🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Conduct presentations of analytic findings.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Study communication code languages or foreign languages to translate intelligence.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Validate known intelligence with data from other sources.

  • Prepare plans to intercept foreign communications transmissions.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Develop defense plans or tactics, using intelligence and other information.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Identify gaps in information.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

Technologies & Software

  • R
  • Qwen (Alibaba)
  • Geographic information system GIS software
  • Photo enhancement software
  • Oracle PeopleSoft
  • Operating system software
  • Llama (Meta)
  • Student and Exchange Visitor Information System SEVIS
  • Treasury Enforcement Communications System TECS
  • Automated Targeting System ATS
  • Wireshark
  • ESRI ArcView
  • SAS
  • Microsoft PowerPoint
  • Palantir AI
  • Biometric Storage System BSS
  • Kimi (Moonshot AI)
  • Microsoft SharePoint
  • Apache Hive
  • Linux
  • Nova (Amazon)
  • Geographic information system GIS systems
  • Apache Pig
  • National Crime Information Center (NCIC) database
  • Myspace
  • Microsoft Word
  • LinkedIn
  • Text mining software
  • Palantir Intelligence
  • McAfee
  • Enforcement Case Tracking System ENFORCE
  • Graphics creation software
  • Email software
  • Data visualization software
  • Apache Spark
  • Telephone records software
  • Amazon Web Services AWS software
  • Timeline software
  • Microsoft Outlook
  • IBM i2 Analyst's Notebook
  • ChatGPT (OpenAI)
  • Refugee, Asylum and Parole System RAPS
  • Teradata Database
  • SAP software
  • Motorola Solutions AI
  • Google
  • ESRI ArcGIS software
  • Structured query language SQL
  • Microsoft PowerShell
  • Microsoft Access
  • Apache Hadoop
  • C++
  • Perplexity AI
  • Statistical analysis software
  • Telephone analysis software
  • Django
  • Flowcharting software
  • Mistral (Mistral AI)
  • Hypertext markup language HTML
  • Firewall software
  • LexisNexis
  • Web browser software
  • Veritas NetBackup
  • Snort
  • Microsoft SQL Server
  • JavaScript
  • Oracle Business Intelligence Enterprise Edition
  • Amazon Simple Storage Service S3
  • Bing
  • Arrival Departure Information System ADIS
  • Microsoft Office software
  • Claude (Anthropic)
  • DeepSeek
  • Consular Consolidated Database CCD
  • NortonLifeLock cybersecurity software
  • Microsoft Visio
  • Microsoft Azure software
  • Grok (xAI)
  • TensorFlow
  • UNIX
  • Axon AI
  • Apache Kafka
  • Gemini (Google)
  • Encryption software
  • Relational database management software
  • Tableau
  • Data mining software
  • Python
  • Google Cloud software
  • Computer Linked Application Information Management System CLAIMS
  • Chatbot software
  • Google Earth Pro
  • Oracle Java
  • Splunk Enterprise
  • Thomson Reuters CLEAR
  • Microsoft Excel
  • Facebook
  • Link analysis software
  • Statistical calculators
  • Color copiers
  • Digital video cameras
  • Smart phones
  • Document scanners
  • Color laser printers
  • Desktop computers
  • Digital still cameras
  • Multimedia presentation projectors
  • Plotting printers
  • Computer laser printers
  • Laptop computers
  • Laser facsimile machines

Alternative Job Titles