Umair Mirxa lives and writes in Karachi, Pakistan. He is the Creator/Editor-in-Chief of Paper Djinn Press.
His first published story, ‘Awareness’, appeared on Spillwords Press. He has since had stories accepted for publication in anthologies from Black Hare Press, Fantasia Divinity Magazine & Publishing, Clarendon House Publications, Blood Song Books, Iron Faerie Publishing, The Reanimated Writers Press, and Zombie Pirate Publishing.
Most recently, the first poem he has ever written was published in ‘Poetica’, a poetry anthology by Clarendon House Publications. His stories also appear in The World of Myth and the Inner Circle Writers’ Group magazines.
The publication of these stories is the realization of a lifelong dream he first saw as a kid after reading ‘Adventures of a Wishing-Chair’ by Enid Blyton. The early dream, a casual hope of one day telling stories to the world himself, became a goal when his mother bought him the two-volume set, ‘Sherlock Holmes: The Complete Novels and Stories’ by Sir Arthur Conan Doyle, and it had transformed into a burning ambition by the time he’d finished reading ‘The Hobbit’ and ‘The Lord of the Rings’ by J.R.R. Tolkien.
He has been building his own fantasy world and populating it with characters, creatures, and stories ever since. Until such a day as it is ready to be revealed, he writes drabbles, flash fiction, and short stories for various anthologies.
Umair has been an event coordinator, an accountant, a teacher, a content writer, a digital marketer, and an online magazine’s founder/editor. He has dabbled in graphic design, web design, and more recently, has been trying to learn digital drawing and painting with varying degrees of failure.
He remains a massive Tolkien fan, loves everything to do with mythology, fantasy, and history, and wishes with all his heart that dragons were real. When he’s not writing, he enjoys reading novels and comic books, playing video games, listening to music, and watching movies, TV shows, and football as an Arsenal FC fan.
Follow his works and exploits on: