Core systems that don't hold you hostage
Financial Services — Banking
What the compliance landscape actually demands.
Banking technology regulation in the United States is enforced by four federal regulators — OCC, FDIC, Federal Reserve, and NCUA for credit unions — with overlapping examination authority and increasingly convergent technology standards. The FFIEC IT Examination Handbook defines the minimum technology risk management expectations for federally regulated institutions. The Federal Reserve's SR 11-7 on Model Risk Management creates specific requirements for institutions using quantitative models in credit decisions, capital calculations, and AML systems. Basel III capital requirements mandate that large institutions maintain technology infrastructure sufficient to calculate and report regulatory capital ratios under stress scenarios — which requires data infrastructure that many institutions' current systems cannot support without manual intervention. DORA, effective January 2025 for EU-connected institutions, imposes operational resilience requirements including ICT risk management frameworks, resilience testing obligations including threat-led penetration testing, and ICT incident reporting timelines of 4 hours for initial notification and 72 hours for detailed report. The CFPB's Section 1033 rulemaking, finalized in 2024, requires banks to provide consumer-permissioned data access through standardized APIs — with the FDX API standard emerging as the technical implementation. Banks that have not built API infrastructure face a compliance timeline that requires significant engineering investment.
The US core banking market is controlled by three vendors from the 1980s — and every regional bank that builds on their platforms inherits four decades of technical debt and a compliance posture designed for a different regulatory era.
The Big Three core banking vendors — FIS, Fiserv, Jack Henry — are so universally disliked that banking trade associations are funding alternatives. Long-term contracts, outdated technology, closed systems, and prices that make modernization feel impossible. The industry is ready for engineering teams that build open, compliant alternatives.
Talk to an Engineer →
First call is a senior engineer — not a sales team. We understand your regulatory environment before we write a line of code.
Start a ConversationWhere Incumbents Fall Short
The US core banking market is effectively controlled by FIS, Fiserv, and Jack Henry — three platforms built in the 1980s and maintained through four decades of patches, extensions, and workarounds. The ABA and ICBA have been publicly funding research into open banking alternatives since 2018. Every regional bank that wants to add a modern capability — real-time payments through RTP or FedNow, embedded banking APIs, open banking data sharing — must build an integration layer over its legacy core. These integration layers accumulate complexity with every new capability. Eventually the integration layer becomes as complex as the core it was meant to simplify, and the bank is maintaining two sets of technical debt instead of one. CCAR stress testing creates a specific data infrastructure problem: institutions subject to the Federal Reserve's stress testing requirements must demonstrate that their capital calculation data flows are accurate, complete, and reproducible under examination. Most regional banks cannot produce that evidence without manual reconciliation processes that the Fed's examiners have flagged as control weaknesses. FinCEN's BSA/AML enforcement actions in recent years have targeted institutions whose transaction monitoring systems were tuned to reduce alert volume without maintaining detection accuracy — a tradeoff that reduces BSA officer workload but creates regulatory exposure when the tuning decisions are examined.
How We Approach Banking
The Algorithm approaches banking technology engagements with open architecture as the design principle and compliance as the engineering constraint. Core banking modernization follows a migration approach that maintains continuity of operations — new capabilities are built on modern, cloud-native infrastructure that runs alongside the existing core, with transaction types migrated progressively as each is validated. API-first design means that every banking capability is accessible through documented, standardized interfaces — satisfying Section 1033 open banking requirements without a separate compliance build. BSA/AML systems are designed with detection accuracy as the primary tuning objective, not alert volume reduction — because FinCEN's examination focus has shifted from whether institutions have transaction monitoring to whether their monitoring actually detects suspicious activity. Model risk management documentation is produced as part of the build for any system that meets SR 11-7's definition of a model — including AI-assisted underwriting, fraud detection, and AML systems. DORA operational resilience requirements — ICT risk management framework, resilience testing, incident reporting — are addressed as part of the infrastructure design for EU-connected operations.
What Success Looks Like
A successful engagement delivers a modern banking capability on open architecture that satisfies BSA/AML and GLBA requirements natively, integrates with the existing core through documented API interfaces, and does not require a dedicated integration development team to maintain. Section 1033 data sharing APIs are compliant with FDX standards and produce evidence sufficient for CFPB examination. Transaction monitoring detects what the BSA Officer needs to detect without the false positive volume that overwhelms operations. Model risk management documentation satisfies SR 11-7 requirements for every quantitative system in the engagement scope. The technology team can deploy new product capabilities without another compliance review cycle. The cost per account comes down because the architecture is not maintaining two generations of technical debt simultaneously.
Duration: 8 - 16 weeks
Output: Production system + audit documentation
A regional bank replacing a Big Three core system typically engages at Tier II — 60 engineers, 6 months, open and compliant.
What We Deploy in Banking
Financial Services — Banking Compliance Assessment
A structured checklist for evaluating your AI and software vendor's readiness across the key regulatory frameworks in Financial Services. Free — no email required.
Download PDF →Ready When You Are
Working in Banking?
We've deployed teams in this environment. First call is a senior engineer.