🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Intelligence Planner (Cybersecurity Intelligence Planner)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Conduct presentations of analytic findings.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Prepare plans to intercept foreign communications transmissions.

  • Develop defense plans or tactics, using intelligence and other information.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Study communication code languages or foreign languages to translate intelligence.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Validate known intelligence with data from other sources.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Identify gaps in information.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

Technologies & Software

  • C++
  • Oracle Java
  • Data mining software
  • Microsoft PowerPoint
  • Amazon Web Services AWS software
  • Google Earth Pro
  • Microsoft Office software
  • UNIX
  • Geographic information system GIS systems
  • Perplexity AI
  • Geographic information system GIS software
  • Mistral (Mistral AI)
  • LexisNexis
  • DeepSeek
  • ESRI ArcView
  • Veritas NetBackup
  • Automated Targeting System ATS
  • Refugee, Asylum and Parole System RAPS
  • JavaScript
  • TensorFlow
  • Email software
  • Python
  • ChatGPT (OpenAI)
  • Link analysis software
  • Microsoft PowerShell
  • Django
  • Llama (Meta)
  • Graphics creation software
  • Web browser software
  • Firewall software
  • Hypertext markup language HTML
  • Microsoft Word
  • Consular Consolidated Database CCD
  • Arrival Departure Information System ADIS
  • Bing
  • Encryption software
  • Snort
  • Myspace
  • Text mining software
  • Student and Exchange Visitor Information System SEVIS
  • Microsoft Visio
  • Palantir AI
  • Qwen (Alibaba)
  • Apache Spark
  • Kimi (Moonshot AI)
  • Palantir Intelligence
  • McAfee
  • Tableau
  • IBM i2 Analyst's Notebook
  • Enforcement Case Tracking System ENFORCE
  • Telephone analysis software
  • NortonLifeLock cybersecurity software
  • Apache Kafka
  • SAP software
  • Grok (xAI)
  • Motorola Solutions AI
  • Timeline software
  • Oracle PeopleSoft
  • Microsoft Azure software
  • Chatbot software
  • Relational database management software
  • Microsoft Excel
  • Operating system software
  • Facebook
  • Claude (Anthropic)
  • Telephone records software
  • Apache Hive
  • LinkedIn
  • Microsoft SQL Server
  • Flowcharting software
  • ESRI ArcGIS software
  • Splunk Enterprise
  • Nova (Amazon)
  • Linux
  • National Crime Information Center (NCIC) database
  • Microsoft Outlook
  • Computer Linked Application Information Management System CLAIMS
  • SAS
  • Photo enhancement software
  • Apache Hadoop
  • Google Cloud software
  • Oracle Business Intelligence Enterprise Edition
  • Statistical analysis software
  • Microsoft SharePoint
  • R
  • Axon AI
  • Teradata Database
  • Google
  • Thomson Reuters CLEAR
  • Apache Pig
  • Treasury Enforcement Communications System TECS
  • Gemini (Google)
  • Data visualization software
  • Amazon Simple Storage Service S3
  • Structured query language SQL
  • Biometric Storage System BSS
  • Wireshark
  • Microsoft Access
  • Smart phones
  • Digital video cameras
  • Statistical calculators
  • Laser facsimile machines
  • Computer laser printers
  • Color copiers
  • Laptop computers
  • Plotting printers
  • Color laser printers
  • Document scanners
  • Multimedia presentation projectors
  • Digital still cameras
  • Desktop computers

Alternative Job Titles