🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Identify gaps in information.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study communication code languages or foreign languages to translate intelligence.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Validate known intelligence with data from other sources.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Develop defense plans or tactics, using intelligence and other information.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Prepare plans to intercept foreign communications transmissions.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Conduct presentations of analytic findings.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

Technologies & Software

  • Python
  • Biometric Storage System BSS
  • NortonLifeLock cybersecurity software
  • Telephone analysis software
  • Hypertext markup language HTML
  • Snort
  • Qwen (Alibaba)
  • Wireshark
  • Structured query language SQL
  • Student and Exchange Visitor Information System SEVIS
  • Text mining software
  • IBM i2 Analyst's Notebook
  • Bing
  • C++
  • Relational database management software
  • Veritas NetBackup
  • Kimi (Moonshot AI)
  • ESRI ArcGIS software
  • UNIX
  • Flowcharting software
  • Telephone records software
  • Computer Linked Application Information Management System CLAIMS
  • Encryption software
  • Data visualization software
  • Arrival Departure Information System ADIS
  • Automated Targeting System ATS
  • Google Cloud software
  • Chatbot software
  • Microsoft Visio
  • SAS
  • Microsoft Word
  • Nova (Amazon)
  • LinkedIn
  • National Crime Information Center (NCIC) database
  • Microsoft SQL Server
  • Oracle Business Intelligence Enterprise Edition
  • Facebook
  • Apache Spark
  • Microsoft Office software
  • Apache Hive
  • Gemini (Google)
  • Geographic information system GIS systems
  • Microsoft SharePoint
  • Thomson Reuters CLEAR
  • Amazon Web Services AWS software
  • Oracle PeopleSoft
  • Operating system software
  • Tableau
  • Teradata Database
  • Motorola Solutions AI
  • Email software
  • Perplexity AI
  • Enforcement Case Tracking System ENFORCE
  • Linux
  • Microsoft Excel
  • Microsoft Azure software
  • Microsoft Outlook
  • Mistral (Mistral AI)
  • ChatGPT (OpenAI)
  • Google
  • Geographic information system GIS software
  • Refugee, Asylum and Parole System RAPS
  • Splunk Enterprise
  • Myspace
  • Statistical analysis software
  • Consular Consolidated Database CCD
  • Treasury Enforcement Communications System TECS
  • Amazon Simple Storage Service S3
  • Oracle Java
  • Axon AI
  • JavaScript
  • Web browser software
  • Photo enhancement software
  • Grok (xAI)
  • Google Earth Pro
  • Apache Kafka
  • Microsoft PowerPoint
  • Claude (Anthropic)
  • Timeline software
  • DeepSeek
  • R
  • ESRI ArcView
  • Django
  • Microsoft Access
  • Palantir Intelligence
  • Graphics creation software
  • Llama (Meta)
  • Apache Pig
  • TensorFlow
  • Data mining software
  • LexisNexis
  • Palantir AI
  • McAfee
  • Apache Hadoop
  • SAP software
  • Microsoft PowerShell
  • Firewall software
  • Link analysis software
  • Computer laser printers
  • Desktop computers
  • Document scanners
  • Plotting printers
  • Smart phones
  • Digital video cameras
  • Laptop computers
  • Statistical calculators
  • Color laser printers
  • Color copiers
  • Multimedia presentation projectors
  • Laser facsimile machines
  • Digital still cameras

Alternative Job Titles