Paul Harrison Logo Image
Paul Harrison

I'm Paul Harrison.
I build software. Lately, it talks back.

Computer Science @ Michigan | AI + SWE + Security

I design and ship full-stack products across modern web stacks and cloud infrastructure. My recent work spans voice agents, LLM pipelines, Vue + TypeScript frontends, FastAPI services, and agentic systems — built with a focus on reliability, performance, and strong engineering fundamentals.

About Me

Get to know me

I'm Paul Harrison, a Software Engineering-focused Computer Science student at the University of Michigan. I enjoy building production-minded systems where clean architecture, strong UX, and measurable impact all matter.

From backend APIs and data workflows to frontend product experiences, I like owning features end-to-end. I care about pragmatic engineering: writing maintainable code, validating with real users, and continuously improving performance and reliability.
Feel free to contact me here.

My Skills

AI
Ollama
LiveKit
Whisper
Hugging Face
LoRA
Frontend
Vue 3
React
TypeScript
JavaScript
Backend
Python
C
C++
FastAPI
Flask
PostgreSQL
Firebase
SQL
Infra
Docker
Google Cloud Run
Git

Technical Experience Internship experience building and shipping AI-driven software in startup and product environments.

Whomlab · Full-Stack Software Engineer Intern

Designed and built a full conversational survey platform — LiveKit-powered voice agent with Whisper transcription at the core, Vue 3 + TypeScript frontend with MediaRecorder-based audio capture, and FastAPI + Firebase backend handling auth, survey workflows, and response storage.

Charlemagne Labs · AI & Security Software Engineering Intern

Built LoRA fine-tuning and inference optimization pipelines for Gemma 3 270M using Hugging Face, Ollama, and LiteLLM. Developed evaluation infrastructure to benchmark accuracy, latency, and robustness on phishing URL classification tasks.

SupermaxCloud · Cybersecurity & Infrastructure Engineering Intern

Automated vulnerability scanning and observability workflows using SIEM tooling, infrastructure monitoring, and security policy automation, reducing manual security assessment effort while improving detection and response coverage.

Projects Selected software projects with a focus on full-stack engineering, data systems, and production deployment.

Whaleden project screenshot

Whaleden Comic Artist Discovery System

An agentic data pipeline that discovers and ranks 500+ comic artists across Bluesky and Reddit. Features a 4-stage Ollama/Phi-3.5 LLM pipeline with schema-constrained JSON outputs and confidence thresholds, alongside resilient scraping, deduplication, and normalized storage.

Simon Smiles

Real-time facial expression game powered by Flask, OpenCV, and FER inference, with a responsive browser UI and webcam integration. Deployed to Google Cloud Run with production HTTPS and CORS configuration.

OR CHECK ME OUT!
Project 2 Screenshot
SecVault screenshot

SecVault

End-to-end encryption directly in the browser with AES-256 applied client-side before upload, so private files remain private from source to storage.

OR EVEN CHECK ME OUT!

Bonus Projects, Labs, & Certs Hands-on labs, mini-projects, and exercises exploring cybersecurity concepts, risk assessments, and security tooling.

PassSec Screenshot

PassSec

Full-stack web app for Security+ preparation with React + Tailwind frontend, Flask REST API, JWT authentication, and PostgreSQL-backed quiz content. Features domain-based filtering, history tracking, and a deployment plan for Google Cloud Run and Netlify.

CHECK ME OUT!
Google Cybersecurity Certificate Cover

Google Cybersecurity Professional Certificate: Mini-projects, labs, notes

Comprehensive notes, detailed lab write-ups, and mini-projects covering risk management, network security, system hardening, SIEM analysis, incident response, and digital forensics.

Explore!

Passive Recon – [REDACTED]

Performed passive reconnaissance on a live domain using DNS, WHOIS, Shodan, and DNSDumpster. Created a detailed PDF report including findings and security recommendations. Attached is a redacted version.

View Full Report (PDF)
Passive Recon Overview
Anonymized Home Network Topology

Anonymized Home Network Topology

A scan & diagram of my home LAN (192.168.1.0/24) created with Nmap and manually anonymized for this portfolio. Highlights device roles, IPs, and network flow from WAN→Firewall→Router→Switch→Clients.

View Full Diagram

Contact Don't hesitate to shoot me an e-mail!