v.2026.q3

The systems
modern businesses
depend on.

A small senior firm that designs, builds, and runs custom applications, cloud platforms, data & AI tooling, security & governance technology, and the integrations that hold a modern enterprise together — engineered to be defensible in a board meeting, not just demoed in a sprint review.

ISO 27001 controls NDPR-aligned Customer-managed keys Audit-grade evidence
~/architecture/reference-template.svg SAMPLE
EDGE PLATFORM DATA CONTROL Applications product · internal tools bespoke · documented Cloud Platform landing zones · IaC multi-region · FinOps Integration Spine event mesh · API gateway event-driven · idempotent Data & AI warehouse · agents eval harness on day one Security & Governance iam · siem · grc policy-as-code · evidence targets we engineer toward 99.9% SLA · weekly drops · regulator-ready evidence · cost-aware by design

// Every engagement begins with a diagram this honest — and a list of the questions it cannot yet answer.

What we are configured for

99.9%
Target SLA
on managed engagements
5
Disciplines
apps · cloud · data & AI · sec · integ.
6
Sectors served
finance · energy · telco · public · health · IIoT
812
Weeks to production
from first call to running

Stewardship

The boring promises that make non-boring outcomes possible.

Every engagement ships with a written control map, a key-management plan, and a quarterly evidence pack a regulator could read without coffee. We do this whether you ask or not.

Request our security pack

ISO 27001

controls applied internally

NDPR-aligned

controls map · NG data protection

CMK & BYOK

customer-managed keys

Sovereign hosting

EU · UK · NG residency

Evidence packs

monthly · regulator-ready

Least privilege

access on every engagement

Mutual NDA

countersigned same day

SOC 2 (track)

Type II target Q4 FY26

What our work looks like

The shapes of engagement we are built for.

We are a young firm — founded in 2026 — so we are upfront about what is published and what is not. Below are illustrative engagement shapes we are configured to deliver. Named case studies will appear here as the first engagements close and clients agree to be referenced.

Illustrative · engagement shapes & example outcomes — no named clients implied

SHAPE / 01 FIN-SVCS
Batch stream

retire nightly reconciliation jobs

Real-time reconciliation spine

The pattern: replace overnight batch jobs with a deterministic event stream, so end-of-day close stops being a recovery operation. Built for banks, payment companies, and ledger-heavy operators.

Typical
6–10 months
Squad
4–6 senior
Shape
Build · Run
SHAPE / 02 ENERGY · UTILITIES
Meter ledger

close revenue-leak loops

Metering-to-billing telemetry

The pattern: a telemetry pipeline plus control-room dashboard that makes systemic write-offs visible, and holds operations accountable to the recovery curve every Monday morning. Built for utilities and downstream operators.

Typical
9–14 months
Squad
5–8 senior
Shape
Build · Operate
SHAPE / 03 GRC TECH
Policy code

continuous audit evidence

Policy-as-code & evidence engine

The pattern: turn a quarterly audit fire-drill into a continuous control — policies encoded, evidence captured automatically, walk-throughs that read themselves. Built for insurers, banks, and regulated public-sector deployments.

Typical
4–7 months
Squad
3–5 senior
Shape
Design · Build

Each engagement begins the same way: a one-page reference diagram with the actual constraints written on it — and the questions it cannot yet answer. The first half-hour of every conversation is spent here.

Book the half-hour

Built for regulated, high-stakes sectors

FINANCIAL SERVICES ENERGY & UTILITIES TELECOMS PUBLIC SECTOR HEALTHCARE IT INDUSTRIAL IOT FINANCIAL SERVICES ENERGY & UTILITIES TELECOMS PUBLIC SECTOR HEALTHCARE IT INDUSTRIAL IOT

Sectors

We do not pretend to know every industry — only the ones our senior team has shipped into before.

Six sectors. Each chosen because the regulator was already in the room — and because our partners have sat on the other side of the desk in prior roles.

Financial Services

Core banking integrations, payment rails, KYC/AML pipelines, and the audit-grade controls expected by central-bank examiners.

Energy & Utilities

Customer platforms, metering integration, OT/IT bridges, and operational reporting for grid and downstream operators.

Telecoms

BSS/OSS modernisation, partner integrations, fraud and revenue assurance, and the data plumbing that survives carrier-scale volumes.

Public Sector

Citizen services, case management, identity, and the procurement-friendly architectures that survive a change of administration.

Healthcare IT

Clinical workflow systems, claims integration, and the privacy/governance discipline that HIPAA, NDPR, and GDPR all expect.

Industrial IoT

Telemetry pipelines, predictive-maintenance models, and operator dashboards engineered for plant-floor reliability — not lab demos.

§ 01 — Capabilities

Five disciplines. One operating standard.

We are not a body shop and not a generalist agency. We operate as a small group of engineers, architects, and risk specialists who take outcome ownership across the lifecycle — discovery, build, run.

  • 01Custom Applications — bespoke product engineering
  • 02Cloud Platforms — landing zones and platform engineering
  • 03Data & AI — pipelines, agents, and evaluation
  • 04Security & Governance — GRC tech and policy-as-code
  • 05Integrations — the load-bearing work
01

Custom Applications

Bespoke web, mobile, and back-office systems engineered for the specific shape of your business. We replace spreadsheets, retire legacy platforms, and ship the product features your roadmap has been waiting on.

product eng. legacy replacement internal tools
Discuss a build
02

Cloud Platforms

Landing zones, platform engineering, and the infrastructure-as-code discipline that makes cloud spend predictable and audits boring.

AWS · Azure · GCP platform eng. FinOps
View topologies
03

Data & AI Tooling

Pipelines, warehouses, MCP-grade agents, and the evaluation harnesses to keep them honest. We treat AI as production software, not a demo.

data platforms agents & LLM apps evaluation
Learn more
04

Security & Governance

GRC platforms, identity, secrets, SIEM tuning, and policy-as-code — built by people who have sat in the CRO and CISO seats and know what the regulator will actually ask.

GRC tech IAM & secrets detection eng.
Read whitepaper
05

Integrations — the load-bearing work.

Connecting ERPs, HRIS, payment rails, identity providers, and the dozen SaaS tools each department picked on its own. We design integration architectures that age well — event-driven where it counts, request/response where it must.

iPaaS & event mesh API platforms master data
See the patterns
// event-pattern · sample illustrative
order.created → fulfilment
payment.settled → ledger
kyc.updated → risk-engine
shift.opened → hris
event-driven · idempotent · replayable

§ 02 — Engagements

Three ways to bring us in.

The brief usually arrives in one of three shapes. We are comfortable with all of them — and we will say so when we are not the right fit.

Average time-to-production · 8–12 weeks Pricing model · outcome-based
ENGAGEMENT / A

Replace a legacy system

You have a platform that has out-lived its architecture. We strangle it incrementally — never a flag-day rewrite — and leave you with a smaller, faster, auditable replacement.

  1. Discover & instrument the legacy
  2. Strangle by domain, ship monthly
  3. Decommission with evidence
Discover · Migrate · Decommission
Default shape
ENGAGEMENT / B

Build a new product

From a one-page concept to a production system real customers depend on. Small senior teams, weekly demos, and the willingness to argue the brief when the evidence points elsewhere.

  1. Shape — discovery sprint & tech bet
  2. Ship — production from week six
  3. Scale — instrument & tune
Shape · Ship · Scale
ENGAGEMENT / C

Operate it for you

A managed engagement where we run the platform we built — or the one you already have — against an agreed service contract. One throat to choke, in plain English.

  1. Run — SLA-backed on-call
  2. Improve — quarterly roadmap
  3. Report — board-ready evidence
Run · Improve · Report

§ 03 — Process

From first call to running platform — in four steps.

We publish the way we work so you can hold us to it. Most engagements move from discovery to a working production system in eight to twelve weeks.

Published methodology · revised quarterly
  1. 01
    week 0 — 2

    Discover

    A tight, written discovery: what is on fire, what good looks like, the constraints that actually bind. No deliverable theatre.

    • · stakeholder interviews
    • · architecture review
    • · risk & compliance map
  2. 02
    week 2 — 4

    Design

    A reference architecture you could defend to a regulator, with the trade-offs written down. The plan you can argue against on the merits.

    • · domain & data model
    • · integration map
    • · security posture
  3. 03
    week 4 — 12

    Deliver

    Senior engineering teams ship to production weekly. Demos every Friday. Reviews technical, not theatrical.

    • · trunk-based CI/CD
    • · weekly production drops
    • · acceptance against outcomes
  4. 04
    ongoing

    Operate

    A formal handover, or a managed-service contract where we stay accountable for SLA, security posture, and the quarterly roadmap.

    • · 24/7 on-call
    • · monthly evidence pack
    • · quarterly business review

§ 04 — Principles

Eight rules we will argue for in any conversation.

Published so you can hold us to them — and so you know what we will push back on when the path of least resistance is the wrong one. We will lose some work because of this. That is the point.

// the contract we keep with ourselves

$ cat operating-principles.md
# Disciplined engineering — eight commitments.
— founding charter, revised quarterly

  1. I. Decisions

    Reversible decisions are made fast. Irreversible ones, slowly.

    Cost of waiting and cost of being wrong are not symmetric. We pick which one applies before we pick a tool.

  2. II. Talent

    Senior teams or none.

    Mid-level engineers cannot defend an architectural choice to a regulator at 22:00. We staff people who can — even when it means saying no to volume.

  3. III. Incentives

    We do not bill by the hour.

    Hourly billing rewards the slowest, least-clear engineer in the room. Outcome contracts align our incentive with yours.

  4. IV. Demos

    Software you can defend, not just demo.

    A friday-afternoon sprint review is a low bar. A monday-morning board meeting is a real one. We build for the second.

  5. V. Migrations

    Strangle. Never flag-day.

    The cheapest legacy migration in the long run is the one that lets the business keep moving in the short run. We retire systems one domain at a time.

  6. VI. AI

    An AI feature is production software.

    Eval suites, drift alarms, rollback paths, and a human approver on the critical path. The "demo" is the easy part; the operations are the work.

  7. VII. Security

    Security is design, not paperwork.

    A policy that no engineer can implement is a policy that has already failed. We treat security as an architectural property of the system, enforced in code.

  8. VIII. Honesty

    The wrong client is worse than no client.

    If we are not the right firm for your problem, we will say so on the first call — and where we can, name the one that is.

§ 05 — Approach

How we work, in three words.

Disciplined engineering. Sector context. Outcome ownership. The three commitments that show up in every contract and every code review.

// operating principle

“Software you can defend in a board meeting — not just demo in a sprint review.”

i.

Disciplined engineering

Small senior teams. Trunk-based delivery. Tests that mean something. Reviews that are technical, not theatrical. The boring practices that make non-boring outcomes possible.

ii.

Sector context

Financial services, energy, telecoms, public sector. We have built and governed systems inside regulated industries, and we know which corners do not bend.

iii.

Outcome ownership

We commission what we build and stay accountable for it in production. Our contracts are written around outcomes, not hours — because that is the only honest way to align incentives.

Guaranteed SLAs

Financially backed service level agreements on all managed engagements. We share the downside as well as the upside.

§ 06 — Field notes

Writing from inside the work.

Short essays from our senior engineers and risk practitioners. Practical, opinionated, and free of marketing varnish — written for the people who have to live with the system after we leave.

§ 07 — FAQ

Questions buyers ask us first.

If your question is not here, write to us at [email protected] — we reply within one business day.

How do you price engagements?

Fixed-fee for discovery and design phases, outcome-based for delivery, and monthly subscription for managed operations. We do not bill by the hour — it is the wrong incentive.

Where are you based, and do you take international work?

Headquartered in Lagos, with a fully remote senior team across West Africa Time and Greenwich Mean Time. We currently take engagements across Africa, the UK, and the EU; North America by exception.

What does a typical team look like?

Small and senior. A typical squad is a tech lead, two to four senior engineers, a product strategist, and — where the work demands it — a security or compliance specialist embedded from day one.

Can we sign an NDA before the first call?

Yes. We have a standard mutual NDA we can countersign within the day, or we will redline yours. We can also accept encrypted briefs via PGP — ask in your first email.

Do you own the code and the IP we pay for?

You do, in full, on payment. We retain a non-exclusive licence to internal tooling and patterns we developed before the engagement. Everything project-specific is yours.

How do you handle security and data residency?

We work to ISO 27001 controls internally, follow least-privilege access on every engagement, and deploy in the region your data laws require — including the EU, UK, and Nigeria. We can support customer-managed keys and customer-hosted deployments where needed.

§ 08 — Contact

Tell us what is on fire.

The fastest way to know if we are useful is a thirty-minute call. No deck, no NDA, no discovery workshop — just the problem in plain English and an honest answer about whether we are the right firm.

Replies within one business day
$ brief.draft encrypted in transit

PGP & NDA available on request.