Job Description
Risk Control Strategies & User Behavior Analysis
- Identify abnormal trading behaviors such as volume manipulation, arbitrage, "scalping" tactics, or irregular profit/loss patterns. Develop detection and mitigation strategies.
- Audit platform orders and fund flows to ensure secure on-chain/off-chain transactions.
- Design and optimize scripts, anomaly detection rules, and risk response workflows.
- Evaluate proxy user profiles to incentivize high-value agents while penalizing low contributors.
Liquidity & Order Book Analytics
- Monitor CoinMarketCap/CryptoRank listings to maintain token visibility on key indexes.
- Assess liquidity metrics, order book patterns, and counterparty structures to detect potential market manipulation.
- Develop hedging strategies for large-cap tokens and futures position alerts.
- Track price deviations, abnormal slippage, or liquidity gaps to prevent instant liquidation risks.
Data-Driven Strategy Development
- Build real-time risk dashboards with key indicators for rapid user profiling.
- Leverage multidimensional data (trading frequency, capital efficiency, leverage ratios) for behavioral scoring.
- Detect bonus/commission arbitrage loopholes and establish countermeasures.
Cross-Team Collaboration
- Partner with Compliance/Product Teams to implement risk frameworks.
- Design tiered user restriction protocols including blacklisting criteria.
Qualifications
✅ 5+ years in crypto exchange risk management, liquidity analytics, or trading strategy roles.
✅ Deep CEX expertise in matching engines, derivatives risk models, and broker systems.
✅ Proficient in Python/SQL/Tableau for predictive modeling and visualization.
✅ Market microstructure intuition with hands-on arbitrage analysis experience.
✅ Flexibility for shift rotations in fast-paced environments.
FAQs
Q: What tools does this role typically use?
A: Expect Python for algorithmic detection, SQL for querying trading databases, and Tableau for visualizing risk trends.
Q: How does this position handle emerging threats like DeFi exploits?
A: Strategies evolve via cross-team threat intelligence sharing, incorporating on-chain forensic insights.
Q: Is remote work location-restricted?
A: Currently open globally, though timezone alignment with key markets is preferred.
👉 Explore cutting-edge risk frameworks
👉 See how algorithmic auditing works