// Systems & Automation · DevSecOps · Agentic AI
Systems & Automation Engineer | AI-Native Orchestration | Shifting Security Left at Scale.
I orchestrate autonomous infrastructure engineered for high availability and security-first logic. Threat modeling and automated validation are built into the pipeline — not bolted on. AI agents serve as the force multiplier for implementation velocity.
UET Lahore
2023 – Present
Neural Workflows — Human architecture. AI-amplified throughput.
I operate with Cursor, Claude, and Cline as an integrated execution layer — not as assistants, but as a coordinated implementation engine. I own the high-level system architecture, security threat models, and business logic. The AI agents handle implementation throughput, boilerplate elimination, and rapid iteration cycles.
The result is senior-level output velocity from a single engineer. Complex systems ship in days, not sprints. Every architectural decision is deliberate; cognitive overhead is offloaded precisely where it doesn't require human judgment.
AI-first editor. Context-aware, codebase-wide agentic execution across the entire project graph.
Primary reasoning engine. Architecture review, threat modeling, and complex logic synthesis.
Autonomous coding agent. Multi-file edits, shell execution, and end-to-end task completion with zero hand-holding.
// output_model
Human provides → Architecture + Security Judgment
AI Agents provide → Implementation Throughput
→ Net result: 10× velocity. Zero quality compromise.
Technologies I deploy to build secure, autonomous, and high-throughput systems.
// primary_stack
Systems engineered for security, scale, and precision — not classroom exercises.
A hardened multi-tenant SaaS infrastructure piece built on ASP.NET Core. The core innovation is a Proprietary Time-Lock Engine — cryptographically enforced, time-gated session windows that eliminate proxy abuse at the authentication layer. Implements strict tenant data isolation via row-level security policies, ensuring zero cross-tenant bleed across institutional boundaries.
A full-stack voting platform engineered around Cryptographic Anonymity. Implements Ring Signature schemes to guarantee mathematically provable voter anonymity while preserving full auditability on a tamper-evident ledger. OTP-gated authentication enforces one-identity-one-vote integrity without de-anonymizing the vote record.
A raw-HTTP fuzzer built for responsible bug-bounty recon — Burp Intruder without the bloat. Delivers async TUI + Tkinter GUI modes with a token-bucket RPS limiter, auto-pause on 429 / 5xx storms, scope enforcement, macro pre-request flows for CSRF extraction, and SQLite / CSV output with credential masking. Safety guardrails baked in, not bolted on.