Field Notes: What Consumer Lending Engineering Actually Looks Like
A senior engineering role at a consumer-lending platform crossed my desk last week — Python, AWS, SQL fluency that goes deeper than most backend roles, a loan-management vendor I'd never heard of named in the nice-to-haves, and a real emphasis on building things for internal stakeholders rather than for consumer-facing product surfaces. Point-of-sale financing for home improvement and healthcare, the kind of work that happens behind the iPad at the contractor's job site or the dental office.
I realized I didn't have the right mental model for any of it.
So I spent the last week-plus going deep — tracing the regulatory landscape, reading vendor documentation, mapping the integration patterns, working through the engineering writeups I could find from inside the space. The goal wasn't to become an expert. The goal was to understand what these companies actually need from engineers, well enough to know whether someone like me could be useful to them and where exactly that usefulness would land.
This is the map I built. It's a working draft of someone trying to understand the domain from the outside. I'm publishing it because (a) I wish someone had handed me this when I started, and (b) people who've actually worked in consumer-lending engineering will probably read it and tell me where I got it wrong — and that's the whole point.
The shape of the work
Here's the lifecycle as I now understand it:
Application → Underwriting → Origination → Servicing → Reporting
│ │ │ │ │
(POS form) (credit/income/ (loan (the long (bureaus,
fraud screen, contract tail — capital
decision is created, payments, partners,
engine, rate funds move) collections, regulators)
pricing) modifications)
Every consumer-lending platform — home improvement, healthcare, auto, BNPL — runs through some version of these five stages. The split between "what the lender's own platform does" and "what a vendor system handles" varies, but the lifecycle is the same.
What's not in this diagram, but matters for understanding the work:
- There's almost always a bank partner. Most fintech lenders aren't banks — getting a charter is expensive and slow. They partner with a chartered bank that legally originates the loans (the "bank-as-a-service" or BaaS model). Most of the consumer-lending fintechs you'd recognize work this way under the hood.
- There's almost always a vendor loan management system. Once a loan is originated, it lives in a servicing system — often a third-party vendor like Nortridge's NLS, MeridianLink's servicing module, or LoanPro. Some of the biggest lenders eventually build in-house, but at the $100M–$1B annual origination scale, vendor LMS is the default.
- There's almost always a data warehouse. Snowflake is the dominant choice now. Loan-level data, transaction data, customer data, merchant data — it all lands in the warehouse for analytics, reporting to capital partners, and feeding the executive dashboards that drive business decisions.
Engineers in this space spend their time in the spaces between these systems — at the integration boundaries, in the reconciliation jobs, in the internal tooling that wraps the vendor APIs, in the ETL that feeds the warehouse, in the dashboards built on top of the warehouse.
That mental model — that the interesting work clusters at the seams — was the first thing that clicked for me.
Seven things every consumer-lending engineering team seems to need
Tracing the domain through vendor documentation, regulatory tracking, industry writeups, and the job description that started this whole inquiry, the same seven themes keep coming up. Each one is a domain I'm planning to go deeper on in subsequent posts.
1. Geographic compliance code
Consumer lending is aggressively regulated, and the regulatory map shifted in a meaningful way during 2025–2026 that most engineers outside the space haven't noticed. Federal CFPB enforcement contracted sharply after February 2025; states stepped in to fill the gap. California, Colorado, New York, and Massachusetts have been the most active.
The engineering implication: a lot of consumer-lending code is geographic. "We lend in state X at rate Y for product Z, but not in state W, and the disclosure requirements differ in state Q." When a state changes a rule, engineers ship the change. The compliance surface is more dynamic now, not less.
Going deeper on this in post #2 of the series.
2. Vendor integration muscle
If the lender uses a vendor loan management system — and most do — then a significant chunk of the engineering work is integrating with that vendor. Sometimes via REST API. Sometimes via SOAP (the docs are often vintage). Often via batch file drops on a daily reconciliation cadence. The integration patterns are the same everywhere — origination push, payment posting, customer-facing portal data fetches, scheduled extracts into the warehouse — even if the vendor names differ.
What surprises me: webhooks are usually missing. The vendors that dominate this space were built before event-driven architecture became the default. Engineers compensate with polling daemons and reconciliation backstops. That's a recurring pattern I want to write about specifically.
Going deeper in posts #5 (LMS integration patterns) and #8 (the polling daemon pattern).
3. Reconciliation discipline
This is the theme that came up most across my research — in vendor docs, postmortems, and technical writeups from inside the space — and the least talked about in engineering blogs. Reconciliation engineering is the work that catches data integrity problems before they become customer or regulator problems.
The pattern's the same in every shop: pull a snapshot from system A, pull a snapshot from system B, diff them, classify the deltas as "expected drift" vs "real problem," alert on the real problems. The hard part isn't the diff — it's the classification, because early reconciliation jobs alert on everything and get muted within a week.
Going deeper in post #6.
4. Bureau reporting accuracy
Every consumer lender ships a monthly file to the credit bureaus (Experian, TransUnion, Equifax) in a fixed-width format called Metro 2. The format is from the 1970s. It is unforgiving. A rejected file means loans that didn't get reported, which means borrowers' credit isn't updated, which means CFPB complaint risk and direct consumer harm.
I didn't realize before this week that Metro 2 reporting is owned by a designated engineer at most lenders — it's not a thing that "just happens." The monthly cycle is a real fire drill, and the engineer who owns it has unusual standing in the org because they're the line between the company's data and the borrowers' credit reports.
Going deeper in post #7.
5. Portfolio metric fluency
I sat down expecting "consumer lending KPIs" to look like e-commerce or SaaS KPIs and found something different. The vocabulary alone takes a beat to learn — vintage curves, roll rates, FPD (first-payment default), SPD (second-payment default), cure rate, net charge-off rate, weighted average APR, NPL ratio, CECL reserves.
But once you have the vocabulary, the dashboards start making sense. Every consumer lender has roughly the same five dashboards (CEO/board, risk team, capital markets, operations, merchant scorecards) and engineers in this space build and maintain them. Knowing the metrics is most of the job, because the dashboards aren't decorative — they drive funding decisions, merchant relationships, and underwriting changes.
Going deeper in post #4.
6. Async/event handling without webhooks
Touched on this in #2, but it deserves its own piece. When your vendor systems don't emit events — and most legacy financial-services vendors don't — you have to build your own event layer on top of polling. It's a brittle, unsatisfying piece of architecture that every team in this space ends up shipping. There's no canonical writeup for it that I've found, and the failure modes are subtle.
Going deeper in post #8.
7. Internal tooling for non-technical executives
This one surprised me the most, and I think it's underrated. Most consumer-lending engineering teams spend a significant portion of their time building tools for internal stakeholders — the CEO who wants a custom view of portfolio performance, the head of risk who wants real-time delinquency alerts, the operations team that needs a tool to investigate stuck applications, the capital markets person who needs a clean monthly loan tape for the forward-flow buyer.
The interesting question for me is: this is the kind of work where AI-augmented development (Claude Code, Cursor, structured-output disciplines) seems to genuinely shine. Internal tools are well-scoped, the consumer of the tool is internal so the velocity-vs-polish tradeoff favors velocity, and the schema is usually constrained by the warehouse it's reading from. I want to write about this specifically.
Going deeper in post #9 (capstone: AI-augmented engineering in regulated industries).
What surprised me
Three things upended my prior assumptions.
The regulatory landscape is local now. I expected most of the compliance complexity to live at the federal level — CFPB, TILA, ECOA. It does, structurally. But the enforcement reality in 2026 is mostly state-driven, because federal enforcement contracted in early 2025. That means the engineering challenge isn't "stay compliant with one rulebook" — it's "stay compliant with N rulebooks that change at different speeds." The companies that can ship rule changes fast have a real operational moat.
POS lending isn't really like credit cards. I assumed a lot of credit-card thinking would transfer. Some does — risk-based pricing, bureau reporting, collections workflow. A lot doesn't. POS lending is installment loans, often vertical-specific (one merchant network for dental, another for home improvement), and the merchant-facing relationship is as important as the consumer-facing one. The competitive landscape is also segmented in a way credit cards aren't — CareCredit dominates healthcare, GreenSky dominates home improvement, Affirm and Klarna play different ticket-size territory entirely. There's no single "POS lending winner."
Vendor systems are older and stickier than I expected. I assumed a 2018-founded fintech would be running on cloud-native, modern infrastructure end-to-end. What I'm finding is: the parts the fintech built are modern (Python, AWS, Snowflake, modern CI/CD), and the parts they integrate with are often legacy enterprise software from companies that have been around for 30–40 years. The cultural and engineering challenge of bridging those two worlds — modern startup code wrapping a SOAP API written in the 1990s — is real, and underrated.
What I'm still figuring out
Five questions I don't have good answers to yet:
Where does most real engineering pain actually live in practice? I have hypotheses (the integration seams, the reconciliation gaps, the Metro 2 monthly cycle) but I want to hear what the people in the chairs actually say.
Are reconciliation skills more or less important than vendor-integration skills? Both come up constantly. The writeups I've seen don't usually distinguish them.
How much of the work is genuinely AI-augmentable today? Internal tooling and ETL feel like clear yes. Compliance-critical code paths and novel underwriting logic feel like clear no. The middle is a question I haven't worked out.
What does the build-vs-buy conversation about LMS replacement actually look like at the $500M/month-of-origination scale? Building in-house seems to be the move for the biggest fintechs (Affirm, SoFi), but the second-tier — the $100M–$1B annual originations bracket — seems to mostly stay on vendor systems. Why?
What's it like to actually own the Metro 2 pipeline as the named engineer? It sounds equal parts important and stressful. I want to talk to someone who's done it for a year.
What's coming
I'm planning to write seven more pieces in this series, each going deep on one of the themes above. Cadence is uncertain — I'd rather ship one good piece a week than three thin ones — but the survey above is the trailhead, and each subsequent post will be linkable as a deeper dive.
The pieces I'm most excited to write are #6 (reconciliation engineering — the underrated discipline) and #9 (AI-augmented engineering in regulated industries, which I think is the most underexplored area of the whole AI-coding conversation).
If you work in this space
This map is from someone trying to understand the domain from the outside. The people who actually build and operate these systems have a different map — sharper in places, smudged in others, drawn from the inside.
If you work in consumer-lending engineering — at a fintech, a bank-partnered lender, an LMS vendor, anywhere on the chain — I'd love to know what I got wrong here, what I underweighted, what I'm not seeing. Email me, find me on X, drop a comment. The series is partly a learning project for me; outside input is exactly the point.
Building in the open, one domain at a time.
—
This is post #1 in a series on consumer-lending engineering. Subsequent posts will go deep on the regulatory landscape, the POS lending lifecycle, portfolio metrics, LMS integration patterns, reconciliation engineering, Metro 2 reporting, the polling daemon pattern, and AI-augmented engineering in regulated industries.
— Neil
