Position: Host Institution Lead — Global Risk Alliance (GRA) / Nexus Governance System
Type: Market-infrastructure hosting, controls, and operational readiness governance leadership role (non-executive; strictly non-executing)
Board: Council leaders are considered for Board nomination after joining and serving in good standing
Location: International (distributed, hybrid; host-site anchored where applicable)
Term: 3 Years
Time commitment: ~15–30 hours per month (build-year cadence; surge periods around host onboarding, audits, incidents, and controlled sessions)
Apply here: https://therisk.global/work/job/host-institution-lead-gra/
Context and Purpose
Finance-facing governance is only credible when it is hosted in environments that meet institutional-grade controls: secure handling, auditable records, resilient operations, and defensible independence. Weak hosting creates hidden risk—leakage of market-sensitive materials, inconsistent distribution, unclear retention, vendor lock-in, and “informal operations” that fail under audit or incident pressure.
The GRA Host Institution Lead ensures that designated host institutions (and any controlled environments used for governance work) are fit-for-purpose for finance-facing governance: facilities, access controls, handling posture, operational resilience, and audit readiness. The role is the primary interface between GRA governance requirements and host institutional capabilities—ensuring the hosting model is repeatable, neutral, and capable of sustaining quarterly proof cycles, controlled sessions, and high-scrutiny distribution.
This is governance—not execution. The role does not underwrite, place, broker, custody, operate markets, provide regulated advice, steer procurement, select vendors, or imply endorsement.
Key Responsibilities
- Lead host onboarding and readiness assessments: mandate alignment, control maturity, security posture, staffing, facilities, and ability to sustain governance cadence and controlled sessions.
- Define clear hosting roles and responsibilities: what the host provides, what governance provides, and what must remain outside the host perimeter to preserve independence and non-execution posture.
- Maintain hosting continuity plans: staffing redundancy, incident readiness, and minimal single points of failure.
- Implement handling posture at the host: controlled rooms, access governance, least-privilege distribution, secure collaboration tooling, and disciplined recording and publication controls.
- Ensure host personnel and systems meet confidentiality, training, and handling requirements appropriate to market-sensitive and controlled materials.
- Coordinate safe publication posture: consistent redaction and disclosure boundaries for public-safe outputs.
- Ensure auditability and records integrity in host operations: access logs, distribution logs, retention schedules, version control, and retrievable archival practice aligned to governance requirements.
- Coordinate with records/register functions to ensure artifacts are complete, stored correctly, and can survive audit scrutiny.
- Maintain evidence of controls: training records, incident logs, corrective actions, and periodic control testing.
- Enforce vendor neutrality and procurement boundary discipline in the hosting model: avoid lock-in, prevent procurement steering, and ensure governance requirements specify controls/outcomes—not products.
- Identify and mitigate third-party and concentration risks associated with hosting (cloud dependency, single vendor tooling, single facility reliance).
- Serve as trusted liaison with host leadership; build a replicable “host kit” that can be adopted across jurisdictions without fragmenting standards or controls.
- Support expansion from one host to multiple hosts while preserving interoperability, handling discipline, and consistent audit posture.
Compensation, Remuneration, and Expenses
This role is designed to be trust-maximizing and capture-resistant in a financial services context.
- Governance authority is not paid. Compensation is never linked to votes, approvals, recognition decisions, enforcement actions, standards outcomes, market outcomes, or influence. No success fees. No pay-to-approve.
- Operational workload may be compensated (where permitted). Because host readiness can involve significant build-year operational workload (onboarding, control implementation, audit readiness, continuity checks), compensation may be provided only for clearly defined operational services—scoped, time-bounded, deliverable-based, independently approved, and auditable, with conflicts safeguards.
- Expenses may be reimbursed. Reasonable, documented, pre-approved out-of-pocket expenses required for the role may be reimbursed in accordance with policy and handling requirements.
- Standing and independence apply. Continued service depends on remaining in good standing, meeting disclosure obligations, and maintaining independence consistent with integrity and conduct requirements.
Opportunities for Leaders to Join
- Build the hosting and controls spine that makes finance-facing governance defensible under audit, regulatory scrutiny, and incident conditions.
- Create a repeatable host model that reduces operational risk, leakage risk, and vendor dependence across jurisdictions.
- Operate at the intersection of handling discipline, resilience, records integrity, and neutral hosting—where institutional credibility is made or lost.
- Strong performance positions leaders for broader governance stewardship and board consideration (without implying entitlement).
Leaders Profile
We are seeking senior institutional leaders (typically 10–20+ years) with credibility across one or more of:
- Governance hosting in regulated environments (financial market infrastructure, central banks, DFIs, standards bodies, audit-grade institutions).
- Security, privacy, controls, audit/compliance, or operational resilience in high-trust settings.
- Controlled collaboration environments, secure convening, and incident readiness in distributed organizations.
- Multi-stakeholder institutional partnerships requiring neutrality and disciplined documentation.
Capabilities and Mindset
- Controls-first pragmatism: specifies outcomes, controls, and evidence—not brands or vendors.
- Strong operational judgment: anticipates failure modes and closes gaps early.
- Neutrality discipline: resists lock-in, procurement steering, and preferential access dynamics.
- Documentation rigor: produces clean hosting agreements, readiness checklists, and audit artifacts.
- Calm under pressure: can coordinate incident readiness and corrective actions without drift or panic.
Eligibility, Membership, and Independence
- Holds a primary full-time role outside the council seat and can sustain the expected cadence and surge periods.
- Willing to fully disclose relevant interests (institutional ties, procurement influence, vendor relationships) and comply with conflict-of-interest, recusal, and conduct requirements.
- Not placed in a situation where service creates unmanageable conflicts, compromises neutrality, or creates regulated-activity ambiguity.
- Accepts strict confidentiality, handling discipline, and communications integrity expectations.
- Commits to remain in good standing (participation, disclosures, and applicable contribution obligations).
Share
Facebook
X
LinkedIn
Telegram
Tumblr
Whatsapp
VK
Bluesky
Threads
Mail