🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     🤖 BARBIE MODE ACTIVATED 💗    Your adblocker was detected!    Comic Sans has been applied as cosmic punishment 💅    Ads keep this database FREE — please whitelist replacedbyrobot.info!    ✨ Everything is pink and that's entirely your fault ✨    🌸                     
Automation Risk Analysis

Will “Threat Intelligence Analyst (Threat Intel Analyst)” be Automated?

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

AI Exposure Risk

64%

“Threat Intelligence Analyst (Threat Intel Analyst)” will maybe be replaced by AI.

Based on the cognitive demands, communication requirements, and logical reasoning intrinsic to this occupation according to O*NET data, we project a 64% probability of disruption by generative AI and Large Language Models.

Automation & Robot Risk

28%

“Threat Intelligence Analyst (Threat Intel Analyst)” will almost certainly not be replaced by robots.

Evaluating the physical dexterity, repetitive motion tasks, and manual labor associated with this role, our analysis indicates a 28% likelihood of substitution by advanced robotics systems.

Personal & Financial Insights

Every occupation has a unique profile. For Intelligence Analysts, the Bureau of Labor Statistics and O*NET classify the day-to-day work broadly as: Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

Job Title & Hierarchy Code (SOC) Intelligence Analysts #33-3021.06
ℹ️

Data is based on the reference occupation: “Intelligence Analysts”

Advertisement

A robot took your ad!

Ads keep this free database of 57,000+ jobs alive. Please whitelist replacedbyrobot.info — we promise our ads are tasteful!

Core Skills & Abilities

  • Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.

  • Develop defense plans or tactics, using intelligence and other information.

  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.

  • Gather intelligence information by field observation, confidential information sources, or public records.

  • Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.

  • Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.

  • Analyze intelligence data to identify patterns and trends in criminal activity.

  • Conduct presentations of analytic findings.

  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.

  • Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.

  • Link or chart suspects to criminal organizations or events to determine activities and interrelationships.

  • Identify gaps in information.

  • Study communication code languages or foreign languages to translate intelligence.

  • Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.

  • Study the assets of criminal suspects to determine the flow of money from or to targeted groups.

  • Prepare plans to intercept foreign communications transmissions.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.

  • Establish criminal profiles to aid in connecting criminal organizations with their members.

  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.

  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Validate known intelligence with data from other sources.

Technologies & Software

  • Thomson Reuters CLEAR
  • Facebook
  • Splunk Enterprise
  • Chatbot software
  • Gemini (Google)
  • Apache Hadoop
  • Palantir Intelligence
  • Python
  • Relational database management software
  • Apache Kafka
  • Microsoft Word
  • DeepSeek
  • Google Earth Pro
  • JavaScript
  • Structured query language SQL
  • Motorola Solutions AI
  • Llama (Meta)
  • Microsoft Azure software
  • UNIX
  • Student and Exchange Visitor Information System SEVIS
  • Automated Targeting System ATS
  • ChatGPT (OpenAI)
  • Oracle Java
  • Nova (Amazon)
  • Oracle Business Intelligence Enterprise Edition
  • R
  • Microsoft SQL Server
  • Grok (xAI)
  • McAfee
  • ESRI ArcGIS software
  • Telephone analysis software
  • Apache Hive
  • Google
  • ESRI ArcView
  • Hypertext markup language HTML
  • NortonLifeLock cybersecurity software
  • Web browser software
  • Amazon Web Services AWS software
  • Encryption software
  • Consular Consolidated Database CCD
  • Qwen (Alibaba)
  • Oracle PeopleSoft
  • Myspace
  • Geographic information system GIS software
  • Django
  • Apache Spark
  • Google Cloud software
  • Photo enhancement software
  • Graphics creation software
  • Data mining software
  • Microsoft PowerShell
  • Bing
  • TensorFlow
  • Linux
  • LexisNexis
  • Microsoft Access
  • Timeline software
  • Claude (Anthropic)
  • Apache Pig
  • Snort
  • Biometric Storage System BSS
  • SAS
  • Refugee, Asylum and Parole System RAPS
  • Wireshark
  • Palantir AI
  • Geographic information system GIS systems
  • Microsoft Outlook
  • LinkedIn
  • Data visualization software
  • Microsoft SharePoint
  • Tableau
  • Email software
  • SAP software
  • Treasury Enforcement Communications System TECS
  • National Crime Information Center (NCIC) database
  • Mistral (Mistral AI)
  • Enforcement Case Tracking System ENFORCE
  • Telephone records software
  • Amazon Simple Storage Service S3
  • Text mining software
  • Statistical analysis software
  • Perplexity AI
  • C++
  • Link analysis software
  • Microsoft Visio
  • Kimi (Moonshot AI)
  • Firewall software
  • Computer Linked Application Information Management System CLAIMS
  • Flowcharting software
  • Microsoft Office software
  • Operating system software
  • Microsoft PowerPoint
  • Microsoft Excel
  • Axon AI
  • Arrival Departure Information System ADIS
  • Veritas NetBackup
  • IBM i2 Analyst's Notebook
  • Teradata Database
  • Laptop computers
  • Digital video cameras
  • Color copiers
  • Smart phones
  • Statistical calculators
  • Digital still cameras
  • Color laser printers
  • Desktop computers
  • Laser facsimile machines
  • Plotting printers
  • Computer laser printers
  • Document scanners
  • Multimedia presentation projectors

Alternative Job Titles