Informing the President; speaking truth to power; being the nation’s “first line of defense.” These mottos form the core ethos of the US intelligence community (IC), a network of 18 agencies, departments, and military services across the executive branch charged with collecting, analyzing, and delivering foreign intelligence to senior US leaders so they can make critical decisions about national security.

The community plays a crucial role in informing US government policy and safeguarding national security, including in areas related to emerging technologies. The IC employs tens of thousands of analysts, technical specialists, and support staff—offering valuable career opportunities for those interested in the intersection of technology and national security.

IC work offers valuable opportunities to advance your career in national security and inform the policymaking process by providing objective information. But if you’re aiming to contribute more directly to policy decisions or promote particular policies, consider instead working in Congress, think tanks, or federal agencies outside of the IC.

Background on the IC

What does the IC do?

Nearly every nation has an intelligence agency charged with helping national leaders understand and anticipate threats and opportunities, whether from terrorist attacks, cyber operations, or infectious diseases. In broader terms, many individuals and organizations seek to inform policymakers on foreign policy issues both big and small, including academics, think tanks, and public interest advocacy groups. But what sets the IC apart is its focus on gathering and assessing secret information for decision advantage

Put plainly, the IC’s job is to think about the full range of national threats, both near-term and far into the future, and help decision-makers understand and counter those threats. The US IC employs tens of thousands of civil servants who range in focus and background, from analysts, engineers, computer scientists, staff support personnel, and accountants—you name it, and the IC probably has it. STEM, humanities, social science, and language-focused graduates will all find a role at one of the 18 IC entities, typically joining via the excepted or competitive civil service depending on the agency and role.

The key characteristics of IC work include:

  • Objectivity: Intelligence aims to be non-partisan and non-policy prescriptive, focusing on information collection and analysis rather than recommendations.
  • Multidisciplinary approach: The IC draws on diverse expertise to provide comprehensive analyses.
  • Security-focused environment: Work often involves classified information and strict security protocols.
  • Customer-centric: Intelligence serves specific “customers”—decision-makers who receive the final analytical products.

The IC’s diverse types of roles and activities

The IC’s work spans many topics from traditional geopolitical analysis to technical countermeasure design for emerging threats in AI, biotech, cyberspace, and other advanced technologies. This breadth allows professionals with various backgrounds, including those in tech fields, to contribute meaningfully to national security.

The focus areas of IC analysts are typically organized into so-called “accounts,” referring to a specific topic, issue, or area of responsibility assigned to an analyst or team of analysts. These accounts are usually clustered into two main categories (“functional” and “regional”).

Functional and regional analysts

Functional analysts focus on transnational issues or threats that span geographic boundaries, such as:

  1. Counterterrorism (CT): Analyzing terrorist groups, their capabilities, leaders, and overall threat activities.
  2. Counterproliferation (CP): Monitoring the attempted spread of weapons of mass destruction (WMD) technologies and capabilities by state and non-state actors.
  3. Cyber: Assessing cyber threats and vulnerabilities in digital infrastructure.
  4. Economic: Analyzing global economic trends, economic statecraft issues (e.g. tarifs, export controls, supply chain vulnerabilities), financial markets, and the impact on political stability.
  5. ​​Political: Analyzing foreign political leaders, the foreign policies of other countries, and global political dynamics, including governance issues, ideological movements, and political risks affecting stability and international alliances.
  6. Science, technology, and weapons (STW): Evaluating technologies, advanced conventional weapons systems, and related emerging capabilities and their national security implications, including AI and biotechnology. 

Regional analysts specialize in specific geographic areas, providing in-depth knowledge of the political, economic, and social dynamics of particular countries or regions. Key regional focuses include:

  1. East Asia and Pacific
  2. Europe and Eurasia
  3. Middle East and North Africa
  4. South and Central Asia
  5. Sub-Saharan Africa
  6. Western Hemisphere

Technical roles

For professionals with technical backgrounds, the IC offers many opportunities to leverage their skills from analytical to applied/operational roles:

  1. Technical Intelligence Analysis: Applying domain expertise to assess foreign technological capabilities, such as evaluating adversaries’ AI systems or quantum computing advancements.
  2. Research & Development: Creating cutting-edge tools and technologies for intelligence collection and analysis, like developing machine learning algorithms for processing satellite imagery or designing secure communication systems.
  3. Cyber Operations: Defending against and conducting cyber intelligence activities, including penetration testing, malware analysis, network defense, and offensive cyber operations.
  4. Data Science and Analytics: Developing and applying advanced data analysis techniques to extract insights from large datasets.
  5. Signals Intelligence (SIGINT): Intercepting and analyzing electronic communications and signals.
  6. Geospatial Intelligence (GEOINT): Analyzing and interpreting satellite imagery and geospatial data.

Intelligence collectors and case officers

Popular media often romanticizes the work of intelligence collectors and case officers, yet the reality is more complex and nuanced than typically portrayed in movies:

  1. Human Intelligence (HUMINT) Collectors: These professionals, often called “case officers”, cultivate and manage human sources to gather intelligence. Their work involves building relationships, assessing source credibility, and securely transmitting information. Unlike movie depictions, this rarely involves high-speed chases or shootouts, but rather requires patience, interpersonal skills, and meticulous attention to detail.
  2. Technical Collectors: These specialists operate sophisticated collection systems, such as signals intelligence equipment or satellite systems. Their work often involves maintaining and optimizing complex technical infrastructure rather than engaging in covert operations.
  3. Open-Source Intelligence (OSINT) Collectors: These professionals gather and analyze publicly available information from sources like social media, news outlets, and academic publications. While less glamorous than fictional portrayals, OSINT is increasingly crucial in the digital age.
  4. Counterintelligence Officers: These specialists work to detect, deter, and neutralize foreign intelligence activities against the US. Their work often involves careful investigation and analysis rather than dramatic confrontations.
  5. Staff Operations Officers: These professionals plan and execute intelligence operations, which can range from coordinating collection efforts to managing covert action programs, a unique purview by law of CIA. While some aspects of their work may involve fieldcraft, much of it centers on careful planning, risk assessment, and coordination with other IC elements.

In reality, the work of collectors and operational staff is often methodical, detail-oriented, and focused on long-term relationship building and information gathering. It requires strong analytical skills, cultural sensitivity, and the ability to work within complex legal and ethical frameworks.

Why might you (not) want to work in the IC?

The IC offers unique opportunities for those interested in national security and emerging technologies to make a difference and advance their career. IC analysts and technical specialists are equipped to work on many different areas, such as cyber operations, space capabilities, WMD mitigation, wargaming, and future assessments. IC work also allows you to translate complex technical issues—like those in AI and quantum computing—into insights and warnings for senior policymakers. 

Upsides to IC work

Here are some reasons to consider an IC career:

  1. Mission focus and opportunity for impact: Your work directly informs critical national security decisions and policies. You’ll have opportunities to contribute to high-level briefings, inform policy, and craft strategic assessments that shape US foreign policy and national security strategies. Your analysis could influence decisions on issues ranging from counterterrorism operations to nuclear nonproliferation efforts.
  2. Career development: The IC supports continuous learning, including through advanced degrees and specialized training. For example, some agencies have programs to sponsor employees’ graduate work, including full-time master’s programs at top universities in exchange for a commitment to continued service for a specified period. These programs can cover various fields relevant to national security, from data science and cybersecurity to area studies and foreign languages. There are also many other professional development opportunities, including policy rotations—like temporary assignments to policymaking bodies like the National Security Council—and research stints at government laboratories, prominent think tanks, and universities. This allows employees to broaden their expertise, expand their networks, and bring fresh perspectives back to their agencies.
  3. Security Clearance: IC work allows (and requires) you to gain a security clearance, which allows access to sensitive information and can be valuable for future career opportunities. While clearances don’t always transfer easily between agencies, having one can potentially streamline the process for future national security jobs, either in government or government-facing industries.
  4. Access to some cutting-edge capabilities: Although government acquisition processes for cutting edge technologies lag behind private industry at times, working in the IC can offer unique opportunities to engage with advanced platforms, specialized capabilities, and bespoke technologies dedicated to collection and analysis missions.
  5. Job security: The IC offers generally stable employment with competitive benefits. Government positions typically provide strong job security, and the specialized nature of intelligence work often leads to long-term career stability. Benefits usually include health insurance, retirement plans, paid time off, and sometimes unique perks like hazard pay for certain assignments or student loan repayment programs.
  6. Interdisciplinary collaboration: IC work often involves collaborating with experts from diverse fields on complex, multifaceted challenges. You might find yourself working with data scientists, linguists, regional specialists, military strategists, and technology experts all in a single day. This interdisciplinary environment fosters creative problem-solving and provides opportunities to expand your knowledge across various domains.
  7. Onward employment: Experience and skills gained in the IC, coupled with security clearances, often open doors to other impactful government positions or lucrative opportunities in the private sector, particularly in defense contracting, cybersecurity, and technology firms, where former IC professionals can leverage their unique expertise and networks. 
  8. Policy rotations as career assignments for IC employees: Agencies will often temporarily assign—or “detail”—employees to work in different parts of the government. For IC employees, this can include temporary assignments serving as policymakers themselves. Policy rotations offer IC employees valuable opportunities, and typically last 12 to 24 months at locations such as the National Security Council staff, Department of State offices, or DOD policy offices. During these rotations, IC employees may serve as action officers and subject matter experts, draft policy memos, coordinate interagency efforts, and brief policymakers on intelligence matters. These assignments provide insights into how intelligence informs policy decisions, help develop networks across the policy community, and are often considered valuable for career advancement in the IC. Eligibility usually requires several years of IC experience, with each agency normally holding competitive internal applications to nominate 1 to 2 employees for final selection by the gaining department. The application process varies by agency but often involves internal applications, supervisor recommendations, and interviews with the host office.

Downsides to IC work

IC work also comes with several important potential negative aspects:

  1. Policy neutrality and limited policymaking roles: IC employees are bound by law to remain politically neutral and are also expected to remain neutral on policy matters. Analysts, for example, focus on providing objective assessments rather than advocating for specific policies, and this can be frustrating for those more interested in actively shaping policy. While the IC informs policymakers, it doesn’t make policy decisions itself.
  2. Secrecy: Much of your work will be classified, limiting your ability to discuss it with others or publish openly. You may not be able to list your specific employer or job title on professional networking sites like LinkedIn, and there may be other restrictions on personal blogging, social media use, and writing for public outlets. Even with close family and friends, including partners, you may be unable to discuss the details of your work.
  3. Ethical considerations: Intelligence work is inherently complex and sometimes faces ethical dilemmas related to national security decisions, which can be difficult to navigate. IC work requires accepting that safeguarding US interests is the primary objective, which can at times conflict with broader global interests. 
  4. Bureaucracy: Like other large government organizations, IC agencies can move slowly and be resistant to change, sometimes clashing with an otherwise strong culture of decentralized interaction and questioning assumptions.
  5. Location constraints: Many IC jobs require working in specific locations, often in the Washington, DC, area, and can be inflexible on relocation options (but there are also some opportunities nationwide and overseas). 
  6. Lack of work from home flexibility: Unlike an increasing number of high-skilled research jobs, IC work mostly cannot be done in a hybrid fashion, from home, or in unsecured spaces; as such, you will likely have to work from a “sensitive compartmented information facility” (SCIF), in which you’re unable to bring personal electronics of any kind. This can create a more rigid work environment and may impact work-life balance if you have competing personal obligations requiring flexibility. This can vary depending on your role and the amount of unclassified work involved, and some IC roles may allow for a degree of remote work (i.e. recruiting and industry engagement roles). 
  7. Lengthy hiring process and limited privacy: Security clearance procedures can make the hiring process long and invasive. Most IC jobs require a polygraph examination, covering issues including criminal activity or illegal drug use; ties to foreign governments; falsifying security forms; involvement in espionage, sabotage, terrorist activities; and compromising classified information. Even after you get hired, IC work continuously requires a much higher level of personal disclosure than most other careers. You may be expected to share extensive personal information as part of background checks and ongoing security requirements.

IC members

The US IC consists of 18 organizations working together to conduct intelligence activities crucial for national security, though each agency has a specialized focus, culture, and hiring process. In the IC, ODNI and CIA are the only two independent agencies, with ODNI reporting directly to the President, while other IC entities fall under a specific cabinet department. 

A significant portion of the IC operates under the Department of Defense (DOD), including several major agencies and the intelligence elements of the military services. The Defense Intelligence Agency (DIA), National Security Agency (NSA), National Geospatial-Intelligence Agency (NGA), and National Reconnaissance Office (NRO) are all DOD components, each with its own specialized focus in defense intelligence. These agencies focus on strategic military intelligence issues, while branch-specific intelligence elements focus on operational and tactical intelligence collection and analysis.

Additionally, each branch of the military—Army, Navy, Air Force, Marine Corps, and the newly established Space Force—maintains its own intelligence element, also under the DOD umbrella. These agencies often work closely with military operations and may have both civilian and military personnel. Their intelligence focus tends to be more directly tied to defense and military matters—known as “support to the warfighter” in addition to “support to the policymaker”—although they still contribute to the broader national security picture.

Agency
(hiring pages linked)
Primary focusCareer typesEmerging tech offices (examples)

Office of the Director of National Intelligence (ODNI)
(independent)
Oversees & coordinates the entire ICIC-relevant policy, 
Analysis, 
S&T, 
Mission Management
Economic Security & Emerging Technologies

NIO for Emerging & Disruptive Technologies

National Counterproliferation & Biosecurity Center
Central Intelligence Agency (CIA)
(independent)
Foreign intelligence & covert operationsAnalysis,
Operations, 
S&T, 
Support
Transnational & Technology Mission Center

Directorate of Digital Innovation

Directorate of Science & Technology

Directorate of Analysis
National Security Agency (NSA)
(part of DOD)
Signals intelligence & cybersecurityCybersecurity,
Signals Intelligence,
Research, 
Language Analysis
AI Security Center

Cybersecurity Collaboration Center
Defense Intelligence Agency (DIA)
(part of DOD)
Military intelligenceAnalysis, 
Human Intelligence,
Technical Collection, 
Operations
Technology & Long-range Analysis Office
National Geospatial-Intelligence Agency (NGA)
(part of DOD)
Geospatial intelligenceImagery Analysis,
Cartography, 
Data Science,
Engineering
Cybersecurity Operations Cell

CP Division
National Reconnaissance Office (NRO)
(part of DOD)
Developing, acquiring, launching, & managing satellite intelligence operationsAerospace Engineering,
Systems Engineering,
Data Science
Mission Operations Directorate
Federal Bureau of Investigation (FBI) – Intelligence Branch
(part of DOJ)
Domestic intelligence & counterintelSpecial Agent, 
Intelligence Analyst,
Language Specialist, 
STEM
Cyber Division
State DepBureau of Intelligence and Research (INR)Diplomatic intelligenceForeign Affairs,
Intelligence Analysis, 
Research
Technology & Innovation Office

Office of Cyber Affairs
DHSOffice of Intelligence and AnalysisHomeland security intelligenceIntelligence Analysis,
Cybersec., 
Law Enforcement
Cyber Intelligence Center
DOEOffice of Intelligence & Counterintel.Energy, nuclear, & scientific intelligenceScientific Intelligence,
Counterintel
Intelligence Analysis Directorate

Cyber Directorate
Dep. of the Treasury – Office of Intelligence & AnalysisFinancial intelligenceFinancial Analysis, 
Economic Analysis, 
Intelligence Analysis
Research & Analysis Division

FinCEN 
Drug Enforcement Administration (DEA) – Intelligence DivisionDrug-related intelligenceIntelligence Research, 
Special Agent, 
Diversion Investigator
Office of Investigative Technology
Army Intelligence (INSCOM)Military intelligence for land operationsIntelligence Analysis, 
Signals Intelligence, 
Human Intelligence
Various national & special mission units
Naval Intelligence (ONI)Maritime & naval intelligenceIntelligence Specialist, 
Cryptologic Technician, 
Special Warfare
Various national & special mission units
Air Force IntelligenceAerospace & cyber intelligenceIntelligence Analyst,
Special Investigations,
Cyber Operations
Various national & special mission units
Marine Corps Intelligence (MCIA)Expeditionary intelligence (e.g. supporting amphibious operations)Intelligence Specialist, 
Counterintel,
Signals Intelligence
Various national & special mission units
Coast Guard Intelligence (CGI)Maritime domain awarenessIntelligence Specialist,
Investigative Service
Various national & special mission units
Space Force IntelligenceSpace domain awarenessSpace Operations, Intelligence Analyst, Cyber OperationsVarious national & special mission units

The “federation” and its components

The IC is a federation of 18 separate organizations working together to conduct intelligence activities necessary for national security. The Director of National Intelligence (DNI) serves as the IC’s head and is the principal advisor to the President, National Security Council, and Homeland Security Council for intelligence matters. The DNI is the IC’s statutory leader, and was established by the 2004 Intelligence Reform and Terrorism Prevention Act to better integrate, deconflict, and bolster information sharing and collaboration across the IC after 9/11.

The DNI’s primary responsibilities encompass integrating the IC’s intelligence collection and analysis efforts, overseeing and directing the implementation of the National Intelligence Program (NIP) and developing the National Intelligence Strategy (NIS), and establishing objectives and priorities for collection, analysis, production, and dissemination of national intelligence. This centralized leadership aims to foster collaboration and efficiency across the various IC agencies.

But in practice interagency cooperation in the IC can be complex and sometimes challenging. While some post-9/11 reforms have improved information sharing, obstacles remain due to factors like classification levels, need-to-know restrictions, and differing organizational priorities and equities. The overlapping responsibilities of some agencies can lead to both cooperation and competition, and each agency’s unique culture and traditions can sometimes hinder collaboration.

Intelligence outside of the IC

Intelligence work and analysis extend beyond government agencies, with several entities contributing significantly to the intelligence landscape. This spans specific large companies, private firms focused on geopolitical risk analysis, social media companies conducting cyber threat actor detection, analysis, and takedown operations, and AI companies collecting information on potential malign uses of commercial AI models. 

How the IC plugs into the policymaking process

Like any good business, intelligence agencies focus on serving “the customer,” a shorthand reference to policymakers who receive the final analytical “product” based on collected foreign intelligence on a given topic.

Crucially, while the IC informs policy, it does NOT make or directly implement policy. The IC’s role is to provide objective information and assessment so that policymakers can design policy on solid, factual grounding, not to advocate for specific policy outcomes. This separation is critical so that the IC maintains the integrity and credibility of the intelligence process.

For the US, the policy cycle is key for intelligence agencies to plug into the rhythm of decision-making. This process typically involves:

  1. Interagency Policy Committees (IPCs): These are lower-level working groups formed by representatives from agencies relevant to national security and foreign policy to discuss specific policy issues. They’re often the first point of contact for intelligence input into the policy process. Intelligence analysts may brief IPC members on relevant topics or provide written products to inform discussions.
  2. Deputies Committees (DCs): These are mid-level meetings of deputy heads of relevant agencies. At this level, intelligence agencies might provide more synthesized assessments or highlight particularly critical issues that have bubbled up from the IPC level.
  3. Principals Committees (PCs): These are high-level meetings of agency heads (“principals”) to make recommendations to the President. Here, intelligence inputs are typically distilled into key judgments and high-level assessments to inform strategic decision-making.
  4. National Security Council (NSC) meetings: At the highest level, these meetings are attended by the President, who chairs the council, along with statutory members including the Vice President, Secretary of State, Secretary of Defense, and Secretary of Energy. Other regular attendees often include the National Security Advisor, the Chairman of the Joint Chiefs of Staff, and the Director of National Intelligence. Depending on the specific topics being discussed, other cabinet members, agency heads, or subject matter experts may be invited to participate.

The rhythm of this process can be intense, with daily intelligence briefings for senior policymakers, regular contributions to IPCs and DCs, and rapid turnaround times for urgent requests. IC professionals have to be adept at prioritizing tasks, distilling complex information into clear and concise points, and adapting their products to the needs of different levels of the policy process.

Intelligence work on emerging technology topics

Intelligence and emerging technology work are closely linked along the entire intelligence process, from focus of collection and analysis to developing new capabilities for use by operational entities. The IC’s involvement in emerging technology can include:

  1. Analyzing adversaries’ technological capabilities and intentions
    • Assessing foreign nations’ research and development (R&D) progress in areas like AI, quantum computing, biotechnology, and hypersonic weapons.
    • Identifying potential military applications of emerging technologies by adversaries, and evaluating their impact on military doctrines and strategies.
    • Monitoring technology transfer and acquisition efforts by foreign entities.
  2. Developing internal capabilities to leverage new technologies
    • Implementing AI and machine learning for data analysis and pattern recognition to enhance intelligence gathering and processing.
    • Exploring quantum computing applications for cryptography and data analysis.
    • Utilizing advanced data analytics and big data technologies to process vast amounts of information.
    • Developing cutting-edge cybersecurity tools to protect sensitive information and systems.
    • Creating innovative collection methods using emerging technologies.
  3. Assisting policymakers in understanding global risks and opportunities associated with emerging technology
    • Assessing how emerging technologies might alter global power dynamics.
    • Identifying potential disruptive impacts across economic, military, and social sectors.
    • Alerting to early signs of significant technological breakthroughs.
    • Offering insights on ethical and societal implications of new technologies.
    • Forecasting long-term technological trends and potential “black swan” events.
  4. Supporting technology governance and policy formulation
    • Informing international negotiations on technology governance, such as AI ethics guidelines or cybersecurity norms.
    • Assisting in the monitoring of export controls and non-proliferation controls, particularly as it relates to malign state and non-state actor groups.
    • Providing intelligence to support decision-making on research funding priorities.
  5. Collaborating with the private sector and academia
    • Engaging with tech companies and research institutions to stay abreast of technological advancements.
    • Facilitating public-private partnerships to address national security challenges related to emerging technologies.
    • Supporting academic outreach programs to nurture talent in critical technology areas.
  6. Countering foreign technology-based threats
    • Identifying and mitigating foreign attempts to steal sensitive technological information.
    • Assessing and countering disinformation campaigns enabled by advanced technologies.
    • Analyzing potential vulnerabilities in critical infrastructure due to emerging technologies.
  7. Supporting arms control and non-proliferation efforts
    • Providing technical expertise for verification of arms control agreements involving emerging technologies.
    • Monitoring the development and spread of dual-use technologies that could contribute to WMD programs.
  8. Investing in and conducting advanced technological research and development
    • Conducting internal R&D programs to develop bespoke technologies for intelligence collection and analysis.
    • Funding high-risk, high-payoff research in the private sector through the Intelligence Advanced Research Projects Activity (IARPA), aimed at addressing unique intelligence challenges and requirements.
    • Supporting strategic investments in innovative technologies from start-ups through In-Q-Tel, CIA’s venture capital arm, to enhance intelligence capabilities.

The IC’s work in emerging technology policy requires professionals who can combine deep technical knowledge with an understanding of geopolitics, strategic analysis, policy processes, and how national security decision-making works. Importantly, they must be able to communicate complex technical concepts to non-technical policymakers and translate policy needs into actionable intelligence requirements. Moreover, the rapid pace of technological change means that intelligence professionals in this field must continuously expand their knowledge and skills. Many IC agencies offer specialized training programs and encourage participation in academic conferences and industry events to stay current with the latest developments.

IC components relevant to emerging technology

The IC is deeply involved in work related to emerging technologies, both in leveraging these technologies for intelligence work and analyzing their impact on national security. Key areas of focus include:

  • AI and machine learning: For example, NSA’s AI Security Center explores the security implications of AI, CIA’s Directorate of Digital Innovation investigates AI applications for data analysis, and NGA is harnessing AI for geospatial intelligence analysis. Key focuses include:
    • Analyzing adversaries’ AI capabilities and intentions
    • Developing AI tools for intelligence analysis
    • Assessing the impact of AI on global strategic stability
  • Supercomputing and quantum computing research: Recognized by ODNI as critical emerging technologies, quantum computing and supercomputing are focus areas for several IC agencies. NSA, for instance, is researching quantum-resistant cryptography to prepare for the potential threat to current encryption methods. The national labs, which aren’t technically part of the IC but regularly work with IC agencies on issues requiring extensive technical expertise, also work in coordination with DOE to conduct national security-related supercomputing work. Key focuses include:
    • Monitoring global progress in quantum technologies
    • Assessing threats to current encryption methods
    • Exploring quantum sensing’s impact on stealth technologies
  • Biotechnology: DIA’s National Center for Medical Intelligence monitors global health threats and biotech developments, while ODNI’s National Counterproliferation and Biosecurity Center has programs focusing on biotech advancements and their potential security implications. Key focuses include:
    • Detecting potential development of engineered pathogens by state or non-state actors
    • Analyzing synthetic biology’s impact on global security
  • Space technology: NRO leads in developing, procuring, and operationally managing intelligence satellites, while Space Force Intelligence focuses on threats to space-based assets and adversary space capabilities, reflecting the growing importance of space in national security. Key focuses include:
    • Assessing threats to critical satellite infrastructure
    • Analyzing the impact of commercial space activities on intelligence gathering
  • Cybersecurity: NSA’s Cybersecurity Directorate spearheads efforts to secure national security systems, while DHS’s Cybersecurity and Infrastructure Security Agency (CISA), which isn’t part of the IC but also regularly engages with the IC on issues involving cyber threats affecting domestic industries, works on protecting critical infrastructure in the face of evolving cyber threats. Key focuses include: 
    • Defending against and conducting cyber intelligence activities
    • Analyzing emerging cyber threats and vulnerabilities (e.g. with advances in AI or the development of 6G networks)

IC work on AI issues

The IC is becoming increasingly involved in AI efforts, primarily through coordination with other government entities like DOD’s Chief Digital and AI Officer (CDAO), as well as DOC and DOE AI-related initiatives. For example, NSA’s AI Security Center focuses on AI’s security implications in offensive and defensive contexts, and on monitoring adversary capabilities in this space.

Intelligence work itself is evolving in response to new AI technologies and various reports are considering AI’s applications for intelligence work. Analytical work increasingly involves machine learning for data processing and pattern recognition, and AI is being explored for automating certain aspects of intelligence collection and processing. This increasing integration into intelligence work has also created a demand for more technical AI and machine learning skills—for example, data scientists and machine learning engineers are needed to develop and implement AI models for various applications in intelligence analysis, while specialized skills in AI security and evaluations could be useful to assess vulnerabilities in AI systems and develop countermeasures. The application of AI into intelligence work is also shaping INT-specific disciplines; OSINT officers, for example, can use AI tools to collect and analyze open-source intelligence. Finally, the IC’s enforcement and monitoring capabilities will be critical for any future international AI governance agreements. 

IC work on biosecurity and countering WMD

Parallel to AI efforts, the IC plays a crucial role in addressing major risks stemming from biological threats and weapons of mass destruction (WMD), including efforts to detect and prevent the spread of nuclear, biological, and chemical weapons. Key organizations in this space include DIA’s National Center for Medical Intelligence (NCMI), which monitors global health threats and biotech developments, ODNI’s National Counterproliferation and Biosecurity Center (NCBC), which coordinates efforts to detect and prevent WMD threats, and DHS’s Countering Weapons of Mass Destruction Office (CWMD). The National Intelligence Council (NIC) collaborates with academia and industry to better understand and anticipate technological developments that could impact national security.

Roles in biosecurity and WMD counterproliferation (CP) are equally diverse. Biosecurity analysts, for example, assess global biological threats and monitor advancements in biotechnology. This track could be a good fit for applicants with a background in biology and an understanding of global health systems, but there are also opportunities to cross-train in the IC without a technical background. In other domains, WMD specialists monitor and analyze the development and proliferation of nuclear, biological, and chemical, necessitating knowledge of weapons systems and international relations. More technical specialists, like bioinformatics experts apply data science and AI to biological data for threat assessment and prediction, while CBRN (Chemical, Biological, Radiological, Nuclear) analysts assess threats and develop countermeasures in these specific areas.

IARPA and In-Q-Tel

Two unique IC organizations play pivotal roles in driving technological advancement and ensuring access to cutting-edge capabilities: the Intelligence Advanced Research Projects Activity (IARPA) and In-Q-Tel. While both organizations aim to bolster the IC’s technological capabilities, they approach this goal differently. IARPA focuses on high-risk, high-reward research projects that push the boundaries of science and technology, while In-Q-Tel operates as a strategic investor, bridging the gap between the IC’s needs and emerging commercial innovations.

Intelligence Advanced Research Projects Activity (IARPA)

IARPA, established in 2006, is the IC’s version of DARPA (DOD’s Defense Advanced Research Projects Agency). It operates under ODNI as an independent entity and focuses on “high-risk, high-payoff research programs to tackle some of the most difficult challenges facing the intelligence community.” IARPA doesn’t have its own laboratories but instead funds research through academia, industry, and national laboratories. IARPA’s research portfolios are managed by “Program Managers”, who are experts usually from other IC or government entities hired for five-year fixed terms. IARPA’s research programs span many areas including machine learning, quantum computing, biometrics, neuroscience, and advanced computing.

In-Q-Tel

In-Q-Tel, founded in 1999, is a strategic investor that accelerates the development and delivery of cutting-edge technologies to US government agencies, primarily CIA. Operating as a not-for-profit venture capital firm backed by the US government, In-Q-Tel’s mission is to bridge the gap between the IC’s technology needs and emerging commercial innovation in private industry, primarily small-scale companies and ventures. It invests in startup companies developing technologies that have both commercial potential and relevance to intelligence and national security missions. Areas of focus include AI, data analytics, biotechnology, autonomous systems, and cybersecurity. While some opportunities for temporary assignments to In-Q-Tel exist, many of its staff are employed separately from the IC.

Working in the IC

Securing an IC job requires careful preparation and patience. Here are some key steps and considerations:

  1. Research: IC agencies vary widely in their topic focus and available roles, so thoroughly investigate different IC opportunities to find the best fit for your skills and interests. 
  2. Education: Most IC positions require at least a bachelor’s degree. While many applicants also have master’s degrees, extensive work experience can sometimes compensate for lack of an advanced degree. PhDs can also be advantageous for highly specialized roles or research-intensive positions, particularly in STEM fields, while JDs are required for legal roles (e.g. in each agency’s Office of General Counsel). For IC roles, almost any major or field of concentration can be relevant:
    • Political Science, Public Policy, International Relations, and Security Studies degrees are popular and highly relevant for many IC roles, especially for analyst positions. Some master’s programs, like the Security Studies Program at Georgetown University, offer intelligence concentrations specifically tailored for IC careers. 
    • STEM degrees are highly valued for technical roles in cyber operations, data science, cryptography, and other weapons and technology analysis. Computer Science, Data Science, and Engineering degrees are especially in demand. Economics degrees are also valuable for roles analyzing economic intelligence or financial crimes.
    • Language and Area Studies degrees can be crucial for roles focusing on specific regions or cultures.
  3. Experience: Internships, co-op programs, or entry-level positions can provide valuable experience, including for undergraduates and recent graduates. One advantage of many IC internships is that they can be an especially fast way to get a security clearance early in your career. Types of experiences particularly helpful for IC jobs include:
    • Previous government or military service, especially in roles requiring security clearances (e.g. Top Secret/SCI).
    • Internships or work experience in think tanks, particularly those focused on national security or foreign policy.
    • Research assistantships in relevant academic fields.
    • Private sector experience in consulting, political risk analysis, cybersecurity, data analysis, or emerging technologies development. 
    • International experience, including study abroad, Peace Corps, or work with international organizations.
    • Volunteer or work experience with crisis management or emergency response organizations.
    • College activities like participation in model UN, war gaming exercises, or similar simulations.
    • Technical projects or hackathons demonstrating skills in coding, data analysis, or cybersecurity.
    • Any degree of writing experience, particularly analysis of current events or technical topics for a general audience, or time spent abroad.
  1. Security clearance: Be prepared for a thorough background investigation. Start early, as the process can take 6-12 months or longer.
  2. Networking: Attend career fairs, information sessions, and leverage alumni networks to learn more about IC opportunities.
  3. Stay informed: To strengthen your candidacy and prepare for future IC roles, keep up with current events, geopolitical issues, and technological developments relevant to national security.
  4. Patience: The hiring process can be lengthy. Stay persistent and consider other opportunities (e.g. think tanks, Congress, and other federal agencies) while waiting.

Desired qualities and skills

Some general characteristics critical for many IC roles include:

  • Must be a US citizen
  • Strong analytical and critical thinking skills
  • Ability to work in classified environments and maintain confidentiality
  • Interest in national security and international affairs
  • Adaptability and willingness to learn continuously
  • Strong communication skills, both written and verbal
  • Proficiency in critical languages (e.g. Mandarin, Arabic, Russian) can be a significant advantage, especially for regional analysts.
  • For tech-focused roles, build your technical skills, credentials, and work experience. Aim to stay current with relevant technologies and consider obtaining industry certifications (e.g. in programing, cyber security, machine learning).

Job and internship listings

Our IC components chart includes links to the hiring websites of all 18 IC agencies. Most offices also post internships and publicly available positions to USAJOBS.gov.

Since many IC components are part of the DOD, some entry-level DOD internships and fellowships can also serve as IC entries (e.g. Boren Awards, SMART Scholarship, McCain Strategic Defense Fellowship).

The Virtual Student Federal Service (VSFS) program is a part-time, remote, unpaid internship program that hosts interns across US government positions, including multiple components of the IC. Since VSFS internships don’t require a security clearance, application overhead is lower, but the scope of IC listings is also more limited. 

In addition to the Federal Internships Portal on USAJOBS.gov, many IC agencies include internship and early-career program information on their websites. Because many of these programs require security clearances, the application process often begins over a year before the start of the program. Here are some examples of relevant IC internship programs (not exhaustive):

Additional opportunities may be available for undergraduates at the US Naval Academy, US Coast Guard Academy, US Air Force Academy, ROTC programs, or the US Merchant Marine Academy.

Appendix: The different kinds of intelligence work

The “intelligence cycle”

The intelligence cycle refers to the process by which intelligence agencies collect raw information, process and analyze that information to make sense of it, and disseminate it to policymakers to secure decision advantage. This process is typically broken down into constituent parts of the “cycle” that roughly correspond to various entities and jobs within the IC:

Types of intelligence (the “INTs”)

The IC is focused and structured by the various intelligence disciplines, often referred to as the “INTs”, also mentioned earlier:

Testimonials

My CIA career has been incredibly rewarding and diverse. I started as an intern and progressed through roles in political and targeting analysis, focusing on the Near East, counterintelligence, and emerging technologies. I’ve worked overseas, served as an Executive Assistant to an Assistant Director, and led integrated operational and analytic teams. These experiences have given me unique insights into field operations, policymaking support, and the crucial interplay between analysis and operations.

The work has been meaningful and impactful—from countering national security threats to briefing senior policymakers. I’ve had opportunities to learn advanced technologies, dive into complex analytics, and even pick up a new language. Navigating a large bureaucracy can be challenging, and you need resilience for moments of frustration, but being proactive and working with inspiring colleagues has been key.

The variety of experiences—from field operations to headquarters analysis to executive-level support—and the tangible impact of the work make this career uniquely fulfilling. My journey through different roles has given me a comprehensive view of the Agency’s crucial work in safeguarding national security. It’s been challenging at times, but incredibly rewarding.”

Additional resources