🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber All Source Analyst (Cybersecurity All Source Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber All Source Analyst (Cybersecurity All Source Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber All Source Analyst (Cybersecurity All Source Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Validate known intelligence with data from other sources.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Study communication code languages or foreign languages to translate intelligence.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Prepare plans to intercept foreign communications transmissions.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Develop defense plans or tactics, using intelligence and other information.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Conduct presentations of analytic findings.

  • Identify gaps in information.

Technologies & Software

  • Nova (Amazon)
  • JavaScript
  • Microsoft PowerShell
  • Microsoft Visio
  • Relational database management software
  • Web browser software
  • Graphics creation software
  • Microsoft SQL Server
  • ESRI ArcGIS software
  • Bing
  • LinkedIn
  • Flowcharting software
  • Amazon Web Services AWS software
  • LexisNexis
  • NortonLifeLock cybersecurity software
  • McAfee
  • SAS
  • Consular Consolidated Database CCD
  • R
  • Microsoft Access
  • SAP software
  • Google
  • Telephone analysis software
  • Claude (Anthropic)
  • Student and Exchange Visitor Information System SEVIS
  • Enforcement Case Tracking System ENFORCE
  • TensorFlow
  • Oracle PeopleSoft
  • Treasury Enforcement Communications System TECS
  • Veritas NetBackup
  • Link analysis software
  • Statistical analysis software
  • Grok (xAI)
  • Apache Spark
  • Timeline software
  • Operating system software
  • Biometric Storage System BSS
  • Arrival Departure Information System ADIS
  • C++
  • Wireshark
  • Text mining software
  • Mistral (Mistral AI)
  • Microsoft SharePoint
  • Microsoft Word
  • Llama (Meta)
  • Apache Hive
  • Myspace
  • Apache Hadoop
  • Teradata Database
  • Palantir Intelligence
  • DeepSeek
  • Kimi (Moonshot AI)
  • Google Earth Pro
  • Data mining software
  • Facebook
  • Apache Kafka
  • Automated Targeting System ATS
  • Photo enhancement software
  • Axon AI
  • Google Cloud software
  • Motorola Solutions AI
  • Encryption software
  • Computer Linked Application Information Management System CLAIMS
  • Amazon Simple Storage Service S3
  • Oracle Java
  • Oracle Business Intelligence Enterprise Edition
  • Microsoft Office software
  • Chatbot software
  • Telephone records software
  • Microsoft PowerPoint
  • Structured query language SQL
  • National Crime Information Center (NCIC) database
  • IBM i2 Analyst's Notebook
  • ChatGPT (OpenAI)
  • Microsoft Azure software
  • Django
  • Qwen (Alibaba)
  • Microsoft Outlook
  • Snort
  • Perplexity AI
  • Data visualization software
  • Geographic information system GIS systems
  • UNIX
  • Thomson Reuters CLEAR
  • Microsoft Excel
  • Python
  • Refugee, Asylum and Parole System RAPS
  • Geographic information system GIS software
  • Gemini (Google)
  • Firewall software
  • Hypertext markup language HTML
  • Palantir AI
  • Tableau
  • Linux
  • Apache Pig
  • ESRI ArcView
  • Splunk Enterprise
  • Email software
  • Color laser printers
  • Laptop computers
  • Multimedia presentation projectors
  • Color copiers
  • Document scanners
  • Computer laser printers
  • Plotting printers
  • Digital still cameras
  • Smart phones
  • Statistical calculators
  • Laser facsimile machines
  • Desktop computers
  • Digital video cameras

Alternative Job Titles