A highly qualified Full-Stack Developer with over 7 years of experience building robust, scalable, and maintainable web applications.
Proficient in both frontend and backend technologies, Iβm also an active contributor in the AI/ML and cybersecurity space.
MSc in Cybersecurity from the University of the West of Scotland (UWS), London Campus, UK.
- π Web Development (Frontend & Backend): Ruby on Rails | MERN Stack
- βοΈ Frontend: React, JavaScript, TypeScript, CSS, HTML5, Bootstrap, Tailwind
- π§ AI & LLMs: Python, Scikit-learn, Pandas, Numpy, TensorFlow, PyTorch, spaCy, NLTK, LangChain, FastAPI, GPT-4, GPT-4o, LLaMA, RAG, LoRA, Stable Diffusion, OpenAI API
- π Web Scraping: Scrapy, BeautifulSoup
- π§° DevOps & Deployment: Docker, AWS, DigitalOcean, GoDaddy, Capistrano, Nginx, GitHub Actions, CI/CD
- π Databases: PostgreSQL, MongoDB, MySQL, Redis
- π§βπ» Tools & Languages: Git, VSCode, Node.js, Bash, C++, PowerShell
- π± Mobile Apps: Flutter, React Native
Portfolio:
I have hands-on experience with leading AI/ML frameworks and LLMs for real-world business automation:
- Python Automation: Used for end-to-end ML pipelines, including data cleaning, normalization, and feature engineering.
- ML Libraries: pandas, Matplotlib, Scrapy, BeautifulSoup, Numpy, Scikit-learn, Pipenv.
- NLP & LLMs: NLP, NLTK, spaCy, LangChain, FastAPI, OpenAI API, GPT-4, GPT-4o, LLaMA, RAG, LoRA.
- AI Workflows: Sentiment analysis, document classification, chatbot development, and data extraction from client emails (see: Fulfillment.Global).
- Computer Vision: Stable Diffusion, SDXL, YOLO, OpenCV.
- Deployment: ML models deployed on AWS, RunPod, Docker, and DigitalOcean.
Iβve led and mentored projects such as automated info extraction from client emails for big data analytics, including full pipeline and documentation (Fulfillment.Global).
For more SaaS and API-driven solutions, check Roomy and UGlobal.
MSc in Cybersecurity, University of the West of Scotland (London Campus)
Hands-on expertise in securing digital assets, uncovering threats, and delivering actionable intelligence for businesses worldwide.
- π Digital & Cybersecurity Fundamentals
- π‘οΈ DDoS Simulation & Mitigation
- π₯οΈ OS Hardening: Kali, Windows, Ubuntu
- πΌ Cybersecurity Management & GDPR Compliance
- π§ͺ Risk Assessment & Threat Modelling
- Comprehensive Forensics: Digital, email, disk, and drone forensics β preserving, analyzing, and reporting on digital evidence for investigations, compliance, and litigation support.
- Incident Response: Rapid triage and response to breaches, malware, and insider threats.
- Chain of Custody: Maintaining evidence integrity for regulatory and legal requirements.
- Web & Network Pentesting: Identify and exploit vulnerabilities in web applications, servers, APIs, and cloud infrastructure.
- Red Teaming & Adversary Simulation: Real-world attack simulations to assess and improve your defenses.
- Vulnerability Exploitation: SQL Injection, XSS, CSRF, SSRF, privilege escalation, server misconfigurations.
- Server & Application Security: Linux/Windows hardening, patch management, and secure deployments.
- Scanning & Recon: Nmap, Nessus, Burp Suite, Nikto, OpenVAS, Shodan, Maltego, Recon-ng, theHarvester
- Traffic & Packet Analysis: Wireshark, tcpdump, Zeek, Suricata, Snort
- Forensics: Autopsy, FTK Imager, Sleuth Kit, Volatility, Magnet AXIOM
- Password Auditing: John the Ripper, Hashcat, Hydra
- Exploitation Frameworks: Metasploit, Cobalt Strike, Empire
- Automation & Scripting: Python, Bash, PowerShell
- Specialized Forensics: Email, disk, and drone data extraction and analysis
- Vulnerability Management: Full-stack scans, risk prioritization, and remediation
- SIEM & Monitoring: Splunk, ELK stack, and custom alerting
- Firewall, IDS/IPS: Setup, tuning, and management (Snort, Suricata, Zeek)
- Incident Documentation: Clear, actionable reports with remediation steps
- Advanced degree holder (MSc Cybersecurity) β combining academic excellence with real-world knowledge
- Practical experience β both offensive (Red Team) and defensive (Blue Team)
- Actionable reporting β clear findings, risk scores, and next steps
- Strict confidentiality β your data, business, and clients are always secure
- Up-to-date skills β active in CTFs, bug bounties, and ongoing security research
Industries Served: SaaS, Fintech, Healthcare, Retail, SMEs, eCommerce, EdTech
- Roomy: Multi-vendor system with public APIs
- Fulfillment.Global: SaaS-based B2B logistics system