🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Cyber Threat Intelligence Analyst (Cybersecurity Threat Intelligence Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Cyber Threat Intelligence Analyst (Cybersecurity Threat Intelligence Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Cyber Threat Intelligence Analyst (Cybersecurity Threat Intelligence Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Study communication code languages or foreign languages to translate intelligence.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Identify gaps in information.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Validate known intelligence with data from other sources.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Conduct presentations of analytic findings.

  • Prepare plans to intercept foreign communications transmissions.

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Develop defense plans or tactics, using intelligence and other information.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

Technologies & Software

  • Hypertext markup language HTML
  • Data visualization software
  • Treasury Enforcement Communications System TECS
  • Microsoft PowerPoint
  • Grok (xAI)
  • Google Earth Pro
  • Snort
  • Microsoft Visio
  • ChatGPT (OpenAI)
  • Web browser software
  • SAP software
  • Computer Linked Application Information Management System CLAIMS
  • National Crime Information Center (NCIC) database
  • NortonLifeLock cybersecurity software
  • Veritas NetBackup
  • LinkedIn
  • Microsoft PowerShell
  • Telephone analysis software
  • Oracle PeopleSoft
  • Teradata Database
  • Nova (Amazon)
  • ESRI ArcView
  • Palantir AI
  • Text mining software
  • Graphics creation software
  • Email software
  • Structured query language SQL
  • Consular Consolidated Database CCD
  • Chatbot software
  • Student and Exchange Visitor Information System SEVIS
  • Relational database management software
  • Linux
  • Wireshark
  • Apache Kafka
  • Qwen (Alibaba)
  • McAfee
  • Apache Hive
  • Telephone records software
  • Apache Spark
  • TensorFlow
  • Amazon Simple Storage Service S3
  • SAS
  • Microsoft Excel
  • Bing
  • Myspace
  • ESRI ArcGIS software
  • Statistical analysis software
  • Enforcement Case Tracking System ENFORCE
  • Perplexity AI
  • R
  • Microsoft Access
  • Arrival Departure Information System ADIS
  • Claude (Anthropic)
  • Tableau
  • Encryption software
  • Python
  • IBM i2 Analyst's Notebook
  • DeepSeek
  • Apache Hadoop
  • Firewall software
  • Thomson Reuters CLEAR
  • Amazon Web Services AWS software
  • Microsoft Outlook
  • Refugee, Asylum and Parole System RAPS
  • Geographic information system GIS software
  • Facebook
  • JavaScript
  • UNIX
  • Flowcharting software
  • Microsoft Office software
  • Mistral (Mistral AI)
  • Microsoft SQL Server
  • Photo enhancement software
  • Apache Pig
  • Geographic information system GIS systems
  • Oracle Java
  • Timeline software
  • Operating system software
  • Microsoft SharePoint
  • Palantir Intelligence
  • Llama (Meta)
  • Microsoft Azure software
  • Biometric Storage System BSS
  • Motorola Solutions AI
  • Google
  • Axon AI
  • Gemini (Google)
  • Splunk Enterprise
  • Data mining software
  • Google Cloud software
  • Django
  • C++
  • Oracle Business Intelligence Enterprise Edition
  • Automated Targeting System ATS
  • Kimi (Moonshot AI)
  • LexisNexis
  • Link analysis software
  • Microsoft Word
  • Plotting printers
  • Document scanners
  • Digital video cameras
  • Digital still cameras
  • Color laser printers
  • Laser facsimile machines
  • Computer laser printers
  • Laptop computers
  • Color copiers
  • Multimedia presentation projectors
  • Smart phones
  • Statistical calculators
  • Desktop computers

Alternative Job Titles