🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Intelligence Specialist (Cybersecurity Intelligence Specialist)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Identify gaps in information.

  • Study communication code languages or foreign languages to translate intelligence.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Validate known intelligence with data from other sources.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Prepare plans to intercept foreign communications transmissions.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Conduct presentations of analytic findings.

  • Develop defense plans or tactics, using intelligence and other information.

Technologies & Software

  • Enforcement Case Tracking System ENFORCE
  • Statistical analysis software
  • Photo enhancement software
  • Python
  • Refugee, Asylum and Parole System RAPS
  • Amazon Web Services AWS software
  • Microsoft Outlook
  • LexisNexis
  • Amazon Simple Storage Service S3
  • Palantir AI
  • Google
  • Microsoft SQL Server
  • Microsoft Word
  • Apache Hive
  • Firewall software
  • Django
  • Apache Pig
  • Web browser software
  • Tableau
  • DeepSeek
  • Chatbot software
  • Operating system software
  • NortonLifeLock cybersecurity software
  • Structured query language SQL
  • Telephone records software
  • Geographic information system GIS systems
  • Text mining software
  • Facebook
  • Wireshark
  • Link analysis software
  • UNIX
  • Microsoft Azure software
  • ESRI ArcGIS software
  • Hypertext markup language HTML
  • Data mining software
  • Student and Exchange Visitor Information System SEVIS
  • Gemini (Google)
  • R
  • Splunk Enterprise
  • Treasury Enforcement Communications System TECS
  • ChatGPT (OpenAI)
  • SAP software
  • Oracle Business Intelligence Enterprise Edition
  • Microsoft Visio
  • IBM i2 Analyst's Notebook
  • Apache Spark
  • Llama (Meta)
  • Perplexity AI
  • Axon AI
  • McAfee
  • Google Earth Pro
  • Microsoft PowerShell
  • Linux
  • Microsoft Office software
  • C++
  • Thomson Reuters CLEAR
  • National Crime Information Center (NCIC) database
  • Graphics creation software
  • Arrival Departure Information System ADIS
  • Biometric Storage System BSS
  • Bing
  • Kimi (Moonshot AI)
  • Encryption software
  • Mistral (Mistral AI)
  • ESRI ArcView
  • LinkedIn
  • Oracle Java
  • Myspace
  • TensorFlow
  • Microsoft Access
  • Motorola Solutions AI
  • Snort
  • Email software
  • Teradata Database
  • Palantir Intelligence
  • Microsoft Excel
  • SAS
  • Nova (Amazon)
  • Apache Kafka
  • Data visualization software
  • Geographic information system GIS software
  • Veritas NetBackup
  • Apache Hadoop
  • Grok (xAI)
  • Automated Targeting System ATS
  • Oracle PeopleSoft
  • JavaScript
  • Timeline software
  • Google Cloud software
  • Telephone analysis software
  • Microsoft SharePoint
  • Qwen (Alibaba)
  • Relational database management software
  • Claude (Anthropic)
  • Microsoft PowerPoint
  • Consular Consolidated Database CCD
  • Computer Linked Application Information Management System CLAIMS
  • Flowcharting software
  • Digital video cameras
  • Document scanners
  • Multimedia presentation projectors
  • Computer laser printers
  • Smart phones
  • Color copiers
  • Plotting printers
  • Laptop computers
  • Laser facsimile machines
  • Color laser printers
  • Desktop computers
  • Digital still cameras
  • Statistical calculators

Alternative Job Titles