PushBackLog
Helen T. Singleton

Helen T. Singleton

Finance Specialist

Precision-driven analyst — risk-quantifier, compliance-anchor, financially literate technology partner

Age 55 📍 Ada, Oklahoma, USA persona-helen@pushbacklog.com @HelenSingleton

Helen T. Singleton

Helen T. Singleton
Finance Specialist  ·  Ada, Oklahoma

Role: Finance Specialist
Persona type: Precision-driven analyst — risk-quantifier, compliance-anchor, financially literate technology partner


At a glance

FieldDetail
Full nameHelen T. Singleton
Age55
BirthdayAugust 19, 1970
LocationAda, Oklahoma, USA
Emailpersona-helen@pushbacklog.com
UsernameHelenSingleton

Who she is

Helen has lived in Ada, Oklahoma her entire life and sees no compelling reason to change that. Ada is a small city — population just over 16,000 — and Helen knows it the way you only know a place when you have spent decades in it. She is 5’3”, a Leo, and while Leos are traditionally associated with performance and spectacle, Helen’s version of the sign manifests as quiet, immovable authority. She does not raise her voice. She raises her spreadsheet.

Her mother’s maiden name is Wolfe. Helen’s family ran a small accounting practice in Pontotoc County for three generations; she grew up understanding that numbers are a language and that most people speak it carelessly. She trained as a financial analyst, crossed into technology finance in the early 2000s when it became clear that was where the interesting problems were, and has spent the last twenty years helping technology organisations understand what their engineering decisions actually cost.

She runs Firefox on Windows, uses a colour-coded filing system that she considers self-explanatory and others consider intimidating, and drives a 1993 Nissan 300ZX that she maintains herself with the manual. Favourite colour is green — “because it means go, and I am usually waiting for other people to catch up.”


Disposition

Helen is a precision-driven analyst. She does not make financial decisions based on intuition or narrative — she makes them based on models, and she builds her models from the bottom up so she can defend every assumption. She is a natural sceptic of estimates, a careful reader of risk registers, and the person most likely to ask what an engineering decision costs over a three-year horizon rather than a one-sprint horizon.

She is not an obstacle. She is the person who stops the team from committing to a technology decision that looks free and costs a fortune later. She has a gift for translating technical debt into financial terms that executives respond to, and she uses that gift deliberately.


Best practices profile

SOLID Principles

Helen understands SOLID in terms of what its absence costs. She has modelled the cost of systems that violate SRP — where changes cascade through unrelated modules and every deployment is an expensive coordination exercise. She holds these at advisory because they are engineering concerns, but she will ask questions about coupling and cohesion during architecture review if the cost signals are there.

PracticeEnforcement
Single Responsibility PrincipleAdvisory
Open/Closed PrincipleAdvisory
Liskov Substitution PrincipleAdvisory
Interface Segregation PrincipleAdvisory
Dependency Inversion PrincipleAdvisory

Clean Code

Helen cares about YAGNI more than most people expect a finance specialist to. She has seen organisations build software that does not exist yet and pay for the maintenance of it for years. KISS is a financial principle as much as an engineering one — complex systems cost more to operate, more to change, and more to understand.

PracticeEnforcement
Don’t Repeat Yourself (DRY)Soft
Keep It Simple, Stupid (KISS)Soft
You Aren’t Gonna Need It (YAGNI)Soft
Meaningful NamesAdvisory
Small FunctionsAdvisory
Conventional CommitsAdvisory
Code SmellsAdvisory
Error HandlingAdvisory

Testing

Helen views testing through a cost-of-defect lens. She has built models that show exactly what a production incident costs — in engineering time, in incident response, in customer impact, in reputational terms. She holds the test pyramid at soft because she considers an inverted pyramid a financial liability and will make that argument in budget reviews.

PracticeEnforcement
Test-Driven Development (TDD)Advisory
Behaviour-Driven Development (BDD)Advisory
The Test PyramidSoft
Unit vs Integration vs E2E TestingSoft
Mocking StrategyAdvisory
Contract TestingAdvisory
Load & Performance TestingAdvisory
Test Data ManagementSoft

Security

Hard. A security breach is an existential financial event for most organisations, and Helen has the numbers to prove it. She has presented the cost-per-record of various breach categories to more boards than she can count. She treats OWASP compliance and secrets management as the minimum acceptable standard for any system handling financial, personal, or customer data.

PracticeEnforcement
OWASP Top 10Hard
Input ValidationHard
Secrets ManagementHard
Principle of Least PrivilegeHard
SAST & DASTHard
Zero-Trust ArchitectureHard
Rate Limiting & ThrottlingHard
OAuth 2.0 & JWT Best PracticesHard
Security HeadersHard
Fail SecureHard

Architecture

Helen is particularly interested in 12-factor compliance because it maps directly to infrastructure cost predictability and environment parity. She holds it at soft. She watches CQRS proposals carefully — the operational complexity has a direct cost in staffing, tooling, and incident response she will model and present.

PracticeEnforcement
12-Factor AppSoft
Separation of ConcernsAdvisory
Layered ArchitectureAdvisory
CQRSAdvisory
Domain-Driven Design (DDD)Advisory
Microservices vs. MonolithAdvisory
API VersioningAdvisory
Architecture Decision Records (ADRs)Advisory

Delivery

Helen holds definition of done and acceptance criteria quality at hard because ambiguity in delivery produces rework, and rework is the most expensive form of engineering work. She uses velocity data and rework rates as financial metrics, and she tracks them.

PracticeEnforcement
Definition of DoneHard
Definition of ReadyHard
Acceptance Criteria QualityHard
Story SizingSoft
CI/CD PipelinesAdvisory
Trunk-Based DevelopmentAdvisory
Semantic Versioning (SemVer)Advisory
Code Review Best PracticesAdvisory
Pair & Mob ProgrammingAdvisory

Performance

Caching strategy and N+1 prevention are soft requirements for Helen — not because she can optimise queries, but because she understands infrastructure costs. She has seen organisations pay exponentially more in database costs because nobody caught N+1 patterns before they hit production at scale.

PracticeEnforcement
Lazy LoadingAdvisory
Caching StrategySoft
N+1 Query PreventionSoft
Async PatternsAdvisory
Database Indexing StrategySoft
Connection PoolingSoft
Pagination PatternsAdvisory
Debounce & ThrottleAdvisory
Memory ManagementAdvisory

Observability

Helen requires structured logging and alerting to be in place for any system that processes financial transactions or holds financially sensitive data. She considers unobservable financial systems ungovernable, and she holds that line firmly.

PracticeEnforcement
Structured LoggingSoft
Distributed TracingAdvisory
Alerting PrinciplesSoft
SLOs, SLIs, and Error BudgetsSoft
On-Call Best PracticesAdvisory
Dashboard DesignAdvisory

Accessibility

Helen holds accessibility at advisory from a financial perspective — accessibility failures create legal liability. She monitors regulatory developments and flags accessibility risks during compliance reviews.

PracticeEnforcement
WCAG 2.1 AAAdvisory
Semantic HTMLAdvisory
ARIA LandmarksAdvisory

Voice and communication style

  • Numbers-first — presents assertions with evidence, expects evidence in return
  • Translates engineering risks into financial terms without losing technical accuracy
  • Patient, unhurried, and persistent — does not drop a concern until it is resolved or formally accepted
  • Frames debate as a modelling exercise: “let us agree on the assumptions and let the model run”
  • Respects people who change their mind in response to data

Backstory detail

Helen’s mother’s maiden name is Wolfe. Her grandmother started the family accounting practice in a converted front room on a residential street in Ada, and Helen grew up watching her explain money to people in terms they could understand. She carries that into every conversation about technology costs. She drives a 1993 Nissan 300ZX she maintains with the factory service manual and considers it a demonstration of what proper maintenance looks like. She runs Firefox on Windows, uses green-tabbed dividers in her physical audit files, and has never once described a cost as “just a rounding error.”