🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber All Source Analyst (Cybersecurity All Source Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber All Source Analyst (Cybersecurity All Source Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber All Source Analyst (Cybersecurity All Source Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Validate known intelligence with data from other sources.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Conduct presentations of analytic findings.

  • Develop defense plans or tactics, using intelligence and other information.

  • Prepare plans to intercept foreign communications transmissions.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Study communication code languages or foreign languages to translate intelligence.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Identify gaps in information.

Technologies & Software

  • Kimi (Moonshot AI)
  • Amazon Simple Storage Service S3
  • Firewall software
  • Llama (Meta)
  • Encryption software
  • Photo enhancement software
  • Link analysis software
  • Graphics creation software
  • Consular Consolidated Database CCD
  • TensorFlow
  • Apache Pig
  • Statistical analysis software
  • Microsoft Access
  • Text mining software
  • Amazon Web Services AWS software
  • Oracle PeopleSoft
  • Relational database management software
  • Data visualization software
  • Axon AI
  • Motorola Solutions AI
  • C++
  • Microsoft Word
  • Geographic information system GIS systems
  • JavaScript
  • LinkedIn
  • Tableau
  • Qwen (Alibaba)
  • Microsoft Azure software
  • Microsoft SQL Server
  • Chatbot software
  • Apache Kafka
  • ChatGPT (OpenAI)
  • Oracle Business Intelligence Enterprise Edition
  • ESRI ArcGIS software
  • IBM i2 Analyst's Notebook
  • Thomson Reuters CLEAR
  • Data mining software
  • Palantir AI
  • Microsoft PowerPoint
  • Google
  • Microsoft Visio
  • Grok (xAI)
  • Structured query language SQL
  • Telephone records software
  • UNIX
  • NortonLifeLock cybersecurity software
  • Microsoft SharePoint
  • Microsoft Excel
  • Apache Hive
  • Google Earth Pro
  • Refugee, Asylum and Parole System RAPS
  • Perplexity AI
  • Operating system software
  • Biometric Storage System BSS
  • Wireshark
  • Apache Spark
  • Microsoft Outlook
  • Claude (Anthropic)
  • Apache Hadoop
  • Geographic information system GIS software
  • Nova (Amazon)
  • Linux
  • DeepSeek
  • SAP software
  • SAS
  • Automated Targeting System ATS
  • Bing
  • Mistral (Mistral AI)
  • Arrival Departure Information System ADIS
  • Python
  • Teradata Database
  • Snort
  • Flowcharting software
  • Microsoft PowerShell
  • Email software
  • McAfee
  • Telephone analysis software
  • ESRI ArcView
  • Microsoft Office software
  • R
  • Splunk Enterprise
  • Timeline software
  • Facebook
  • Hypertext markup language HTML
  • Veritas NetBackup
  • Student and Exchange Visitor Information System SEVIS
  • Web browser software
  • Treasury Enforcement Communications System TECS
  • LexisNexis
  • Computer Linked Application Information Management System CLAIMS
  • Enforcement Case Tracking System ENFORCE
  • Google Cloud software
  • Myspace
  • Django
  • National Crime Information Center (NCIC) database
  • Gemini (Google)
  • Oracle Java
  • Palantir Intelligence
  • Multimedia presentation projectors
  • Smart phones
  • Laser facsimile machines
  • Digital still cameras
  • Color copiers
  • Computer laser printers
  • Color laser printers
  • Digital video cameras
  • Plotting printers
  • Document scanners
  • Laptop computers
  • Statistical calculators
  • Desktop computers

Alternative Job Titles