- Examine records and governmental agency files to find identifying data about suspects.
Occupations with related tasks Save Table: XLSX CSV
- Validate known intelligence with data from other sources.
- Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
- Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
- Gather intelligence information by field observation, confidential information sources, or public records.
- Analyze intelligence data to identify patterns and trends in criminal activity.
- Identify gaps in information.
- Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
- Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.
- Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
- Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
- Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
- Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
- Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.
- Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.
- Establish criminal profiles to aid in connecting criminal organizations with their members.
- Conduct presentations of analytic findings.
- Develop defense plans or tactics, using intelligence and other information.
- Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.
- Prepare plans to intercept foreign communications transmissions.
- Study communication code languages or foreign languages to translate intelligence.
- Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.
- Validate known intelligence with data from other sources.
- Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
- Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
- Gather intelligence information by field observation, confidential information sources, or public records.
- Analyze intelligence data to identify patterns and trends in criminal activity.
- Identify gaps in information.
- Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
- Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.
- Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
- Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
- Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
- Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Adhere to legal policies and procedures related to handling digital media.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Preserve and maintain digital forensic evidence for analysis.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Search computer databases, credit reports, public records, tax or legal filings, or other resources to locate persons or to compile information for investigations.
- Obtain and analyze information on suspects, crimes, or disturbances to solve cases, to identify criminal activity, or to gather information for court cases.
- Expose fraudulent insurance claims or stolen funds.
- Investigate companies' financial standings, or locate funds stolen by embezzlers, using accounting skills.
- Write reports or case summaries to document investigations.
- Conduct private investigations on a paid basis.
- Conduct personal background investigations, such as pre-employment checks, to obtain information about an individual's character, financial status, or personal history.
- Testify at hearings or court trials to present evidence.
- Question persons to obtain evidence for cases of divorce, child custody, or missing persons or information about individuals' character or financial status.
- Observe and document activities of individuals to detect unlawful acts or to obtain evidence for cases, using binoculars and still or video cameras.
- Confer with establishment officials, security departments, police, or postal officials to identify problems, provide information, or receive instructions.
- Perform undercover operations, such as evaluating the performance or honesty of employees by posing as customers or employees.
- Alert appropriate personnel to suspects' locations.
- Count cash and review transactions, sales checks, or register tapes to verify amounts or to identify shortages.
- Search computer databases, credit reports, public records, tax or legal filings, or other resources to locate persons or to compile information for investigations.
- Obtain and analyze information on suspects, crimes, or disturbances to solve cases, to identify criminal activity, or to gather information for court cases.
- Expose fraudulent insurance claims or stolen funds.
- Investigate companies' financial standings, or locate funds stolen by embezzlers, using accounting skills.
- Identify, compare, classify, and file fingerprints, using systems such as Automated Fingerprint Identification System (AFIS) or the Henry Classification System.
- Look for trace evidence, such as fingerprints, hairs, fibers, or shoe impressions, using alternative light sources when necessary.
- Dust selected areas of crime scene and lift latent fingerprints, adhering to proper preservation procedures.
- Maintain records of evidence and write and review reports.
- Package, store and retrieve evidence.
- Submit evidence to supervisors, crime labs, or court officials for legal proceedings.
- Testify in court and present evidence.
- Analyze and process evidence at crime scenes, during autopsies, or in the laboratory, wearing protective equipment and using powders and chemicals.
- Photograph crime or accident scenes for evidence records.
- Create sketches and diagrams, by hand or computer software, to depict crime scenes.
- Serve as technical advisor and coordinate with other law enforcement workers or legal personnel to exchange information on crime scene collection activities.
- Coordinate or conduct instructional classes or in-services, such as citizen police academy classes and crime scene training for other officers.
- Interview survivors, witnesses, suspects, and other law enforcement personnel.
- Process film and prints from crime or accident scenes.
- Perform emergency work during off-hours.
- Identify, compare, classify, and file fingerprints, using systems such as Automated Fingerprint Identification System (AFIS) or the Henry Classification System.
- Look for trace evidence, such as fingerprints, hairs, fibers, or shoe impressions, using alternative light sources when necessary.
- Dust selected areas of crime scene and lift latent fingerprints, adhering to proper preservation procedures.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Identify security system weaknesses, using penetration tests.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Enter and retrieve information pertaining to vehicle registration, identification, and status, using hand-held computers.
- Patrol an assigned area by vehicle or on foot to ensure public compliance with existing parking ordinance.
- Write warnings and citations for illegally parked vehicles.
- Appear in court at hearings regarding contested traffic citations.
- Maintain assigned equipment and supplies, such as hand-held citation computers, citation books, rain gear, tire-marking chalk, and street cones.
- Respond to and make radio dispatch calls regarding parking violations and complaints.
- Maintain close communications with dispatching personnel, using two-way radios or cell phones.
- Perform simple vehicle maintenance procedures, such as checking oil and gas, and report mechanical problems to supervisors.
- Observe and report hazardous conditions, such as missing traffic signals or signs, and street markings that need to be repainted.
- Identify vehicles in violation of parking codes, checking with dispatchers when necessary to confirm identities or to determine whether vehicles need to be booted or towed.
- Train new or temporary staff.
- Make arrangements for illegally parked or abandoned vehicles to be towed, and direct tow-truck drivers to the correct vehicles.
- Investigate and answer complaints regarding contested parking citations, determining their validity and routing them appropriately.
- Provide information to the public regarding parking regulations and facilities, and the location of streets, buildings and points of interest.
- Prepare and maintain required records, including logs of parking enforcement activities, and records of contested citations.
- Perform traffic control duties such as setting up barricades and temporary signs, placing bags on parking meters to limit their use, or directing traffic.
- Mark tires of parked vehicles with chalk and record time of marking, and return at regular intervals to ensure that parking time limits are not exceeded.
- Locate lost, stolen, and counterfeit parking permits, and take necessary enforcement action.
- Collect coins deposited in meters.
- Wind parking meter clocks.
- Provide assistance to motorists needing help with problems, such as flat tires, keys locked in cars, or dead batteries.
- Assign and review the work of subordinates.
- Enter and retrieve information pertaining to vehicle registration, identification, and status, using hand-held computers.