Entry-Level IT Support | CompTIA A+, Network+, Security+
I'm an entry-level IT professional based in West Springfield Massachusetts with CompTIA A+, Network+, and Security+ certifications. I'm passionate about cybersecurity and building toward a career in SOC work. Outside of my job, I spend most of my time in home labs — setting up Active Directory environments, SIEM monitoring with Wazuh, and exploring how real attacks work. I'm always looking to connect with IT professionals and recruiters in the field.
Built a Windows Server home lab simulating a small business environment. Promoted the server to a domain controller, created the lab.local domain, configured OUs, user accounts, and a HelpDesk security group. Joined a Windows 10 Pro client to the domain and troubleshot a one-way firewall connectivity issue between the server and client.
View on GitHub
AD Users and Computers — lab.local domain with OUs, users, and HelpDesk group
Client1 successfully joined to lab.local domain
Firewall rule enabled — bidirectional ping restored
Deployed a local osTicket help desk environment on Windows using XAMPP, Apache, PHP, and MySQL. Configured departments, roles, and agents to simulate a small support team. Practiced a full ticket lifecycle — from creation and routing to resolution and closure — using a realistic password reset scenario.
View on GitHub
Agent roster — 4 agents assigned across departments
Departments configured — IT Support, Accounts/Access, Hardware
Full ticket lifecycle — created, routed, resolved, and closed
XAMPP Control Panel — Apache and MySQL serving the osTicket application
Deployed a Wazuh SIEM environment on an Ubuntu Linux VM and connected a Raspberry Pi as an endpoint agent. Configured port forwarding and firewall rules to establish communication between the agent and manager. Successfully enrolled the Pi, verified the agent connection, and used the Wazuh dashboard to monitor authentication failure events and SSH activity in real time.
View on GitHub
Raspberry Pi — wazuh-agent service active and running successfully
Wazuh dashboard — 10 authentication failure events detected from the Pi endpoint
Event log — SSH authentication failures and PAM login events from raspberrypi agent
Port forwarding rules — configured to allow agent-manager communication on ports 1514 and 1515
Built a Windows VM lab to simulate and diagnose a real-world DNS misconfiguration. The VM could ping IP addresses but could not resolve domain names. Used ping and nslookup to identify the issue as a misconfigured DNS server setting, corrected the TCP/IPv4 settings, and restored full connectivity.
View on GitHub
Broken state — ping 8.8.8.8 succeeds but nslookup google.com fails
TCP/IPv4 settings — where the DNS misconfiguration was identified and corrected
Fixed — ping google.com resolving successfully after DNS correction
Built a self-hosted remote camera system using a Raspberry Pi, go2rtc, and Tailscale. Scanned the network to locate an IP camera, pulled its raw RTSP stream, and set up go2rtc on the Pi to relay the feed. Installed Tailscale to create a private VPN tunnel, allowing secure remote access to the camera stream from a phone without any port forwarding or third-party cloud services.
View on GitHub
Tailscale dashboard — Raspberry Pi and phone connected to private tailnet
go2rtc running on the Pi via VNC — listening on Tailscale IP 100.116.224.7
go2rtc web UI accessed remotely from phone over Tailscale VPN
Deployed the OWASP Juice Shop intentionally vulnerable web application on a Raspberry Pi using Docker. Installed Docker on Raspberry Pi OS, verified the installation with a hello-world container, pulled the Juice Shop image, and ran it as a container on port 3000. Used the app as a hands-on environment to explore web application vulnerabilities.
View on GitHub
Docker installed on Raspberry Pi — hello-world container confirmed working
Juice Shop container pulled and running on port 3000
OWASP Juice Shop live in browser — accessible at 10.0.0.44:3000
West Springfield, MA
alvaradoantrun@gmail.com
413-265-3422