Backend & AI Engineer

José González Oliva

Traceable, reproducible and operable AI backends HARNESS

FastAPI RAG LLMOps Observability Automation

Architecture Comparison

Strategic approaches to structuring AI systems based on operational complexity and control requirements.

cloud

Cloud

Managed services, APIs and agents in the cloud. Faster deployment but higher dependency on external pricing and limited internal control.

STRATEGY
Prioritize managed services and speed.
hub

OpenClaw

Agent-oriented architecture with routing, plugins and background workflows. Persistent daemon connected to apps and sessions.

STRATEGY
Focus on multi-agent workflow complexity.
CORE SYSTEM
security

NUCLEO

Controlled execution focus. Built-in runtime, decoupled from the model. Explicit boundaries for tools, contracts, and RAG evidence.

STRATEGY
Localized, auditable, and traceable.

Main projects

Controlled local AI runtime

FastAPI backend with explicit request/response contracts, bot/backend services, and per-execution traceability.

FastAPI Runtime Tracing
Read case study arrow_forward

Evidence-first document RAG

A RAG flow that checks whether evidence exists before asking the model to answer, with explicit EVIDENCE_FOUND states.

RAG Evidence Documents
Read case study arrow_forward

Telegram + observability

Secondary operational channel for testing the backend, with JSONL traces, token metrics, and latency/error status.

Telegram JSONL Metrics
Read case study arrow_forward
Interview briefing

Governed AI execution, explained for interviews

This section connects my backend AI work with security, identity, cloud operations and organizational adoption. The point is not to claim production ownership of enterprise IAM/PAM platforms, but to explain the operating model behind NUCLEO: identity-aware, policy-controlled, traceable execution.

PAM/IAM maps naturally to AI agent governance PAM and IAM governance mapping to controlled AI agent execution, approvals, audit logs and least privilege.

Interview message: the same logic used to control human and service access also applies to AI agents. A model should not call tools, secrets or business actions without identity context, policy checks, approvals and audit records.

  • IAM answers who is requesting and under which role.
  • PAM controls high-risk actions, privileged sessions and secret access.
  • NUCLEO applies the same pattern to agent execution: request, policy, tool contract, approval gate, trace.
Why my profile fits PAM/IAM integration conversations Explanation of IAM, PAM and profile fit for enterprise security, Microsoft identity, automation and governed AI access.

Interview message: I am not positioning myself as a pure CyberArk product specialist. The fit is integration and governance: enterprise systems, Microsoft identity, automation, SAP context and auditable AI or Copilot-style access.

  • IAM verifies identity, roles, SSO and MFA.
  • PAM grants temporary elevated access and monitors critical actions.
  • My AI governance work extends that logic to tool permissions, traces and approval flows.
AI literacy is not the same as AI culture Comparison between AI literacy and AI culture, emphasizing workflow redesign over prompt training.

Interview message: teaching prompts is useful, but it is not a full AI strategy. The harder problem is redesigning workflows, deciding what should be automated, measuring outcomes and changing how teams operate.

  • AI literacy improves existing tasks.
  • AI culture questions whether the task should exist in its current form.
  • My work focuses on operational systems: workflows, controls, evaluation and measurable change.
Backend is the control room behind cloud and AI systems Backend control layer for Azure cloud environments covering APIs, identity, data, secrets, monitoring, deployment and reliability.

Interview message: backend engineering is the control layer that makes cloud and AI systems observable, secure and recoverable. This connects directly with my focus on FastAPI runtimes, traces, provider adapters and controlled tool execution.

  • APIs, service logic and integrations define the operating boundary.
  • Identity, secrets, logs, health checks and observability keep systems controllable.
  • The same backend mindset supports AI agents, Copilot-style tools and local/hybrid LLM runtimes.

Execution metrics

Every AI execution should leave an inspection record. The example below is synthetic and shows how the backend can record model, retrieval status, tokens, latency and result status.

1730ms Latency
19.4 Tokens/sec
JSONL_DEBUG_LOG
{
  "trace_id": "trc_public_demo_ok_001",
  "source": "telegram",
  "provider": "ollama",
  "model": "local-model-demo",
  "retrieval_status": "evidence_found",
  "tokens_input": 1210,
  "tokens_output": 286,
  "latency_ms": 1730,
  "output_tokens_per_second": 19.4,
  "status": "ok"
}

Technical stack

terminal

Backend

Python, FastAPI, HTTP contracts, payload validation, layered services and local APIs.

neurology

AI / LLM

Document RAG, local models, provider adapters, prompt policies and model output checks.

database

Data

JSON contracts, synthetic traces, retrieval metadata, document chunks and auditable response records.

monitoring

Operations

Latency, token counts, error states, JSON/JSONL logs and deterministic evals for drift detection.

lan

Integrations

Static web pages, Telegram bots and backend APIs used to test AI flows through real channels.

Current limitations

  • warning Advanced prototype; not a production system.
  • warning Local experimental backend, not a deployment-ready platform yet.
  • warning Observability is local and JSON-based, not centralized production monitoring.
  • warning No public validation for high concurrency.