Skip to content
View BecomingCyber's full-sized avatar

Block or report BecomingCyber

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
BecomingCyber/README.md

πŸ›‘οΈ Mozella L. McCoy-Flowers (Zella)

Cybersecurity | Digital Forensics | Incident Response | SOC Operations


🎯 Professional Summary

Cybersecurity student and U.S. Navy veteran βš•οΈ with a focus on digital forensics, incident response, and threat detection.

Experienced in analyzing system and network activity, identifying malicious behavior, and documenting findings using industry tools such as Splunk, Wireshark, and Linux-based systems.

Demonstrated ability to investigate security events, extract indicators of compromise (IOCs), and support defensive security operations aligned with SOC and DFIR workflows.


πŸŽ“ Education & Training

  • πŸŽ“ Virginia State University
    B.S. Criminal Justice β€” Cybersecurity & Digital Forensics

  • πŸŽ“ Ivy Tech Community College
    Cybersecurity & Digital Forensics Certificate (Completed β€” 2024)

    • Digital forensic investigation and evidence analysis
    • Tools: FTK, Linux, JavaScript, C++
  • πŸŽ“ Coastal Carolina Community College
    A.A.S. Criminal Justice β€” Latent Evidence


πŸŽ–οΈ Military & Professional Background

  • βš•οΈ U.S. Navy Veteran β€” Hospital Corpsman
  • πŸ₯ Medical Supply Technician & Trainer (VA Medical Center)
  • πŸ“‹ Experienced in documentation, compliance, and operational procedures
  • πŸ” Strong investigative mindset with attention to detail and accuracy

🧠 Core Competencies

  • Incident Response & Threat Detection
  • Digital Forensics (Linux & Windows)
  • Log Analysis (Splunk, Zeek)
  • Network Traffic Analysis (Wireshark, tcpdump)
  • Malware & Phishing Analysis
  • Threat Intelligence & IOC Identification
  • System Hardening & Defensive Security

πŸ₯‡ Key Investigation Project

Suspicious Bash Activity Investigation (Linux DFIR)

  • Analyzed suspicious bash script execution on a Linux host
  • Reviewed command history and system logs to identify malicious activity
  • Detected persistence mechanisms and abnormal system behavior
  • Documented findings in a structured incident response format

πŸ”— https://github.com/BecomingCyber/suspicious-bash-lab-day12


πŸ“Š Technical Project Experience

Area Project
Linux Forensics Suspicious Bash Lab β€” Day 12
Persistence Analysis CronJob Persistence Lab β€” Day 13
Windows Incident Response PowerShell IR Lab β€” Day 14
Network Forensics Network IR Lab β€” Day 15
Brute Force Detection SSH Brute Force Lab β€” Day 18
SIEM Log Analysis Splunk + Zeek Analysis β€” Day 20
Phishing Investigation Phishing Analysis Lab
Threat Intelligence Threat Intel Lab
Malware Analysis Malware Analysis Lab

πŸ› οΈ Tools & Technologies

Network Analysis: Wireshark, tcpdump, Zeek, Nmap
SIEM & Monitoring: Splunk
Systems: Linux (Kali, Ubuntu), Windows
Scripting: Python, Bash, PowerShell
Forensics Tools: FTK
Security Tools: UFW Firewall, PentBox Honeypot
Development: Git, GitHub, VS Code


πŸŽ“ Certifications

  • CompTIA Security+ (In Progress)
  • Google IT Support Professional Certificate
  • IBM Cybersecurity Analyst Professional Certificate
  • Lean Six Sigma Green Belt
  • Lean Six Sigma Yellow Belt

πŸš€ Cybersecurity Operations Portfolio

Completed a structured 30-Day SOC Analyst Challenge covering:

  • Network traffic analysis and packet inspection
  • Incident response investigations
  • SIEM-based log analysis
  • Malware and phishing analysis
  • Threat intelligence and IOC tracking

All projects are documented with findings, tools used, and investigation steps.


πŸ“« Contact

Pinned Loading

  1. suspicious-bash-lab-day12 suspicious-bash-lab-day12 Public

    πŸ›‘οΈ Linux IR Lab: Investigated and mitigated a suspicious bash script with command-line tools