Cybersecurity student and U.S. Navy veteran βοΈ with a focus on digital forensics, incident response, and threat detection.
Experienced in analyzing system and network activity, identifying malicious behavior, and documenting findings using industry tools such as Splunk, Wireshark, and Linux-based systems.
Demonstrated ability to investigate security events, extract indicators of compromise (IOCs), and support defensive security operations aligned with SOC and DFIR workflows.
-
π Virginia State University
B.S. Criminal Justice β Cybersecurity & Digital Forensics -
π Ivy Tech Community College
Cybersecurity & Digital Forensics Certificate (Completed β 2024)- Digital forensic investigation and evidence analysis
- Tools: FTK, Linux, JavaScript, C++
-
π Coastal Carolina Community College
A.A.S. Criminal Justice β Latent Evidence
- βοΈ U.S. Navy Veteran β Hospital Corpsman
- π₯ Medical Supply Technician & Trainer (VA Medical Center)
- π Experienced in documentation, compliance, and operational procedures
- π Strong investigative mindset with attention to detail and accuracy
- Incident Response & Threat Detection
- Digital Forensics (Linux & Windows)
- Log Analysis (Splunk, Zeek)
- Network Traffic Analysis (Wireshark, tcpdump)
- Malware & Phishing Analysis
- Threat Intelligence & IOC Identification
- System Hardening & Defensive Security
- Analyzed suspicious bash script execution on a Linux host
- Reviewed command history and system logs to identify malicious activity
- Detected persistence mechanisms and abnormal system behavior
- Documented findings in a structured incident response format
π https://github.com/BecomingCyber/suspicious-bash-lab-day12
| Area | Project |
|---|---|
| Linux Forensics | Suspicious Bash Lab β Day 12 |
| Persistence Analysis | CronJob Persistence Lab β Day 13 |
| Windows Incident Response | PowerShell IR Lab β Day 14 |
| Network Forensics | Network IR Lab β Day 15 |
| Brute Force Detection | SSH Brute Force Lab β Day 18 |
| SIEM Log Analysis | Splunk + Zeek Analysis β Day 20 |
| Phishing Investigation | Phishing Analysis Lab |
| Threat Intelligence | Threat Intel Lab |
| Malware Analysis | Malware Analysis Lab |
Network Analysis: Wireshark, tcpdump, Zeek, Nmap
SIEM & Monitoring: Splunk
Systems: Linux (Kali, Ubuntu), Windows
Scripting: Python, Bash, PowerShell
Forensics Tools: FTK
Security Tools: UFW Firewall, PentBox Honeypot
Development: Git, GitHub, VS Code
- CompTIA Security+ (In Progress)
- Google IT Support Professional Certificate
- IBM Cybersecurity Analyst Professional Certificate
- Lean Six Sigma Green Belt
- Lean Six Sigma Yellow Belt
Completed a structured 30-Day SOC Analyst Challenge covering:
- Network traffic analysis and packet inspection
- Incident response investigations
- SIEM-based log analysis
- Malware and phishing analysis
- Threat intelligence and IOC tracking
All projects are documented with findings, tools used, and investigation steps.
- πΌ LinkedIn: https://linkedin.com/in/mozella-mccoy-flowers
- π» GitHub: https://github.com/BecomingCyber
