🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Defense Forensics Analyst (Cybersecurity Defense Forensics Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Defense Forensics Analyst (Cybersecurity Defense Forensics Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Defense Forensics Analyst (Cybersecurity Defense Forensics Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Validate known intelligence with data from other sources.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Identify gaps in information.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Conduct presentations of analytic findings.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Prepare plans to intercept foreign communications transmissions.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Study communication code languages or foreign languages to translate intelligence.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Develop defense plans or tactics, using intelligence and other information.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

Technologies & Software

  • Link analysis software
  • Text mining software
  • Gemini (Google)
  • Consular Consolidated Database CCD
  • Microsoft Outlook
  • LinkedIn
  • Google
  • Palantir Intelligence
  • Student and Exchange Visitor Information System SEVIS
  • Google Cloud software
  • ESRI ArcGIS software
  • Enforcement Case Tracking System ENFORCE
  • SAP software
  • C++
  • Linux
  • Microsoft PowerPoint
  • Microsoft Access
  • Motorola Solutions AI
  • Google Earth Pro
  • UNIX
  • Microsoft Office software
  • Perplexity AI
  • Grok (xAI)
  • Microsoft SharePoint
  • Apache Kafka
  • Computer Linked Application Information Management System CLAIMS
  • Teradata Database
  • JavaScript
  • Geographic information system GIS software
  • Flowcharting software
  • ChatGPT (OpenAI)
  • Splunk Enterprise
  • Apache Spark
  • Kimi (Moonshot AI)
  • Apache Pig
  • Telephone records software
  • Timeline software
  • Amazon Web Services AWS software
  • Myspace
  • Python
  • Geographic information system GIS systems
  • Apache Hive
  • Palantir AI
  • McAfee
  • National Crime Information Center (NCIC) database
  • R
  • Operating system software
  • Encryption software
  • Veritas NetBackup
  • Refugee, Asylum and Parole System RAPS
  • ESRI ArcView
  • TensorFlow
  • Thomson Reuters CLEAR
  • Qwen (Alibaba)
  • Photo enhancement software
  • SAS
  • IBM i2 Analyst's Notebook
  • Firewall software
  • Oracle PeopleSoft
  • Email software
  • Microsoft PowerShell
  • Wireshark
  • Microsoft Azure software
  • Web browser software
  • Data mining software
  • Bing
  • DeepSeek
  • Arrival Departure Information System ADIS
  • Oracle Business Intelligence Enterprise Edition
  • Microsoft Visio
  • Mistral (Mistral AI)
  • Nova (Amazon)
  • Treasury Enforcement Communications System TECS
  • Data visualization software
  • Microsoft Word
  • Llama (Meta)
  • Relational database management software
  • Amazon Simple Storage Service S3
  • Snort
  • Statistical analysis software
  • Graphics creation software
  • Oracle Java
  • NortonLifeLock cybersecurity software
  • Telephone analysis software
  • Facebook
  • Microsoft Excel
  • Tableau
  • Hypertext markup language HTML
  • Structured query language SQL
  • Claude (Anthropic)
  • Chatbot software
  • Automated Targeting System ATS
  • Apache Hadoop
  • Microsoft SQL Server
  • LexisNexis
  • Axon AI
  • Django
  • Biometric Storage System BSS
  • Color laser printers
  • Multimedia presentation projectors
  • Color copiers
  • Digital still cameras
  • Document scanners
  • Laptop computers
  • Desktop computers
  • Computer laser printers
  • Laser facsimile machines
  • Digital video cameras
  • Statistical calculators
  • Smart phones
  • Plotting printers

Alternative Job Titles