- Search computer databases, credit reports, public records, tax or legal filings, or other resources to locate persons or to compile information for investigations.
Occupations with related tasks Save Table: XLSX CSV
- Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
- Validate known intelligence with data from other sources.
- Analyze intelligence data to identify patterns and trends in criminal activity.
- Gather intelligence information by field observation, confidential information sources, or public records.
- Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.
- Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
- Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
- Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
- Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
- Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
- Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
- Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.
- Conduct presentations of analytic findings.
- Establish criminal profiles to aid in connecting criminal organizations with their members.
- Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.
- Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.
- Develop defense plans or tactics, using intelligence and other information.
- Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.
- Study communication code languages or foreign languages to translate intelligence.
- Prepare plans to intercept foreign communications transmissions.
- Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
- Validate known intelligence with data from other sources.
- Analyze intelligence data to identify patterns and trends in criminal activity.
- Gather intelligence information by field observation, confidential information sources, or public records.
- Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.
- Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
- Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
- Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
- Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
- Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
- Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
- Examine records and governmental agency files to find identifying data about suspects.
- Analyze completed police reports to determine what additional information and investigative work is needed.
- Examine records to locate links in chains of evidence or information.
- Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records.
- Secure deceased body and obtain evidence from it, preventing bystanders from tampering with it prior to medical examiner's arrival.
- Obtain summary of incident from officer in charge at crime scene, taking care to avoid disturbing evidence.
- Search for and collect evidence, such as fingerprints, using investigative equipment.
- Check victims for signs of life, such as breathing and pulse.
- Obtain facts or statements from complainants, witnesses, and accused persons and record interviews, using recording device.
- Record progress of investigation, maintain informational files on suspects, and submit reports to commanding officer or magistrate to authorize warrants.
- Prepare reports that detail investigation findings.
- Prepare charges or responses to charges, or information for court cases, according to formalized procedures.
- Preserve, process, and analyze items of evidence obtained from crime scenes and suspects, placing them in proper containers and destroying evidence no longer needed.
- Note, mark, and photograph location of objects found, such as footprints, tire tracks, bullets and bloodstains, and take measurements of the scene.
- Secure persons at scene, keeping witnesses from conversing or leaving the scene before investigators arrive.
- Provide information to lab personnel concerning the source of an item of evidence and tests to be performed.
- Prepare and serve search and arrest warrants.
- Question individuals or observe persons and establishments to confirm information given to patrol officers.
- Determine scope, timing, and direction of investigations.
- Participate or assist in raids and arrests.
- Organize scene search, assigning specific tasks and areas of search to individual officers and obtaining adequate lighting as necessary.
- Summon medical help for injured individuals and alert medical personnel to take statements from them.
- Notify command of situation and request assistance.
- Block or rope off scene and check perimeter to ensure that entire scene is secured.
- Identify case issues and evidence needed, based on analysis of charges, complaints, or allegations of law violations.
- Notify, or request notification of, medical examiner or district attorney representative.
- Collaborate with other offices and agencies to exchange information and coordinate activities.
- Maintain surveillance of establishments to obtain identifying information on suspects.
- Testify before grand juries concerning criminal activity investigations.
- Perform undercover assignments and maintain surveillance, including monitoring authorized wiretaps.
- Examine records and governmental agency files to find identifying data about suspects.
- Analyze completed police reports to determine what additional information and investigative work is needed.
- Examine records to locate links in chains of evidence or information.
- Obtain and verify evidence by interviewing and observing suspects and witnesses or by analyzing records.
- Secure deceased body and obtain evidence from it, preventing bystanders from tampering with it prior to medical examiner's arrival.
- Obtain summary of incident from officer in charge at crime scene, taking care to avoid disturbing evidence.
- Search for and collect evidence, such as fingerprints, using investigative equipment.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Adhere to legal policies and procedures related to handling digital media.
- Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
- Create system images or capture network settings from information technology environments to preserve as evidence.
- Develop plans for investigating alleged computer crimes, violations, or suspicious activity.
- Develop policies or requirements for data collection, processing, or reporting.
- Duplicate digital evidence to use for data recovery and analysis procedures.
- Identify or develop reverse-engineering tools to improve system capabilities or detect vulnerabilities.
- Maintain cyber defense software or hardware to support responses to cyber incidents.
- Maintain knowledge of laws, regulations, policies or other issuances pertaining to digital forensics or information privacy.
- Preserve and maintain digital forensic evidence for analysis.
- Recommend cyber defense software or hardware to support responses to cyber incidents.
- Recover data or decrypt seized data.
- Write and execute scripts to automate tasks, such as parsing large data files.
- Write cyber defense recommendations, reports, or white papers using research or experience.
- Write reports, sign affidavits, or give depositions for legal proceedings.
- Write technical summaries to report findings.
- Analyze log files or other digital information to identify the perpetrators of network intrusions.
- Perform file signature analysis to verify files on storage media or discover potential hidden files.
- Perform forensic investigations of operating or file systems.
- Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
- Identify, compare, classify, and file fingerprints, using systems such as Automated Fingerprint Identification System (AFIS) or the Henry Classification System.
- Look for trace evidence, such as fingerprints, hairs, fibers, or shoe impressions, using alternative light sources when necessary.
- Dust selected areas of crime scene and lift latent fingerprints, adhering to proper preservation procedures.
- Maintain records of evidence and write and review reports.
- Package, store and retrieve evidence.
- Submit evidence to supervisors, crime labs, or court officials for legal proceedings.
- Testify in court and present evidence.
- Analyze and process evidence at crime scenes, during autopsies, or in the laboratory, wearing protective equipment and using powders and chemicals.
- Photograph crime or accident scenes for evidence records.
- Create sketches and diagrams, by hand or computer software, to depict crime scenes.
- Serve as technical advisor and coordinate with other law enforcement workers or legal personnel to exchange information on crime scene collection activities.
- Coordinate or conduct instructional classes or in-services, such as citizen police academy classes and crime scene training for other officers.
- Interview victims, witnesses, suspects, and other law enforcement personnel.
- Process film and prints from crime or accident scenes.
- Perform emergency work during off-hours.
- Identify, compare, classify, and file fingerprints, using systems such as Automated Fingerprint Identification System (AFIS) or the Henry Classification System.
- Look for trace evidence, such as fingerprints, hairs, fibers, or shoe impressions, using alternative light sources when necessary.
- Dust selected areas of crime scene and lift latent fingerprints, adhering to proper preservation procedures.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Conduct network and security system audits, using established criteria.
- Configure information systems to incorporate principles of least functionality and least access.
- Design security solutions to address known device vulnerabilities.
- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Discuss security solutions with information technology teams or management.
- Document penetration test findings.
- Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
- Identify security system weaknesses, using penetration tests.
- Keep up with new penetration testing tools and methods.
- Maintain up-to-date knowledge of hacking trends.
- Prepare and submit reports describing the results of security fixes.
- Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
- Update corporate policies to improve cyber security.
- Write audit reports to communicate technical and procedural findings and recommend solutions.
- Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
- Gather cyber intelligence to identify vulnerabilities.
- Identify new threat tactics, techniques, or procedures used by cyber threat actors.
- Enter and retrieve information pertaining to vehicle registration, identification, and status, using hand-held computers.
- Patrol an assigned area by vehicle or on foot to ensure public compliance with existing parking ordinance.
- Write warnings and citations for illegally parked vehicles.
- Appear in court at hearings regarding contested traffic citations.
- Maintain assigned equipment and supplies, such as hand-held citation computers, citation books, rain gear, tire-marking chalk, and street cones.
- Respond to and make radio dispatch calls regarding parking violations and complaints.
- Maintain close communications with dispatching personnel, using two-way radios or cell phones.
- Perform simple vehicle maintenance procedures, such as checking oil and gas, and report mechanical problems to supervisors.
- Observe and report hazardous conditions, such as missing traffic signals or signs, and street markings that need to be repainted.
- Identify vehicles in violation of parking codes, checking with dispatchers when necessary to confirm identities or to determine whether vehicles need to be booted or towed.
- Train new or temporary staff.
- Make arrangements for illegally parked or abandoned vehicles to be towed, and direct tow-truck drivers to the correct vehicles.
- Investigate and answer complaints regarding contested parking citations, determining their validity and routing them appropriately.
- Provide information to the public regarding parking regulations and facilities, and the location of streets, buildings and points of interest.
- Prepare and maintain required records, including logs of parking enforcement activities, and records of contested citations.
- Perform traffic control duties such as setting up barricades and temporary signs, placing bags on parking meters to limit their use, or directing traffic.
- Mark tires of parked vehicles with chalk and record time of marking, and return at regular intervals to ensure that parking time limits are not exceeded.
- Locate lost, stolen, and counterfeit parking permits, and take necessary enforcement action.
- Collect coins deposited in meters.
- Wind parking meter clocks.
- Provide assistance to motorists needing help with problems, such as flat tires, keys locked in cars, or dead batteries.
- Assign and review the work of subordinates.
- Remove handbills within patrol areas.
- Enter and retrieve information pertaining to vehicle registration, identification, and status, using hand-held computers.