Paul Harrison Logo Image
Paul Harrison

I'm Paul Harrison.
I build scalable software.

Computer Science @ Michigan | SWE + AI + Security

I design and ship full-stack products across modern web stacks and cloud infrastructure. My recent work spans Vue + TypeScript frontends, FastAPI services, data pipelines, and ML-assisted systems focused on reliability, performance, and strong engineering fundamentals.

About Me

Get to know me

I'm Paul Harrison, a Software Engineering-focused Computer Science student at the University of Michigan. I enjoy building production-minded systems where clean architecture, strong UX, and measurable impact all matter.

From backend APIs and data workflows to frontend product experiences, I like owning features end-to-end. I care about pragmatic engineering: writing maintainable code, validating with real users, and continuously improving performance and reliability.
Feel free to contact me here.

My Skills

TypeScript
JavaScript
C++
Python
SQL
Vue 3
React
FastAPI
Flask
PostgreSQL
Firebase
Docker
Google Cloud Run
Git

Technical Experience Internship experience building and shipping software in startup and product environments.

Whomlab · Full-Stack Software Engineer Intern

Architected a Vue 3 + TypeScript frontend with responsive components, MediaRecorder-based audio capture, and Pinia state management. Built FastAPI + Firebase backend services for survey workflows, auth, and audio response handling with robust validation and service-layer abstractions.

Charlemagne Labs · AI & Security Software Engineering Intern

Built fine-tuning and inference optimization pipelines for small language models on cybersecurity datasets, and developed evaluation infrastructure to benchmark accuracy, latency, and robustness across realistic threat scenarios.

SupermaxCloud · Cybersecurity & Infrastructure Engineering Intern

Automated vulnerability scanning and observability workflows using SIEM tooling, infrastructure monitoring, and security policy automation, reducing manual security assessment effort while improving detection and response coverage.

Projects Selected software projects with a focus on full-stack engineering, data systems, and production deployment.

Whaleden project screenshot

Whaleden Comic Artist Discovery System

Building a multi-source talent discovery pipeline to identify and rank 500+ comic artists across Bluesky and Reddit. Includes resilient scraping architecture, deduplication, normalized storage, and planned CV/LLM-based portfolio scoring for style and quality analysis.

Project 3 Screenshot

PassSec

Full-stack web app for Security+ preparation with React + Tailwind frontend, Flask REST API, JWT authentication, and PostgreSQL-backed quiz content. Features domain-based filtering, history tracking, and cloud deployment across Google Cloud Run and Netlify.

CHECK ME OUT!

Simon Smiles

Real-time facial expression game powered by Flask, OpenCV, and FER inference, with a responsive browser UI and webcam integration. Deployed to Google Cloud Run with production HTTPS and CORS configuration.

OR CHECK ME OUT!
Project 2 Screenshot
SecVault screenshot

SecVault

End-to-end encryption directly in the browser with AES-256 applied client-side before upload, so private files remain private from source to storage.

OR EVEN CHECK ME OUT!

Notes, Bonus Projects, Labs, Certs, & Misc Hands-on labs, mini-projects, and exercises exploring cybersecurity concepts, risk assessments, and security tooling.

Google Cybersecurity Certificate Cover

Google Cybersecurity Professional Certificate: Mini-projects, labs, notes

Comprehensive notes, detailed lab write-ups, and mini-projects covering risk management, network security, system hardening, SIEM analysis, incident response, and digital forensics.

Explore!

Passive Recon – [REDACTED]

Performed passive reconnaissance on a live domain using DNS, WHOIS, Shodan, and DNSDumpster. Created a detailed PDF report including findings and security recommendations. Attached is a redacted version.

View Full Report (PDF)
Passive Recon Overview
Anonymized Home Network Topology

Anonymized Home Network Topology

A scan & diagram of my home LAN (192.168.1.0/24) created with Nmap and manually anonymized for this portfolio. Highlights device roles, IPs, and network flow from WAN→Firewall→Router→Switch→Clients.

View Full Diagram

Contact Don't hesitate to shoot me an e-mail!