Open to IT Support & SOC Roles

Anthony
Fisher

CompTIA Network+ & Security+ certified. Sales background. Blue Team mindset. Building toward a career protecting the businesses that matter.

Anthony Fisher
2×
CompTIA Certs
5+
Years in Sales
3
Active Lab Projects
// 01 — About

Not a career
changer. A career
builder.

Sales isn't just something I do — it's something I come from.

I grew up around a Ford dealership my family owned for over 60 years. Watching my father and grandfather work with genuine passion and integrity, I absorbed that approach without even realizing it. And it goes back further than them — from my great-grandfather's flower shop to a great-great-grandfather who was a rubber goods salesman in the early 1900s, entrepreneurship and salesmanship have been woven into my family for generations.

I started at the bottom of that dealership as a part-time sales assistant, worked there for five years, and eventually had enough confidence to start my own business. When COVID hit, I stepped back, went back to school, and graduated into a world full of uncertainty. I picked up work in landscaping, moved up quickly, and even helped build a brand new sales role from scratch within that company — exactly the kind of challenge I gravitate toward.

Through all of it, the throughline has always been people — understanding them, earning their trust, and solving their problems.

Now I'm channeling that foundation into cybersecurity. I hold both CompTIA Network+ and Security+ certifications and I've been building hands-on skills through VM labs. My goal is Blue Team / defensive security — specifically protecting small and medium businesses with an e-commerce presence. As commerce moves increasingly online, so do the threats against it — and that's exactly where I want to be.

I'm not a career changer who stumbled into tech. I'm someone who's spent their whole life learning how to understand people and solve problems — and now I'm adding the technical skills to back it up.

Quick Stats
CompTIA Network+ certified
CompTIA Security+ certified
5+ years customer-facing sales
Active home lab — Wireshark, pfSense, Linux
Target: Blue Team / SOC
Focus: E-commerce threat protection
// 02 — Skills

What I bring
to the table

📡
Network Analysis
Wireshark packet capture, traffic analysis, protocol identification, anomaly detection.
🔒
Firewall & Security
pfSense configuration, network segmentation, rule-based access control.
🐧
Linux
CLI navigation, file permissions, basic scripting — fluency in progress.
🖥️
Virtualization
Spinning up and managing VMs for isolated lab environments and security testing.
🤝
Communication
Translating technical problems into plain language. Built from years of customer-facing work.
🧠
Pattern Recognition
Spotting what's off — in a conversation or in a packet capture. Same instinct, different context.
Certifications
🏅
CompTIA Network+
CompTIA
✓ Earned
🛡️
CompTIA Security+
CompTIA
✓ Earned
☁️
Cloud Fundamentals
In planning
Planned
// 03 — Lab Work

Hands-on from
day one

Wireshark Packet Analysis
Network Analysis Blue Team VM Lab
Captured and analyzed live network traffic in a VM environment to identify protocols, spot anomalies, and practice reading packet data at depth.
Takeaway: How to filter and interpret traffic — foundational for SOC work and threat detection.
pfSense Firewall Configuration
Firewall Network Security VM Lab
Configured a virtual firewall to control and monitor traffic between network segments, applying real-world security policies in a safe lab environment.
Takeaway: Hands-on understanding of network segmentation, access control, and perimeter defense thinking.
Linux CLI Foundations
Linux Command Line Scripting
Built comfort with the Linux command line — file navigation, permissions management, and basic commands used throughout security workflows.
Takeaway: Linux is everywhere in security. Getting fluent early is table stakes.

→ GitHub documentation in progress. Write-ups coming soon.

// 04 — Where I'm Headed

The plan is
deliberate

Now — Phase 1
Getting to Work
Turning certifications into hands-on proof. Building a consistent lab routine around Linux, Python scripting, and Wireshark. Documenting everything on GitHub so the work is visible.
3–6 Months — Phase 2
Building Credibility
Expanding the home lab — Active Directory, logging, simulated SOC workflows. Getting real-world experience in an IT support or entry-level security role and learning everything I can from it.
6–12 Months — Phase 3
Growing Into the Role
Moving into a dedicated security role — SOC analyst, security engineer, or similar. Deepening cloud and SaaS knowledge. Specialising in the threats that matter most to online businesses.
Long-Term
The Bigger Picture
Becoming someone who bridges the gap between technical security and the business owners who need it — particularly in e-commerce. Someone who understands both worlds and can protect what people have built.
// 05 — Connect

Let's talk

The best way to reach me is through LinkedIn. I'm always open to conversations about IT, security, and opportunities.