Antrun Alvarado at his computer setup

Antrun Alvarado

Entry-Level IT Support | CompTIA A+, Network+, Security+

About Me

I'm an entry-level IT professional based in West Springfield Massachusetts with CompTIA A+, Network+, and Security+ certifications. I'm passionate about cybersecurity and building toward a career in SOC work. Outside of my job, I spend most of my time in home labs — setting up Active Directory environments, SIEM monitoring with Wazuh, and exploring how real attacks work. I'm always looking to connect with IT professionals and recruiters in the field.

Skills

Certifications

CompTIA A+ CompTIA Network+ CompTIA Security+ Secure Infrastructure Specialist

Operating Systems

Windows Ubuntu Linux

Tools

Wazuh SIEM VirtualBox osTicket XAMPP Apache MySQL phpMyAdmin SSH VNC

Networking

TCP/IP DNS DHCP NAT Static IP Subnetting Port Forwarding

Security

SIEM Log Monitoring Firewall Troubleshooting RBAC Access Permissions

IT Support

Ticketing Systems Issue Documentation Escalation POS/Kiosk Troubleshooting Customer Communication

Other

Python (Basic) HTML/CSS/JavaScript (Basic) Microsoft Office Google Workspace ECLIPSE WMS

Projects

Active Directory Home Lab

Built a Windows Server home lab simulating a small business environment. Promoted the server to a domain controller, created the lab.local domain, configured OUs, user accounts, and a HelpDesk security group. Joined a Windows 10 Pro client to the domain and troubleshot a one-way firewall connectivity issue between the server and client.

View on GitHub
Windows Server Active Directory DNS VirtualBox Windows Defender Firewall
Active Directory Users and Computers

AD Users and Computers — lab.local domain with OUs, users, and HelpDesk group

Client joined to domain

Client1 successfully joined to lab.local domain

Firewall fix and successful ping

Firewall rule enabled — bidirectional ping restored

osTicket Help Desk Lab

Deployed a local osTicket help desk environment on Windows using XAMPP, Apache, PHP, and MySQL. Configured departments, roles, and agents to simulate a small support team. Practiced a full ticket lifecycle — from creation and routing to resolution and closure — using a realistic password reset scenario.

View on GitHub
osTicket XAMPP Apache MySQL phpMyAdmin Windows Help Desk
osTicket Agents

Agent roster — 4 agents assigned across departments

osTicket Departments

Departments configured — IT Support, Accounts/Access, Hardware

Closed ticket thread

Full ticket lifecycle — created, routed, resolved, and closed

XAMPP Control Panel with Apache

XAMPP Control Panel — Apache and MySQL serving the osTicket application

Wazuh SIEM Lab

Deployed a Wazuh SIEM environment on an Ubuntu Linux VM and connected a Raspberry Pi as an endpoint agent. Configured port forwarding and firewall rules to establish communication between the agent and manager. Successfully enrolled the Pi, verified the agent connection, and used the Wazuh dashboard to monitor authentication failure events and SSH activity in real time.

View on GitHub
Wazuh SIEM Ubuntu Linux Raspberry Pi Log Monitoring VirtualBox Port Forwarding SSH
Wazuh agent running on Raspberry Pi

Raspberry Pi — wazuh-agent service active and running successfully

Wazuh dashboard

Wazuh dashboard — 10 authentication failure events detected from the Pi endpoint

Wazuh events log

Event log — SSH authentication failures and PAM login events from raspberrypi agent

Port forwarding rules

Port forwarding rules — configured to allow agent-manager communication on ports 1514 and 1515

Windows DNS Troubleshooting Lab

Built a Windows VM lab to simulate and diagnose a real-world DNS misconfiguration. The VM could ping IP addresses but could not resolve domain names. Used ping and nslookup to identify the issue as a misconfigured DNS server setting, corrected the TCP/IPv4 settings, and restored full connectivity.

View on GitHub
Windows DNS TCP/IP VirtualBox CMD nslookup
DNS broken state

Broken state — ping 8.8.8.8 succeeds but nslookup google.com fails

Ethernet Properties

TCP/IPv4 settings — where the DNS misconfiguration was identified and corrected

DNS fixed

Fixed — ping google.com resolving successfully after DNS correction

Remote IP Camera System with Tailscale & go2rtc

Built a self-hosted remote camera system using a Raspberry Pi, go2rtc, and Tailscale. Scanned the network to locate an IP camera, pulled its raw RTSP stream, and set up go2rtc on the Pi to relay the feed. Installed Tailscale to create a private VPN tunnel, allowing secure remote access to the camera stream from a phone without any port forwarding or third-party cloud services.

View on GitHub
Raspberry Pi Tailscale go2rtc RTSP Linux VPN Networking
Tailscale dashboard

Tailscale dashboard — Raspberry Pi and phone connected to private tailnet

go2rtc running on Pi

go2rtc running on the Pi via VNC — listening on Tailscale IP 100.116.224.7

go2rtc accessed from phone

go2rtc web UI accessed remotely from phone over Tailscale VPN

OWASP Juice Shop on Raspberry Pi

Deployed the OWASP Juice Shop intentionally vulnerable web application on a Raspberry Pi using Docker. Installed Docker on Raspberry Pi OS, verified the installation with a hello-world container, pulled the Juice Shop image, and ran it as a container on port 3000. Used the app as a hands-on environment to explore web application vulnerabilities.

View on GitHub
Docker Raspberry Pi OWASP Juice Shop Linux Web Application Security
Docker installed on Raspberry Pi

Docker installed on Raspberry Pi — hello-world container confirmed working

Juice Shop container running

Juice Shop container pulled and running on port 3000

Juice Shop in browser

OWASP Juice Shop live in browser — accessible at 10.0.0.44:3000

Contact

West Springfield, MA

alvaradoantrun@gmail.com

413-265-3422