🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Defense Analyst (Cybersecurity Defense Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Defense Analyst (Cybersecurity Defense Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Defense Analyst (Cybersecurity Defense Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Identify gaps in information.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Validate known intelligence with data from other sources.

  • Study communication code languages or foreign languages to translate intelligence.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Prepare plans to intercept foreign communications transmissions.

  • Develop defense plans or tactics, using intelligence and other information.

  • Conduct presentations of analytic findings.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

Technologies & Software

  • Microsoft Outlook
  • Treasury Enforcement Communications System TECS
  • Palantir AI
  • Geographic information system GIS systems
  • Consular Consolidated Database CCD
  • TensorFlow
  • ESRI ArcGIS software
  • Microsoft SQL Server
  • Microsoft Azure software
  • Timeline software
  • Motorola Solutions AI
  • Encryption software
  • Myspace
  • C++
  • LexisNexis
  • Google
  • Wireshark
  • Geographic information system GIS software
  • Structured query language SQL
  • R
  • Palantir Intelligence
  • Microsoft PowerShell
  • Microsoft Word
  • Thomson Reuters CLEAR
  • Telephone records software
  • Linux
  • Enforcement Case Tracking System ENFORCE
  • Microsoft Access
  • NortonLifeLock cybersecurity software
  • IBM i2 Analyst's Notebook
  • Microsoft PowerPoint
  • McAfee
  • Link analysis software
  • SAP software
  • Firewall software
  • Google Cloud software
  • Llama (Meta)
  • Python
  • Apache Pig
  • Splunk Enterprise
  • Google Earth Pro
  • National Crime Information Center (NCIC) database
  • Amazon Simple Storage Service S3
  • Computer Linked Application Information Management System CLAIMS
  • LinkedIn
  • Automated Targeting System ATS
  • Qwen (Alibaba)
  • JavaScript
  • Graphics creation software
  • SAS
  • Chatbot software
  • Email software
  • Apache Spark
  • Photo enhancement software
  • ESRI ArcView
  • Apache Hadoop
  • Kimi (Moonshot AI)
  • Telephone analysis software
  • Teradata Database
  • Arrival Departure Information System ADIS
  • Claude (Anthropic)
  • DeepSeek
  • Oracle Business Intelligence Enterprise Edition
  • Snort
  • Oracle Java
  • Student and Exchange Visitor Information System SEVIS
  • Bing
  • Data mining software
  • Biometric Storage System BSS
  • Refugee, Asylum and Parole System RAPS
  • Perplexity AI
  • Hypertext markup language HTML
  • Mistral (Mistral AI)
  • Nova (Amazon)
  • Amazon Web Services AWS software
  • Microsoft Office software
  • Microsoft SharePoint
  • Apache Hive
  • Operating system software
  • Microsoft Visio
  • Relational database management software
  • Data visualization software
  • Web browser software
  • Veritas NetBackup
  • Axon AI
  • Facebook
  • Text mining software
  • Statistical analysis software
  • Microsoft Excel
  • Django
  • Oracle PeopleSoft
  • Flowcharting software
  • ChatGPT (OpenAI)
  • UNIX
  • Gemini (Google)
  • Tableau
  • Grok (xAI)
  • Apache Kafka
  • Statistical calculators
  • Color laser printers
  • Computer laser printers
  • Color copiers
  • Digital video cameras
  • Laser facsimile machines
  • Laptop computers
  • Digital still cameras
  • Desktop computers
  • Smart phones
  • Document scanners
  • Multimedia presentation projectors
  • Plotting printers

Alternative Job Titles