🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Target Network Analyst (Cybersecurity Target Network Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Target Network Analyst (Cybersecurity Target Network Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Target Network Analyst (Cybersecurity Target Network Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Identify gaps in information.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Study communication code languages or foreign languages to translate intelligence.

  • Conduct presentations of analytic findings.

  • Validate known intelligence with data from other sources.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Prepare plans to intercept foreign communications transmissions.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Develop defense plans or tactics, using intelligence and other information.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

Technologies & Software

  • Palantir Intelligence
  • Data visualization software
  • Bing
  • Photo enhancement software
  • LinkedIn
  • Kimi (Moonshot AI)
  • Oracle Java
  • Django
  • Palantir AI
  • Wireshark
  • Llama (Meta)
  • Timeline software
  • UNIX
  • SAS
  • Link analysis software
  • Veritas NetBackup
  • Qwen (Alibaba)
  • Statistical analysis software
  • Hypertext markup language HTML
  • Arrival Departure Information System ADIS
  • NortonLifeLock cybersecurity software
  • Enforcement Case Tracking System ENFORCE
  • Tableau
  • Motorola Solutions AI
  • Perplexity AI
  • Student and Exchange Visitor Information System SEVIS
  • Claude (Anthropic)
  • Amazon Simple Storage Service S3
  • Microsoft PowerPoint
  • ESRI ArcGIS software
  • Biometric Storage System BSS
  • Microsoft Word
  • McAfee
  • Oracle PeopleSoft
  • Operating system software
  • Graphics creation software
  • Structured query language SQL
  • Python
  • Microsoft PowerShell
  • Splunk Enterprise
  • Microsoft Azure software
  • Relational database management software
  • Email software
  • Data mining software
  • Consular Consolidated Database CCD
  • Nova (Amazon)
  • Apache Spark
  • Microsoft Outlook
  • Flowcharting software
  • Apache Hive
  • LexisNexis
  • DeepSeek
  • Geographic information system GIS software
  • Oracle Business Intelligence Enterprise Edition
  • Grok (xAI)
  • Snort
  • Google Cloud software
  • Google
  • Computer Linked Application Information Management System CLAIMS
  • Microsoft Excel
  • Treasury Enforcement Communications System TECS
  • National Crime Information Center (NCIC) database
  • Text mining software
  • Apache Hadoop
  • Linux
  • Facebook
  • Microsoft SharePoint
  • Axon AI
  • Firewall software
  • IBM i2 Analyst's Notebook
  • Mistral (Mistral AI)
  • Myspace
  • Gemini (Google)
  • Encryption software
  • R
  • Google Earth Pro
  • JavaScript
  • Amazon Web Services AWS software
  • Telephone analysis software
  • Web browser software
  • Refugee, Asylum and Parole System RAPS
  • Thomson Reuters CLEAR
  • ESRI ArcView
  • C++
  • Geographic information system GIS systems
  • Apache Pig
  • Automated Targeting System ATS
  • Microsoft Visio
  • Microsoft SQL Server
  • Telephone records software
  • Chatbot software
  • Microsoft Access
  • SAP software
  • Microsoft Office software
  • TensorFlow
  • ChatGPT (OpenAI)
  • Apache Kafka
  • Teradata Database
  • Plotting printers
  • Digital still cameras
  • Laptop computers
  • Color laser printers
  • Desktop computers
  • Color copiers
  • Smart phones
  • Multimedia presentation projectors
  • Laser facsimile machines
  • Computer laser printers
  • Digital video cameras
  • Document scanners
  • Statistical calculators

Alternative Job Titles