Security / Defense Intelligence Analyst Career

Planning and Analysis

 
Planning and Analysis Careers | Security / Defense Intelligence Analyst

Security / Defense Intelligence Analyst

Career Area: Planning and Analysis

Occupation Group: Data Analysis and Mathematics

Salary

Percentile wages tell how much a certain percentage of an overall population in a geographic area or within a given industry or field makes. The percentile wage estimate is the value of a wage below which a certain percent of workers fall.

An example would be the 25th percentile, 25 percent of workers employed in that occupation earn less and 75 percent earn more than the estimated wage value. At the 75th percentile, 75 percent of workers employed in that occupation earn less and 25 percent earn more than the estimated wage value.

A typical Security / Defense Intelligence Analyst earns the following wages (national and state):

State

The average salary in North Carolina for those pursuing this career is $89,112

*The salaries depicted here are representative of the range of salaries posted in job listings over the past year. Living wage in North Carolina is $30,000.

National

The average salary in the United States for those pursuing this career is $84,240

*The salaries depicted here are representative of the range of salaries posted in job listings over the past year. Living wage in North Carolina is $30,000.

What Does a Professional in this Career Do?

Gathers and analyzes information needed to anticipate and prevent organized criminal activities that may threaten national security.

Employment Trends

The job demand and job growth statistics shown here were derived from job posts over the past year. Expected job growth projections are extrapolated from year-over-year job post listing history.

Job demand and job growth is expected at the following rates:

LocationGrowth
North Carolina499+7.8%
Nationwide13112+4.5%

Skills

A professional in this position typically utilizes the following skills in the course of everyday work in this exciting and challenging field:

Baseline Skills

The following are baseline skills every Security / Defense Intelligence Analyst is expected to have in order to experience success in this field:

  • Research: Experience performing creative and systematic work to understand a product, market, or customer, either before building a new solution, or to troubleshoot an existing issue
  • Communication Skills: The ability to convey information to another effectively and efficiently.
  • Writing: Experience expressing business messages effectively in written form. This may include planning drafting and revising as necessary.
  • Teamwork / Collaboration: Experience working in collaborative efforts with a team to achieve a common goal or to complete a task in the most effective and efficient way.
  • Planning: Working experience with the process of thinking about and organizing the activities required to achieve desired goals.

Specialized Skills

These skills are specific to working in this career:

  • Intelligence Analysis: Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context.
  • Threat Analysis: Working experience of Threat Analysis, which is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks.
  • Counter Intelligence: Counterintelligence refers to information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or international terrorist activities, but not including personnel, physical, document or communications security programs.
  • Human Intelligence: Human intelligence is the intellectual prowess of humans, which is marked by high cognition, motivation, and self-awareness.
  • Signals Intelligence: Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligenceabbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligenceabbreviated to ELINT).

Distinguishing Skills

Any Security / Defense Intelligence Analyst that possesses the following skills will stand out against the competition:

  • Counter-terrorism: Working experience of Counter-terrorism, which incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. Counter-terrorism strategies include attempts to counter financing of terrorism.
  • Natural Language Processing: Natural language processing (NLP) is a field of computer science, artificial intelligence and computational linguistics concerned with the interactions between computers and human (natural) languages, and, in particular, concerned with programming computers to fruitfully process large natural language corpora.
  • Vulnerability assessment: Working experience of Vulnerability assessment. A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields.
  • Measurement and Signature Intelligence: Measurement and signature intelligence (MASINT) is a technical branch of intelligence gathering, which serves to detect, track, identify or describe the signatures (distinctive characteristics) of fixed or dynamic target sources.
  • Security Operations: Security Operations: Comprehensive security operations support functions to maintain, administer and enhance security solutions.

Education

This career typically requires the following level of education. The numbers presented in the pie charts below were derived from actual job posts over the past year. Not all job postings list education requirements.

.
Education Level%
Bachelor's Degree65%
Master's Degree35%
Doctoral Degree0%

Experience

This position typically requires the following level of experience. The numbers presented in the pie charts below were derived from actual job posts over the past year. Not all job postings list experience requirements.

Experience Required%
0 to 2 years17%
3 to 5 years35%
6 to 8 years23%

Many of the programs offered through NC State are designed for working professionals who need additional credentials to enhance existing work experience.

Students who do not have the expected level of experience may wish to look into internship and employment opportunities.

Common Job Titles

It is possible to find work in this field in positions commonly listed as the following job titles:

  • Intelligence Analyst
  • Intelligence Specialist
  • Senior Intelligence Analyst
  • Cyber Intelligence Analyst
  • Senior Cyber Strategic Intelligence Analyst Remote Home Office Virtual Eligible

Similar Occupations

If you are interested in exploring similar occupations, you may want to research the following job titles:

Not sure where to start?

Get personalized program recommendations with Career Insight.

Go to Career Insight