
ARISHEM
Full-Stack Engineer • 10+ Years Experience
About
I'm a full-stack engineer with over a decade of experience building scalable applications, automation systems, and secure infrastructure. My love for coding began at age 11 — I used to get excited to get home from school just to write code and think about which features my community would love. That passion still drives me today.
In 2015, I built and scaled MMORPGs (Rise of Valor, Indo Nation) that grew to over 200 concurrent players worldwide and a total player base of16,000. With just $20 in starting capital ($10 for the domain, $10 for a VPS), the games went on to generate $500–$1,000 per week. That early experience taught me a lot about scalability, performance, and building community-focused products.
Since then, I’ve expanded my skill set across cybersecurity, DevOps,cloud architecture, and CI/CD. I build production-grade APIs withNestJS and Laravel, design automation and monitoring systems, and architect resilient cloud platforms on AWS, Azure, and GCP.
I’m also highly experienced in DDoS attack mitigation. I developed an automated detection and response system that integrates with the Cloudflare API to apply custom WAF rules in real-time during attacks and automatically roll them back once the threat subsides — balancing strong protection with uptime and performance.
For me, coding is more than work — it’s a lifelong passion. From the early days of building games to now designing large-scale systems, I still feel the same excitement every time I sit down to build something new.
Skills
Programming Languages
- TypeScript (Proficient)
- PHP (Proficient)
- Python (Proficient)
- JavaScript (Proficient)
- Bash
- Golang
Frontend Frameworks
- Next.js
- Vue.js
Backend Frameworks
- NestJS
- Laravel
- Django
Databases
- MySQL
- PostgreSQL
Cloud Platforms
- AWS
- Azure
- Google Cloud (GCP)
- UpCloud
Infrastructure & Orchestration
- Kubernetes
- Docker
- Jenkins
- 🗄️ Memcached
Monitoring & Observability
- Prometheus
- Grafana
Achievements
- SEO automation platform (OpenAI API + PHP) — 1B+ impressions and 50M organic clicks.
- Built MMORPGs at age 11 — scaled to 200 concurrent players across multiple countries.
- Designed DDoS mitigation pipeline with Cloudflare and custom log-based auto-blocking.
- Developed a Subdomain Enumeration & Security Audit Tool (Bash + Python) to identify and report dangling DNS records that could potentially lead to DNS takeover. Validated findings against multiple enterprise and academic domains (including Fortune 500 companies, major universities, and government-owned domains).
SEO & Growth
- Generated millions of SEO-optimized articles using OpenAI API + PHP in a Reuters style.
- Integrated Azure Translation API to translate content into multiple languages to scale global reach.
- Handled 50,000 concurrent requests with Memcached caching and efficient delivery.
- Tools: Ahrefs, SEMRush, ScreamingFrog for audits and backlink/keyword analysis.
DDoS Mitigation
I implemented a two-pronged approach: Cloudflare for edge-level mitigation (L3/L4/L7), and a custom server-side pipeline that works independently of Cloudflare:
- Ingest Apache access logs into a relational database using FileToDB for fast aggregation.
- Group and analyze requests by IP to compute hits, error ratios, and suspicious path patterns.
- Automatically block abusive IPs via a Bash script that writes to the firewall (iptables/ufw).
- Near real-time detection and blocking — typically blocks attackers within seconds while preserving legitimate traffic.
SQL example (aggregation):
-- Aggregate the last 5 minutes of requests and flag abusive IPs
-- Table example created by FileToDB from Apache access.log: access_logs(ip, method, path, status, ts)
SELECT
ip,
COUNT(*) AS hits_5m,
SUM(CASE WHEN status >= 500 THEN 1 ELSE 0 END) AS errors_5xx,
COUNT(DISTINCT path) AS unique_paths
FROM access_logs
WHERE ts >= NOW() - INTERVAL 5 MINUTE
GROUP BY ip
HAVING hits_5m > 500 -- threshold example: >500 hits in 5 minutes
OR errors_5xx > 50 -- many 5xx errors
OR unique_paths < 3 -- low variety indicates repeated path targeting
ORDER BY hits_5m DESC;
Bash example (auto-block):
#!/usr/bin/env bash
# block-abusers.sh — query MySQL for abusive IPs and block them automatically
# Requires: mysql client, iptables or ufw. Run as root or with sudo.
DB_HOST="127.0.0.1"
DB_USER="root"
DB_PASS="your_password here"
DB_NAME="logs_db"
THROTTLE_FILE="/var/run/blocked-ips.cache" # to avoid re-blocking same IPs
FIREWALL="iptables" # or "ufw"
SQL="SELECT ip FROM (
SELECT ip, COUNT(*) AS hits
FROM access_logs
WHERE ts >= NOW() - INTERVAL 5 MINUTE
GROUP BY ip
) t
WHERE hits > 500;"
# ensure cache file exists
touch "$THROTTLE_FILE"
IPS=$(mysql -h "$DB_HOST" -u "$DB_USER" -p"$DB_PASS" -D "$DB_NAME" -N -e "$SQL")
if [ -z "$IPS" ]; then
echo "$(date) — No abusive IPs detected."
exit 0
fi
for IP in $IPS; do
# skip if already blocked in cache
if grep -q "^$IP$" "$THROTTLE_FILE"; then
continue
fi
echo "$(date) — Blocking $IP"
if [ "$FIREWALL" = "ufw" ]; then
ufw deny from "$IP" comment "auto-ddos-block"
else
# iptables block (IPv4)
iptables -A INPUT -s "$IP" -j DROP
# optional: persist with iptables-save on your distro
fi
# add to cache
echo "$IP" >> "$THROTTLE_FILE"
done
DevOps Engineer Experience
- Designed and implemented Infrastructure as Code (IaC) to provision and manage cloud resources, ensuring repeatability and faster environment rollouts.
- Reviewed and optimized Kubernetes deployments using Rancher and Helm, improving stability, autoscaling behavior and resource efficiency.
- Automated AWS resource provisioning (
EC2
,S3
,VPC
,Lambda
,RDS
) using Bash/Python scripts and AWX (Ansible) to improve security posture and simplify stateful management. - Built onboarding automation for developer access (SSH key provisioning + IAM role assignment), enabling secure and auditable access control.
- Implemented monitoring and observability for infra & apps, with actionable notes and roadmaps for continuous improvement.
Projects & Security Tools
- SEO Automation Platform — PHP tunneling system + OpenAI API + Memcached + Azure Translation API; generates millions of unique articles with hashed keys stored in MySQL to prevent scraping. Achieved 1B+ impressions & 50M clicks. Also created automated content generators for Webflow & Shopify using their APIs combined with OpenAI GPT-3.5-turbo and Azure Translation API.
- DDoS Mitigation Service & Pipeline — Monitors traffic spikes and automatically applies custom WAF rules via Cloudflare API when under attack, then disables them when the attack ends. Includes custom log parsing (FileToDB) and auto-blocking scripts for servers not behind Cloudflare CDN.
- Subdomain Enumeration Tool (Bash & Python) — Scans for active and misconfigured subdomains, detects dangling DNS records with potential for DNS takeover, and produces reports for mitigation. Used for client security assessments and proactive DevSecOps hardening. Includes a tool to automate the discovery of live Amazon EC2 IPs for subdomain takeover testing, programmatically creating and deleting instances until the target IP was verified.
- ASN Database for Security & Geo-Targeting — Created a database storing thousands of subnets with their ASN (Autonomous System Number), geolocation, and proxy/VPN/Tor status, enabling advanced network verification and targeting.
- Geoblocking & Cloaking System — Developed a content cloaking system that restricts access to specific regions or ASNs, verifying users against the ASN database to block proxy, VPN, or Tor connections, ensuring only legitimate traffic from targeted locations can access the content.