How do they match: Intelligence Analysts

  • Intelligence Analysts

  • All Source Intelligence Analyst
  • Anti-Terrorist Analyst
  • Competitive Intelligence Analyst
  • Computer Network Defense Analyst
  • Counterintelligence Analyst
  • Crime Analyst
  • Crime Intelligence Analyst
  • Crime and Intelligence Analyst
  • Criminal Intelligence Analyst
  • Cyber Analyst
  • Cyber All Source Analyst
  • Cyber Defense Analyst
  • Cyber Defense Forensics Analyst
  • Cyber Intelligence Analyst
  • Cyber Threat Intelligence Analyst
  • Cybersecurity Analyst
  • Cybersecurity All-Source Analyst
  • Cybersecurity Exploitation Analyst
  • Cybersecurity Multi-Disciplined Language Analyst
  • Cybersecurity Target Network Analyst
  • Cybersecurity Threat Analyst
  • Data Intelligence Analyst
  • Defense Analyst
  • Intelligence Analyst
  • Market Surveillance Analyst
  • Police Crime and Intelligence Analyst
  • Surveillance Analyst
  • Threat Intelligence Analyst

  • Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

  • Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.
  • Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
  • Develop defense plans or tactics, using intelligence and other information.
  • Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
  • Gather intelligence information by field observation, confidential information sources, or public records.
  • Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
  • Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.

  • Collaborate with law enforcement or security agencies to share information.
  • Interview people to gather information about criminal activities.
  • Observe individuals' activities to gather information or compile evidence.
  • Record information about suspects or criminals.
  • Use databases to locate investigation details or other information.