I build the engineering substrate real AI products need: agent and RAG pipelines, fine-tuned and accelerated model serving, and the distributed backends that hold it all together. Deepest scar tissue at the intersection of LLMs and security operations.
Four capability areas I operate in daily — chosen because real LLM products need all of them simultaneously, not just the modeling layer.
End-to-end LLM agent and RAG construction. Day-to-day with LangChain, LlamaIndex, and MCP — strong prompt engineering, function calling, and orchestration of multi-step AI workflows.
Solid Transformer internals. Hands-on SFT and RLHF on open models like Qwen and Llama. Production inference with vLLM — KV cache and PagedAttention for high-throughput, low-latency serving.
~10 years building backends in Python and Go. Independent architecture of high-concurrency systems with Django, FastAPI, Celery, Kafka, Redis, and Milvus — the substrate AI products run on.
Years operating where AI meets cybersecurity: risk analysis, automated vulnerability discovery, malicious-traffic intent classification with BERT and LLMs, and AI-driven security operations.
Tools I reach for without thinking. Grouped by layer — modeling, application, infrastructure, and the security domain context that informs all of them.
Roles described by domain and scope rather than by employer. The arc moves from data-driven security operations into AI-native security and applied LLM systems.
Pieces of work I'm proud of — picked because each one stitched modeling, retrieval, and production engineering together rather than living in a notebook.