🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Threat Analyst (Cybersecurity Threat Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Threat Analyst (Cybersecurity Threat Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Threat Analyst (Cybersecurity Threat Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Develop defense plans or tactics, using intelligence and other information.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Validate known intelligence with data from other sources.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Conduct presentations of analytic findings.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Study communication code languages or foreign languages to translate intelligence.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Identify gaps in information.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Prepare plans to intercept foreign communications transmissions.

Technologies & Software

  • Mistral (Mistral AI)
  • Encryption software
  • ESRI ArcGIS software
  • Myspace
  • Claude (Anthropic)
  • Student and Exchange Visitor Information System SEVIS
  • McAfee
  • Relational database management software
  • Amazon Web Services AWS software
  • Graphics creation software
  • Qwen (Alibaba)
  • Grok (xAI)
  • Google
  • Google Earth Pro
  • ChatGPT (OpenAI)
  • National Crime Information Center (NCIC) database
  • Python
  • Veritas NetBackup
  • R
  • Microsoft Visio
  • Bing
  • Link analysis software
  • Amazon Simple Storage Service S3
  • Arrival Departure Information System ADIS
  • Hypertext markup language HTML
  • Apache Hive
  • Llama (Meta)
  • Gemini (Google)
  • Structured query language SQL
  • Data mining software
  • Motorola Solutions AI
  • Snort
  • SAS
  • Microsoft Word
  • Microsoft Excel
  • Facebook
  • ESRI ArcView
  • LinkedIn
  • Email software
  • Axon AI
  • Apache Spark
  • IBM i2 Analyst's Notebook
  • LexisNexis
  • Chatbot software
  • Tableau
  • TensorFlow
  • Web browser software
  • Microsoft Access
  • Splunk Enterprise
  • Microsoft SQL Server
  • Perplexity AI
  • SAP software
  • Refugee, Asylum and Parole System RAPS
  • Text mining software
  • UNIX
  • Microsoft Office software
  • Apache Pig
  • Flowcharting software
  • Django
  • Microsoft Azure software
  • NortonLifeLock cybersecurity software
  • Apache Hadoop
  • JavaScript
  • Geographic information system GIS systems
  • Oracle PeopleSoft
  • Microsoft PowerPoint
  • Apache Kafka
  • Linux
  • Oracle Business Intelligence Enterprise Edition
  • DeepSeek
  • Wireshark
  • Computer Linked Application Information Management System CLAIMS
  • C++
  • Kimi (Moonshot AI)
  • Firewall software
  • Telephone records software
  • Consular Consolidated Database CCD
  • Biometric Storage System BSS
  • Microsoft Outlook
  • Automated Targeting System ATS
  • Palantir Intelligence
  • Operating system software
  • Timeline software
  • Photo enhancement software
  • Geographic information system GIS software
  • Oracle Java
  • Statistical analysis software
  • Enforcement Case Tracking System ENFORCE
  • Thomson Reuters CLEAR
  • Data visualization software
  • Teradata Database
  • Microsoft PowerShell
  • Treasury Enforcement Communications System TECS
  • Google Cloud software
  • Palantir AI
  • Nova (Amazon)
  • Microsoft SharePoint
  • Telephone analysis software
  • Desktop computers
  • Computer laser printers
  • Digital video cameras
  • Statistical calculators
  • Color laser printers
  • Digital still cameras
  • Plotting printers
  • Color copiers
  • Laptop computers
  • Multimedia presentation projectors
  • Document scanners
  • Laser facsimile machines
  • Smart phones

Alternative Job Titles