🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “All Source Intelligence Analyst” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“All Source Intelligence Analyst” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“All Source Intelligence Analyst” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Develop defense plans or tactics, using intelligence and other information.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Prepare plans to intercept foreign communications transmissions.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Conduct presentations of analytic findings.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Validate known intelligence with data from other sources.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Study communication code languages or foreign languages to translate intelligence.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Identify gaps in information.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

Technologies & Software

  • Wireshark
  • Linux
  • LexisNexis
  • Apache Pig
  • Link analysis software
  • Microsoft Azure software
  • Consular Consolidated Database CCD
  • NortonLifeLock cybersecurity software
  • Computer Linked Application Information Management System CLAIMS
  • Relational database management software
  • DeepSeek
  • Microsoft Access
  • Mistral (Mistral AI)
  • JavaScript
  • LinkedIn
  • Thomson Reuters CLEAR
  • ESRI ArcView
  • McAfee
  • National Crime Information Center (NCIC) database
  • Apache Spark
  • Enforcement Case Tracking System ENFORCE
  • IBM i2 Analyst's Notebook
  • Statistical analysis software
  • Web browser software
  • Operating system software
  • Teradata Database
  • Kimi (Moonshot AI)
  • Encryption software
  • Graphics creation software
  • Microsoft PowerShell
  • Apache Kafka
  • Django
  • Nova (Amazon)
  • Telephone analysis software
  • C++
  • ESRI ArcGIS software
  • Veritas NetBackup
  • Perplexity AI
  • Oracle PeopleSoft
  • Bing
  • Microsoft Outlook
  • Python
  • UNIX
  • Tableau
  • Firewall software
  • Hypertext markup language HTML
  • Oracle Java
  • R
  • Oracle Business Intelligence Enterprise Edition
  • Microsoft Excel
  • Photo enhancement software
  • Splunk Enterprise
  • Geographic information system GIS systems
  • Microsoft Word
  • Timeline software
  • Axon AI
  • ChatGPT (OpenAI)
  • Automated Targeting System ATS
  • Telephone records software
  • Text mining software
  • Microsoft Visio
  • Google Cloud software
  • Grok (xAI)
  • Qwen (Alibaba)
  • Structured query language SQL
  • Motorola Solutions AI
  • Gemini (Google)
  • Data mining software
  • Microsoft PowerPoint
  • Biometric Storage System BSS
  • Chatbot software
  • Arrival Departure Information System ADIS
  • Palantir AI
  • Student and Exchange Visitor Information System SEVIS
  • Apache Hadoop
  • Microsoft Office software
  • Amazon Simple Storage Service S3
  • Claude (Anthropic)
  • Google
  • TensorFlow
  • Palantir Intelligence
  • Llama (Meta)
  • Refugee, Asylum and Parole System RAPS
  • Flowcharting software
  • Data visualization software
  • Snort
  • Amazon Web Services AWS software
  • SAP software
  • Email software
  • SAS
  • Myspace
  • Google Earth Pro
  • Treasury Enforcement Communications System TECS
  • Apache Hive
  • Microsoft SharePoint
  • Geographic information system GIS software
  • Microsoft SQL Server
  • Facebook
  • Digital still cameras
  • Digital video cameras
  • Statistical calculators
  • Laser facsimile machines
  • Desktop computers
  • Document scanners
  • Computer laser printers
  • Color laser printers
  • Plotting printers
  • Smart phones
  • Color copiers
  • Laptop computers
  • Multimedia presentation projectors

Alternative Job Titles