Uddashya Dahiya

Senior Associate

About Uddashya

Uddashya is a Senior Associate with Cygnus Compliance with several years of experience in data analytics and financial crime compliance. Uddashya specializes in AML model validation, customer risk rating assessments, and data quality management. His core expertise includes SQL scripting, data structuring, profiling, and governance, along with hands-on capabilities in functional testing, threshold analysis, and reconciliation across complex financial datasets.

He has supported AML model validation and customer risk rating projects for institutions such as China Merchant Bank, Vakif Bank, and Mitsubishi UFJ Trust and Banking Corporation. His responsibilities have included data quality checks, mapping and reconciliation efforts, and validating critical parameters to support regulatory compliance and model performance.

In addition to his technical skills, Uddashya brings strong experience in gathering business and functional requirements, defining use cases, and supporting project planning efforts. Known for his attention to detail, adaptability, and clear communication, he consistently delivers data-driven solutions aligned with evolving compliance and operational needs. His combined technical and analytical background makes him a valuable contributor to risk and data-driven engagements.

In his free time, he enjoys to cook Indian food and play video games. He has recently developed an interest in hiking and therefore, he on weekends, he goes on different hiking trails. His favorite trails so far are Mount Tammany, Worthington State Forest, Pennsylvania, and Franconia Notch State Park, New Hampshire.

Education

  • Master of Sciences in Business Analytics, University of Illinois at Chicago
  • Bachelor of Sciences in Management, University of Illinois at Chicago

Tools

  • Actimize
  • Bridger
  • Fircosoft/Acquity
  • ComplianceLink/Acquity
  • Oracle FCCM;
  • FIS – Prime
  • Verafin;
  • Montran; Patriot Officer

Expertise

Regulatory Risk & Compliance

  • Model risk is a critical subset of operational risk. Unvalidated or poorly calibrated models can lead to compliance failures, missed risk signals, and failed exams. Our validation services help financial institutions meet OCC, FRB, and FDIC expectations while enhancing model performance across AML, sanctions, fraud, and CRR domains.

  • Even high-performing models degrade over time. At Cygnus Compliance, we help institutions tune and optimize their monitoring and CRR systems to reduce false positives, sharpen detection, and align with shifting business and regulatory needs.

  • We guide institutions through the full lifecycle of implementing and optimizing AML, fraud, and case management platforms ensuring your RegTech investment is operationally sound and regulator-ready.

  • We deliver comprehensive, data-driven risk assessments that help institutions identify vulnerabilities, evaluate controls, and satisfy regulatory expectations. Our assessments inform practical, risk-based strategies that enhance program effectiveness.

  • Cygnus Compliance Care delivers on-demand regulatory support for critical initiatives, without requiring permanent hires. We embed experienced professionals to support audits, tune systems, clear backlogs, and strengthen compliance operations.

  • We help institutions manage alert volume, improve triage, and enhance investigations through intelligent automation and deep compliance expertise. Our managed services reduce false positives, increase efficiency, and deliver regulator-ready outcomes.

Technology Consulting

Advisory & Consulting
Product Engineering & Development
  • We translate business and regulatory requirements into functional, user-centric products with compliance controls embedded at every stage.

  • Whether launching a new RegTech tool or modernizing an internal platform, we manage full-cycle implementation.

  • We ensure new tools integrate with your environment, users, and workflows—maximizing adoption and value.

Expertise

Cyber Security

  • Timely and coordinated incident response is critical to maintaining business continuity and regulatory compliance. We develop tailored incident response plans, simulate cyberattack scenarios, and support forensic analysis and breach containment when every second counts.

  • We implement data-centric protection strategies that secure sensitive information and support compliance with GLBA, CCPA, GDPR, and other regulatory frameworks.

  • We help institutions design cloud architectures that prioritize security and regulatory compliance, including risk assessments and remediation of misconfigurations.

  • We build identity governance frameworks that enforce least privilege, mitigate insider threats, and strengthen audit readiness.

  • We build identity governance frameworks that enforce least privilege, mitigate insider threats, and strengthen audit readiness.

Data Engineering & Analytics

  • We develop and operationalize governance programs that establish data ownership, standardization, and defensibility supporting both day-to-day operations and regulatory exams.

  • We design AI/ML models to automate triage, enhance detection, and reduce analyst fatigue while maintaining explainability, traceability, and compliance with model governance frameworks.

  • We design and implement dynamic dashboards to support transparency, stakeholder engagement, and audit readiness across compliance domains.

  • We build normalized, regulator-aligned data models that support investigations, long-term trend analysis, and audit traceability.

  • We implement data control mechanisms that continuously monitor quality and alert stakeholders to anomalies before they affect operations or reporting.

  • Our dashboards visualize KPIs, KRIs, and risk trends across AML, fraud, sanctions, and KYC domains supporting board reporting and internal audit.

  • Timely and coordinated incident response is critical to maintaining business continuity and regulatory compliance. We develop tailored incident response plans, simulate cyberattack scenarios, and support forensic analysis and breach containment when every second counts.

  • We enhance your surveillance and onboarding programs with enriched, behavior-informed customer profiles that integrate internal and external data.

Third Party Risk Management