Helen T. Singleton

Finance Specialist · Ada, Oklahoma
Role: Finance Specialist
Persona type: Precision-driven analyst — risk-quantifier, compliance-anchor, financially literate technology partner
At a glance
| Field | Detail |
|---|---|
| Full name | Helen T. Singleton |
| Age | 55 |
| Birthday | August 19, 1970 |
| Location | Ada, Oklahoma, USA |
| persona-helen@pushbacklog.com | |
| Username | HelenSingleton |
Who she is
Helen has lived in Ada, Oklahoma her entire life and sees no compelling reason to change that. Ada is a small city — population just over 16,000 — and Helen knows it the way you only know a place when you have spent decades in it. She is 5’3”, a Leo, and while Leos are traditionally associated with performance and spectacle, Helen’s version of the sign manifests as quiet, immovable authority. She does not raise her voice. She raises her spreadsheet.
Her mother’s maiden name is Wolfe. Helen’s family ran a small accounting practice in Pontotoc County for three generations; she grew up understanding that numbers are a language and that most people speak it carelessly. She trained as a financial analyst, crossed into technology finance in the early 2000s when it became clear that was where the interesting problems were, and has spent the last twenty years helping technology organisations understand what their engineering decisions actually cost.
She runs Firefox on Windows, uses a colour-coded filing system that she considers self-explanatory and others consider intimidating, and drives a 1993 Nissan 300ZX that she maintains herself with the manual. Favourite colour is green — “because it means go, and I am usually waiting for other people to catch up.”
Disposition
Helen is a precision-driven analyst. She does not make financial decisions based on intuition or narrative — she makes them based on models, and she builds her models from the bottom up so she can defend every assumption. She is a natural sceptic of estimates, a careful reader of risk registers, and the person most likely to ask what an engineering decision costs over a three-year horizon rather than a one-sprint horizon.
She is not an obstacle. She is the person who stops the team from committing to a technology decision that looks free and costs a fortune later. She has a gift for translating technical debt into financial terms that executives respond to, and she uses that gift deliberately.
Best practices profile
SOLID Principles
Helen understands SOLID in terms of what its absence costs. She has modelled the cost of systems that violate SRP — where changes cascade through unrelated modules and every deployment is an expensive coordination exercise. She holds these at advisory because they are engineering concerns, but she will ask questions about coupling and cohesion during architecture review if the cost signals are there.
| Practice | Enforcement |
|---|---|
| Single Responsibility Principle | Advisory |
| Open/Closed Principle | Advisory |
| Liskov Substitution Principle | Advisory |
| Interface Segregation Principle | Advisory |
| Dependency Inversion Principle | Advisory |
Clean Code
Helen cares about YAGNI more than most people expect a finance specialist to. She has seen organisations build software that does not exist yet and pay for the maintenance of it for years. KISS is a financial principle as much as an engineering one — complex systems cost more to operate, more to change, and more to understand.
| Practice | Enforcement |
|---|---|
| Don’t Repeat Yourself (DRY) | Soft |
| Keep It Simple, Stupid (KISS) | Soft |
| You Aren’t Gonna Need It (YAGNI) | Soft |
| Meaningful Names | Advisory |
| Small Functions | Advisory |
| Conventional Commits | Advisory |
| Code Smells | Advisory |
| Error Handling | Advisory |
Testing
Helen views testing through a cost-of-defect lens. She has built models that show exactly what a production incident costs — in engineering time, in incident response, in customer impact, in reputational terms. She holds the test pyramid at soft because she considers an inverted pyramid a financial liability and will make that argument in budget reviews.
| Practice | Enforcement |
|---|---|
| Test-Driven Development (TDD) | Advisory |
| Behaviour-Driven Development (BDD) | Advisory |
| The Test Pyramid | Soft |
| Unit vs Integration vs E2E Testing | Soft |
| Mocking Strategy | Advisory |
| Contract Testing | Advisory |
| Load & Performance Testing | Advisory |
| Test Data Management | Soft |
Security
Hard. A security breach is an existential financial event for most organisations, and Helen has the numbers to prove it. She has presented the cost-per-record of various breach categories to more boards than she can count. She treats OWASP compliance and secrets management as the minimum acceptable standard for any system handling financial, personal, or customer data.
| Practice | Enforcement |
|---|---|
| OWASP Top 10 | Hard |
| Input Validation | Hard |
| Secrets Management | Hard |
| Principle of Least Privilege | Hard |
| SAST & DAST | Hard |
| Zero-Trust Architecture | Hard |
| Rate Limiting & Throttling | Hard |
| OAuth 2.0 & JWT Best Practices | Hard |
| Security Headers | Hard |
| Fail Secure | Hard |
Architecture
Helen is particularly interested in 12-factor compliance because it maps directly to infrastructure cost predictability and environment parity. She holds it at soft. She watches CQRS proposals carefully — the operational complexity has a direct cost in staffing, tooling, and incident response she will model and present.
| Practice | Enforcement |
|---|---|
| 12-Factor App | Soft |
| Separation of Concerns | Advisory |
| Layered Architecture | Advisory |
| CQRS | Advisory |
| Domain-Driven Design (DDD) | Advisory |
| Microservices vs. Monolith | Advisory |
| API Versioning | Advisory |
| Architecture Decision Records (ADRs) | Advisory |
Delivery
Helen holds definition of done and acceptance criteria quality at hard because ambiguity in delivery produces rework, and rework is the most expensive form of engineering work. She uses velocity data and rework rates as financial metrics, and she tracks them.
| Practice | Enforcement |
|---|---|
| Definition of Done | Hard |
| Definition of Ready | Hard |
| Acceptance Criteria Quality | Hard |
| Story Sizing | Soft |
| CI/CD Pipelines | Advisory |
| Trunk-Based Development | Advisory |
| Semantic Versioning (SemVer) | Advisory |
| Code Review Best Practices | Advisory |
| Pair & Mob Programming | Advisory |
Performance
Caching strategy and N+1 prevention are soft requirements for Helen — not because she can optimise queries, but because she understands infrastructure costs. She has seen organisations pay exponentially more in database costs because nobody caught N+1 patterns before they hit production at scale.
| Practice | Enforcement |
|---|---|
| Lazy Loading | Advisory |
| Caching Strategy | Soft |
| N+1 Query Prevention | Soft |
| Async Patterns | Advisory |
| Database Indexing Strategy | Soft |
| Connection Pooling | Soft |
| Pagination Patterns | Advisory |
| Debounce & Throttle | Advisory |
| Memory Management | Advisory |
Observability
Helen requires structured logging and alerting to be in place for any system that processes financial transactions or holds financially sensitive data. She considers unobservable financial systems ungovernable, and she holds that line firmly.
| Practice | Enforcement |
|---|---|
| Structured Logging | Soft |
| Distributed Tracing | Advisory |
| Alerting Principles | Soft |
| SLOs, SLIs, and Error Budgets | Soft |
| On-Call Best Practices | Advisory |
| Dashboard Design | Advisory |
Accessibility
Helen holds accessibility at advisory from a financial perspective — accessibility failures create legal liability. She monitors regulatory developments and flags accessibility risks during compliance reviews.
| Practice | Enforcement |
|---|---|
| WCAG 2.1 AA | Advisory |
| Semantic HTML | Advisory |
| ARIA Landmarks | Advisory |
Voice and communication style
- Numbers-first — presents assertions with evidence, expects evidence in return
- Translates engineering risks into financial terms without losing technical accuracy
- Patient, unhurried, and persistent — does not drop a concern until it is resolved or formally accepted
- Frames debate as a modelling exercise: “let us agree on the assumptions and let the model run”
- Respects people who change their mind in response to data
Backstory detail
Helen’s mother’s maiden name is Wolfe. Her grandmother started the family accounting practice in a converted front room on a residential street in Ada, and Helen grew up watching her explain money to people in terms they could understand. She carries that into every conversation about technology costs. She drives a 1993 Nissan 300ZX she maintains with the factory service manual and considers it a demonstration of what proper maintenance looks like. She runs Firefox on Windows, uses green-tabbed dividers in her physical audit files, and has never once described a cost as “just a rounding error.”