Client
A UK fintech payments startup
Year
2023
Engagement
6 months
Industry
FinTech
01
A UK fintech startup had built something genuinely impressive: a B2B payment platform connecting 400+ SMEs to their banking rails, processing a rapidly growing volume of transactions. The technical problem was that they'd built it like a startup — a single Node.js application on a £180/month VPS, with payment state stored in a SQLite database, deployed by SSHing into the server and running git pull. For 18 months it had worked well enough. Then they landed their first enterprise client — a facilities management company routing £1.2M/month through the platform — and the architecture began to visibly strain. Three outages in six weeks, each costing hours of failed transactions that had to be manually reconciled. Their FCA Electronic Money Institution licence application was already in progress, and the regulator's technical questionnaire was asking questions their current architecture couldn't honestly answer: How do you ensure idempotency in payment processing? Describe your disaster recovery procedures. What is your data segregation model for client funds? They came to us nine months before their EMI licence renewal deadline with two parallel mandates: make the platform reliable enough to retain the enterprise client, and make it auditable enough to satisfy the FCA.
02
We designed and built a microservices payment architecture from scratch alongside the existing platform, migrated transaction processing with zero data loss, and produced the FCA technical documentation as a first-class deliverable alongside the code. The architecture was designed to answer the regulator's questions before they were asked.
03
10M+
daily transactions handled at peak
99.99%
uptime in the 12 months post-launch
0
manual reconciliations required since go-live (was 15–20/week)
Pass
FCA technical audit — first attempt, zero remediation requests
340ms
average payment processing latency (was 2.1s)
3×
transaction volume growth absorbed without architecture changes
04
| Services | Node.js, TypeScript, NestJS microservices |
| Messaging | AWS SQS/SNS, event sourcing pattern |
| Database | PostgreSQL 15, Redis (idempotency keys, rate limiting) |
| Infrastructure | AWS ECS Fargate, RDS Multi-AZ, VPC private subnets |
| Security | AWS KMS encryption, WAF, mTLS between services, Secrets Manager |
| Compliance | Full audit log, AML screening hooks, client fund segregation |
| Monitoring | Datadog APM, PagerDuty, custom payment success dashboards |
| CI/CD | GitHub Actions, Docker, automated blue-green deployments |
Client Feedback
“We handed Vanguard our FCA questionnaire on day one and said 'the architecture needs to answer these questions.' They treated regulatory compliance as a product requirement, not an afterthought. We passed the FCA technical audit first attempt — our compliance lawyer said she'd never seen that before. The enterprise client that nearly churned over the outages is now our largest account.”
Tell us what you're working with. We'll be direct about what's possible and what it will take.