Risk Data Scientist

Job description:

    • Understanding and experience with database systems.
    • Understanding and experience with machine learning algorithms.
    • Perform feature analysis.
    • Implement reinforcement learning for optimal sequential decision-making under uncertainty, on real-world problems in cybersecurity, finance, telco, and automotive applications.
    • Create AI-based malware, AML, KYC classifiers that are robust to adversarial evasion attacks and scalable to multiple players.
    • Build utility code and handle miscellaneous support tasks.
    • Conduct data preprocessing, transformation, and perform statistical analysis.
    • Documenting software projects and maintaining project documentation.
    • Working in a team environment as well as working alone.


    • Experience with Big Data, artificial intelligence, natural language processing, machine learning and/or deep learning.
    • Experience with one or more deep learning libraries such as TensorFlow, Keras, Caffe, FLUX, or Theano, and experience with one or more deep reinforcement learning libraries such as rllab, keras-rl, or OpenAI Gym.
    • Python programming skills with two (2) years or more of Python experience.
    • Good verbal and written communication skills.
    • Knowledge of professional software engineering practices and best practices for the full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations.
    • Ph. D. in operations research, applied statistics, data mining, machine learning, physics or a related quantitative discipline.

Tools we use

    • Confluence
    • JIRA
    • Spark
    • Azure
    • Python
    • Keras
    • Scikit-learn
    • Bit bucket
    • Jupyter Notebook
    • Scala
    • MonetdB
    • OrientDB

Nice to haves

    • Experience in some subset of the following: Java, R, Python, SQL, Scala, Spark.
    • Deep understanding of statistical and predictive modeling concepts, machine-learning approaches, clustering and classification techniques, supervised learning, recommendation and optimization algorithms.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

2019 Perkins Coie 1L Privacy & Data Security F...
Global Data Threat Analyst
Lynnwood, WA Crane Co.
SAP HANA Data Modeling
Seattle, WA Applexus Technologies