Building practical systems that reduce risk, streamline operations, and ship clean solutions.
I’m a financial services professional focused on risk intelligence and transaction monitoring, with a strong bias toward building repeatable systems that make decisions faster, clearer, and easier to defend. I like work that sits at the intersection of data, operations, and strategy, where the output is something leaders can actually use: a monitoring program, a clean risk narrative, or an automated workflow that reduces noise and improves response.
Recently my work has gone deeper into enterprise-wide exposure and country monitoring across channels like P2P, ACH, wires, ATM activity, and more. The goal is simple: understand who interacted with a given country, where the organization may be exposed, and what changes if that country’s risk profile shifts (including potential sanctions pressure).
I’ve built a repeatable country monitoring program where raw data updates daily, slicing and metric calculations run automatically in SAS, and leadership-ready summaries are distributed through macro-driven email outputs. That same dataset also feeds a Power BI workspace and app for ongoing visibility. I keep the approach flexible and stakeholder-friendly, and it’s designed with AI in mind so spinning up new country analysis can become closer to a push-button workflow over time. I also experiment with agent workflows, primarily Copilot Agents, to speed up analysis, triage, and documentation while keeping the work grounded and explainable.
Current focus: scaling repeatable country monitoring, improving signal quality, and building the data foundation needed to plug this work into an agent, so new analysis becomes faster, consistent, and closer to push-button without sacrificing rigor.
A quick snapshot of what I build with.
Hello! Some of my projects are sensitive due to the company they were built for or because it's related to threat intelligence but below you'll be able to read about some of the things I've created. Full breakdowns of previous projects and new details for new projects will continually be added in the future.
What better first project to talk about than the one that got this whole site up and running? This whole website started as some simple HTML code using Tailwind CSS as a framework. Stay tuned for when I publish a full breakdown of the project up to this point.
Most of the automation flows I have built for ingesting threat intelligence feeds are built internally and can't be shared but the diagram to the right will give you an idea of how most of them work.
Often in large enterprise environments you have several options for case management. You could create a simple SharePoint List if you're a Microsoft shop. You could use some home grown solution or maybe even use AWS with frontends, S3 buckets, Lambda functions, etc. For my most recent team we needed a bespoke solution that handles image files as the primary driver so we built our own using Microsoft solutions like Power Automate, PowerApps, Dataverse, and others.
For Fraud Threat Intelligence (FTI) Teams across the industry and in other industries too one of the main projects and constant discussion is 5 W's of threat intelligence data. Come explore some of the pros and cons and even see first hand how you and your team could do similar.
Enter your email below and I’ll follow up.
(No spam — just a reply.)