motivation, autonomy and self-awareness to
successfully move to the next level of development.
 BSA Officer until 2000
AVP, Retail Banking Officer (1992 -1996)
 Oversee all aspects of Branch Operations including Security and BSA/AML monitoring responsibilities.
 BSA Officer
 Designed policies and procedures to meet the Bank’s objectives.
 Developed cross sell and incentive programs to engage employees in meeting sales initiatives.
 Monitored all branch activity for Customer Identification Program (CIP) compliance.
 Created a Missing and Deficiency Log to assist in remediation of potential CIP errors.
 Participated in Core Release updates including testing, training, creating procedures and implementation.
 Performed monthly branch audits of critical functions.

More Related Content

What's hot

Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
EC-Council
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
SALIH AHMED ISLAM
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
NICSA
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
Naveen Grover
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
Yulias Sihombing, Ak, MAk, CIA
 
AML and CTF 12-13 May 2016
AML and CTF 12-13 May 2016AML and CTF 12-13 May 2016
AML and CTF 12-13 May 2016
Damanpreet Chawla
 
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler, MBA CPA
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
Goutama Bachtiar
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
Frederic Girardeau-Montaut
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
Deepak Bansal, CPA CISSP
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
NICSA
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
Charles Steve
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
G3 intelligence Ltd
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
salman butt
 
Significance of a Robust AML Risk Assessment Process for FIs and RIAs
Significance of a Robust AML Risk Assessment Process for  FIs and RIAsSignificance of a Robust AML Risk Assessment Process for  FIs and RIAs
Significance of a Robust AML Risk Assessment Process for FIs and RIAs
AML Audit
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
Goutama Bachtiar
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
Colleen Beck-Domanico
 

What's hot (19)

Third Party Risk Management
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Third Party Risk Management Introduction
Third Party Risk Management IntroductionThird Party Risk Management Introduction
Third Party Risk Management Introduction
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
AML and CTF 12-13 May 2016
AML and CTF 12-13 May 2016AML and CTF 12-13 May 2016
AML and CTF 12-13 May 2016
 
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance RisksHernan Huwyler Corporate Risk Assesstment Compliance Risks
Hernan Huwyler Corporate Risk Assesstment Compliance Risks
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Significance of a Robust AML Risk Assessment Process for FIs and RIAs
Significance of a Robust AML Risk Assessment Process for  FIs and RIAsSignificance of a Robust AML Risk Assessment Process for  FIs and RIAs
Significance of a Robust AML Risk Assessment Process for FIs and RIAs
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
 

Similar to J. Sarnowski Resume v2

Mohamed Abdelhalim CV
Mohamed Abdelhalim CVMohamed Abdelhalim CV
Mohamed Abdelhalim CV
Mohamed Abdelhalim
 
IBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CVIBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CV
IBIRONKEABEBI FAGBEMI
 
Dennis Batdorf resume
Dennis Batdorf resumeDennis Batdorf resume
Dennis Batdorf resume
Dennis Batdorf
 
Reuben L Stewart Risk Manager 2015
Reuben L Stewart Risk Manager 2015Reuben L Stewart Risk Manager 2015
Reuben L Stewart Risk Manager 2015
Reuben Stewart
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
Abhishek Bali
 
Resume - Snehal Thakur
Resume - Snehal ThakurResume - Snehal Thakur
Resume - Snehal Thakur
Snehal Thakur (ACAMS)
 
Fredrick 14012016
Fredrick 14012016Fredrick 14012016
Fredrick 14012016
Fredrick Anthony
 
Fredrick_14012016
Fredrick_14012016Fredrick_14012016
Fredrick_14012016
Fredrick Anthony
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Sarah George
 
Rajesh Singh- Resume
Rajesh Singh- ResumeRajesh Singh- Resume
Rajesh Singh- Resume
Rajesh Singh
 
Risk and controls cv
Risk and controls cvRisk and controls cv
Risk and controls cv
Dior Ndiaye
 
Ihde Resume
Ihde ResumeIhde Resume
Ihde Resume
Ed Ihde
 
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud ControlsCommercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Suvendu Ganguli
 
Resume - Apeksha Mehta
Resume - Apeksha MehtaResume - Apeksha Mehta
Resume - Apeksha Mehta
Apeksha Mehta
 
abhishek singh cv
abhishek singh cvabhishek singh cv
abhishek singh cv
Abhishek Singh
 
rmarshall_pm
rmarshall_pmrmarshall_pm
rmarshall_pm
Roosevelt Marshall
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
Eric Young
 
Resume
ResumeResume
M gres dec2016
M gres dec2016M gres dec2016
M gres dec2016
Marcus Germain
 
Jojy New CV 2016
Jojy New CV 2016Jojy New CV 2016
Jojy New CV 2016
Jojy John
 

Similar to J. Sarnowski Resume v2 (20)

Mohamed Abdelhalim CV
Mohamed Abdelhalim CVMohamed Abdelhalim CV
Mohamed Abdelhalim CV
 
IBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CVIBIRONKE_FAGBEMI_CV
IBIRONKE_FAGBEMI_CV
 
Dennis Batdorf resume
Dennis Batdorf resumeDennis Batdorf resume
Dennis Batdorf resume
 
Reuben L Stewart Risk Manager 2015
Reuben L Stewart Risk Manager 2015Reuben L Stewart Risk Manager 2015
Reuben L Stewart Risk Manager 2015
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
Resume - Snehal Thakur
Resume - Snehal ThakurResume - Snehal Thakur
Resume - Snehal Thakur
 
Fredrick 14012016
Fredrick 14012016Fredrick 14012016
Fredrick 14012016
 
Fredrick_14012016
Fredrick_14012016Fredrick_14012016
Fredrick_14012016
 
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML InvestigationsSuspicious Activities Reports, Perceptions and Reality in AML Investigations
Suspicious Activities Reports, Perceptions and Reality in AML Investigations
 
Rajesh Singh- Resume
Rajesh Singh- ResumeRajesh Singh- Resume
Rajesh Singh- Resume
 
Risk and controls cv
Risk and controls cvRisk and controls cv
Risk and controls cv
 
Ihde Resume
Ihde ResumeIhde Resume
Ihde Resume
 
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud ControlsCommercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
Commercial Banking KYC, Trade-Based Money-Laundering, Sanctions & Fraud Controls
 
Resume - Apeksha Mehta
Resume - Apeksha MehtaResume - Apeksha Mehta
Resume - Apeksha Mehta
 
abhishek singh cv
abhishek singh cvabhishek singh cv
abhishek singh cv
 
rmarshall_pm
rmarshall_pmrmarshall_pm
rmarshall_pm
 
AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2AML white paper_EN_4Feb2015v2
AML white paper_EN_4Feb2015v2
 
Resume
ResumeResume
Resume
 
M gres dec2016
M gres dec2016M gres dec2016
M gres dec2016
 
Jojy New CV 2016
Jojy New CV 2016Jojy New CV 2016
Jojy New CV 2016
 

J. Sarnowski Resume v2

  • 1. JANICE SARNOWSKI 15 Light Street 617-875-9781 Lynn, MA 01905 jsarnowski@msn.com PROFESSIONA L PROFILE  25+ years of Financial Services experience in risk management, physical security, customer information security, vendor management, fraud, retail operations and deposit operations.  Proven ability in developing and implementing risk management frameworks, policies, programs and systems.  Significant experience spear-heading risk management initiatives working with all business lines to ensure compliance with risk mitigation.  Experienced in Banking Core Applications, Real-time Fraud Monitoring Applications, Risk Assessment Applications, Vendor Due Diligence Applications, Online Banking and New Account Applications, Remote Deposit Capture Applications, and Microsoft Office Applications.  MA Bankers Security Committee member. COM M ITTEE PARTICIPATION Compliance Enterprise Risk Change Advisory Board IT Steering BSA/AML/Fraud Incident Response Verafin User Community WolfPAC User Group Miser User Group Bankers Toolbox Community MA Bankers Security Committee AML/BSA SAR Committee PROJECT M ANAGEM ENT IM PLEM ENTATIONS Fraud/BSA/AML Monitoring Software In-House Banking Core Retail & Corporate Online Banking Remote Deposit Capture Bill Payment Services Online Account Opening Positive Pay Software Branch Capture Mobile Wallet Branch Openings Document Imaging Systems Teller /Platform Systems PROFESSIONAL EXPERIENCE Georgetown Bank, Georgetown, MA AVP, Security Officer, Risk Manager, BSA Analyst (May 2016 – Present)  Oversee all aspects of the organization-wide Security, AML/BSA, and Risk Programs. Including but not limited to: o Physical Security o Employee Access Control Management o Vendor Management o AML/BSA Alert Monitoring and Resolution o Suspicious Activity and Fraud Monitoring o Customer High Risk Monitoring and Reporting o CTR and SAR Filings o 314A Filing o OFAC  Responsible for assisting the VP of Compliance in the development, design and governance of all Bank Security and AML/BSA regulatory compliance related processes, policies and procedures.  Ensure sufficient internal controls are in place to promote an effective Security and AML/BSA control environment.  Perform quarterly high risk assessments to identify levels of risk exposure to the Bank.  Develop and deliver Security and AML/BSA training to business lines.  Perform annual review of all Application employee access across all business lines to ensure compliance with Bank Policy.  Coordinate and oversee an effective Bank Secrecy Act/Anti-Money Laundering/OFAC Compliance Program that is in line with current industry best practices, regulatory guidance and requirements.  Enhance, develop, implement and administer the BSA/AML/OFAC/USA Patriot Act monitoring systems to ensure that appropriate parameters are in place to identify suspicious and/or fraudulent activity.  Establish and maintain an effective CDD/EDD risk rating and monitoring program to include initial and ongoing assessments, and review and analysis of unusual/suspicious account activity.  Establish and maintain appropriate SAR investigation, review and reporting processes that promote consistent decisions; adequate investigation and research; and complete and detailed documentation.  Responsible for ensuring all required regulatory reporting is conducted in a timely, accurate, and compliant manner, including the filing of Currency Transaction Reports (CTRs) and Suspicious Activity Reports (SARs) to FinCEN, as well as, FinCEN 314(a) and 314(b) procedures and reporting.
  • 2.  Act as internal Security and AML/BSA contact for Federal and State examinations and internal and external independent auditors. Participate in response to exam and audit concerns and provide corrective action of all Security, AML/BSA related compliance deficiencies or violations.  Focus appropriate attention on significant 3d party relationships, assign ownership for those vendor relationships, and ensure the proper degree of due diligence oversight is exercised both before entering into a contract and throughout the entire term of the arrangement.  Make recommendations to the Compliance Officer and senior management when and where appropriate.  Maintain proficient knowledge of all applicable rules, regulations and regulatory guidance. Radius Bank, Boston, MA VP, Security, Information Security, Vendor Management and Interim BSA Officer (2010- May 2016)  Oversee all aspects of the organization-wide Security, Information Security and Vendor Programs. Including but not limited to: o Risk Management o Vendor Management o Physical Security o Fraud Monitoring and Alert Resolution o Employee Access Control Management o Application Access Control Management o Social Engineering o Summons/Subpoena Processing o BSA Officer  Developed a formal written information security program that details the internal methods, procedures, and controls used to protect nonpublic personal information of the bank’s customers. As part of the program, assist business line owners in performing periodic risk assessments to determine potential areas of concern regarding information security.  Work with business lines to identify business processes, functions and technologies that contain, store and transmit customer information and provide guidance in risk assessing each process via the WolfPAC Risk Management Application.  Manage vendors through the entire life cycle beginning with vendor risk assessment, evaluation and selection through contract expiration and retirement via WolfPAC.  Focus appropriate attention on significant 3d party relationships, assign ownership for those vendor relationships, and ensure the proper degree of due diligence oversight is exercised both before entering into a contract and throughout the entire term of the arrangement.  Manage development and implementation of updated security protocols to address lapses created by advances in technology and criminal strategies.  Create new loss control and anti-compromise measures to protect physical and information assets.  Perform daily review of fraud alerts (new account, debit, remote banking, stolen check, kiting) via Verafin’s FRAML Application and working with business lines to investigate transactions that are suspicious in nature. Collaborate closely with BSA Officer in this context, reviewing suspicious activity reviews when the BSA officer is away.  Collaborate with Human Resources, IT, and application administrators to provide/remove access for onboarding/terminating employees.  Perform annual review of all Application employee access across all business lines to ensure compliance with Bank Policy.  Coordinate social engineering training and testing for all new employees and make recommendations to the Chief Risk Officer for remediation, if needed.  Log incoming summons/subpoenas and oversee research to ensure required documents are forwarded on a timely basis.  Generate robust quarterly fraud, information security and vendor reports for senior management, board members and examiners.  Developed training materials for BOD.  Coordinate and assist in the administration of independent, state and federal regulator and auditor examinations and reviews.  Make recommendations to the Senior Compliance Officer and senior management when and where appropriate.  Maintain proficient knowledge of all applicable rules, regulations and regulatory guidance.  Led BSA program again 2010 through 2012.  Participate in bi-weekly meetings with BSA, AML & Fraud Risk Committee to discuss potential risks and other compliance related issues. VP, Deposit Operations Officer (1996-2010)  Administered all aspects of domestic and international wire transfer processing from initiation to settlement.  Implemented and oversaw an ACH origination risk assessment, underwriting and approval program.  Supervised all aspects of ATM Card Management, Settlement and Deployment processes.  Standardized parameter administration for Core Banking Systems.  Designed and enhanced policy and procedures to meet bank objectives.  Managed retail and corporate online banking, new account, and bill payment systems.
  • 3.  Assisted in the implementation and oversaw a retail and corporate remote deposit capture origination risk assessment and approval program.  Collaborated with Human Resources on the hiring process for all operations personal including creation of job descriptions, goal setting and performance evaluations  Supervised operations employees creating a safe environment to gain the necessary motivation, autonomy and self-awareness to successfully move to the next level of development.  BSA Officer until 2000 AVP, Retail Banking Officer (1992 -1996)  Oversee all aspects of Branch Operations including Security and BSA/AML monitoring responsibilities.  BSA Officer  Designed policies and procedures to meet the Bank’s objectives.  Developed cross sell and incentive programs to engage employees in meeting sales initiatives.  Monitored all branch activity for Customer Identification Program (CIP) compliance.  Created a Missing and Deficiency Log to assist in remediation of potential CIP errors.  Participated in Core Release updates including testing, training, creating procedures and implementation.  Performed monthly branch audits of critical functions.