New Cohort Starts:

Donate

35M Career Guide

Army

35M: Human Intelligence Collector

Career transition guide for Army Human Intelligence Collector (35M)

Translate Your 35M Experience Now

Get a personalized AI-powered translation of your military experience into civilian resume language.

Start Free Translation

Tech Roles You Could Aim For

Real industry tech roles your 35M background maps to — picked from BLS-anchored occupations using your training, cognitive skills, and systems experience.

Security Engineer

Security

SOC 15-1212
High match

Your experience with HUMINT and CI operations, including managing investigations and special collection techniques, translates directly to security engineering. Your adversarial thinking and pattern recognition skills are critical for identifying and mitigating threats. You understand security frameworks. Learn modern security tools and practices to apply your skills in a cybersecurity context.

Typical stack:

Networking and OS internalsCryptography fundamentalsThreat modelingCloud security (IAM, VPC)Code review for security

SOC Analyst

Security

SOC 15-1212
High match

Your experience in intelligence collection, analysis, and reporting, combined with your training in debriefing and screening, aligns with the responsibilities of a SOC Analyst. Your pattern recognition skills are valuable for identifying security incidents and anomalies. You have experience with intelligence databases like CIDNE and Palantir, which are similar to SIEM (Security Information and Event Management) systems used in SOCs. The real-time interpersonal calibration translates well to incident response and threat assessment.

Typical stack:

SIEM platforms (Splunk, Elastic, Sentinel)Network protocolsEndpoint and log analysisMITRE ATT&CK familiarityIncident-response runbooks

Data Analyst

Data

SOC 15-2051
Good match

Your background in HUMINT collection involves gathering, processing, and analyzing information from various sources. This is directly applicable to data analysis, where you'd use tools and techniques to extract insights from data. Your experience managing intelligence operations and reviewing reports also supports a transition to data analysis. You'll be able to work with data at scale, and you already have an understanding of intelligence databases.

Typical stack:

SQLExcel / Sheets at expert levelOne BI tool (Tableau, Power BI, Looker)Statistics fundamentalsStakeholder communication

Computer Systems Analyst

Customer / Field

SOC 15-1211
Moderate match

Your experience in planning, coordinating, and supervising intelligence operations, along with your knowledge of intelligence databases (CIDNE, Palantir), provides a foundation for understanding system requirements and workflows. You can leverage your analytical and problem-solving skills to analyze existing computer systems and recommend improvements. Your background in managing CI activities and source operations, which includes review of reports and plans, is valuable to assess a system's performance.

Typical stack:

Software systems literacyProcess mappingRequirements gatheringSQLStakeholder communication

Skills You Already Have

Concrete bridges from 35M experience to tech-industry practice.

  • Adversarial ThinkingThreat Modeling, Risk Assessment
  • Pattern RecognitionAnomaly Detection, Intrusion Detection
  • Situational AwarenessIncident Response, Real-time Monitoring
  • After-Action AnalysisVulnerability Assessment, Root Cause Analysis
  • CHIMS, HOT-R, Analyst's Notebook (i2), CIDNE, Palantir GOTHAMSIEM, data visualization, and case management systems
  • Interrogation TechniquesElicitation, interviewing, and information gathering
  • Report WritingDocumentation, Technical Writing, and Communication

Skills to Learn

The concrete gap to bridge — specific to the roles above, not generic.

Security Information and Event Management (SIEM) tools (e.g., Splunk, QRadar)Vulnerability assessment and penetration testing methodologiesNetwork security principles and technologiesData analysis tools (e.g., Python pandas, SQL)Data visualization tools (e.g., Tableau, Power BI)Cloud platforms (AWS, Azure, GCP) security fundamentalsSIEM platforms such as Splunk or QRadarThreat intelligence platformsProgramming fundamentals (e.g. Python)

How VWC fits

Vets Who Code accelerates the parts we teach — software engineering fundamentals, web development, AI tooling. For everything else above, the path is doable independently with the resources we link to.

See VWC Programs

Civilian Career Pathways

Top civilian roles for 35M veterans, with average salary and market demand data.

Intelligence Analyst

$85K
High matchHigh demand

Skills to develop:

Familiarity with specific analytical software (e.g., Analyst's Notebook, Palantir)Enhanced data visualization skills

Counterintelligence Agent/Investigator

$95K
High matchGrowing demand

Skills to develop:

Specific legal knowledge related to investigations (e.g., criminal law, fraud)Relevant certifications (e.g., Certified Fraud Examiner (CFE))

Security Manager

$90K
Good matchStable demand

Skills to develop:

Security certifications (e.g., Certified Information Systems Security Professional (CISSP), Certified Protection Professional (CPP))Knowledge of physical security systems and protocolsRisk assessment and management methodologies

Translator/Interpreter

$65K
Good matchGrowing demand

Skills to develop:

Certification from the American Translators Association (ATA)Specialized vocabulary in a specific field (e.g., medical, legal, technical)

Corporate Investigator

$75K
Moderate matchStable demand

Skills to develop:

Knowledge of corporate security protocols and proceduresExperience with internal investigations and loss prevention

Salary estimates from VWC career data

Hidden Strengths

Cognitive skills your 35M training built — and where they transfer.

Adversarial Thinking

Understanding human motivations, vulnerabilities, and decision-making processes to conduct intelligence collection through interpersonal interaction

Reading people and understanding what drives their decisions — the interpersonal intelligence used in sales, negotiation, HR, and investigative journalism

Pattern Recognition

Identifying inconsistencies in narratives, detecting deception indicators, and recognizing behavioral patterns during interviews and interrogations

Detecting deception and inconsistencies — applicable to fraud investigation, HR investigations, investigative journalism, and due diligence

Situational Awareness

Reading room dynamics, monitoring body language, and adapting questioning strategies in real time during high-stakes interviews

Real-time interpersonal calibration — the social intelligence that drives success in sales, negotiation, therapy, and executive coaching

After-Action Analysis

Evaluating source reliability, corroborating information across reports, and assessing intelligence value for operational planning

Verifying information quality and source credibility — applicable to investigative research, journalism, due diligence, and risk assessment

Non-Obvious Career Matches

Corporate Investigator

SOC 33-9021

Interviewing subjects, gathering evidence, assessing credibility, and building cases — corporate investigation uses the exact same HUMINT methodology you've trained in.

Executive Recruiter

SOC 13-1071

Your ability to read people, assess motivations, build rapport, and extract honest information makes you exceptionally effective at talent acquisition — especially for senior roles.

User Researcher

SOC 15-1255

Interviewing people, understanding their real motivations (not just what they say), and synthesizing findings into actionable reports — UX research is HUMINT for product design.

Training & Education Equivalencies

Human Intelligence Collector AIT, Fort Huachuca

920 training hours21 weeksUp to 15 semester hours recommended

Topics Covered

  • Interrogation techniques
  • Source operations
  • Debriefing procedures
  • Cross-cultural communication
  • Screening and assessment
  • Report writing
  • Legal and ethical frameworks

Certification Pathways

Partial Coverage

Certified Fraud Examiner (CFE)40% covered

Financial fraud schemes, forensic accounting, and legal elements of fraud

Professional Certified Investigator (PCI)50% covered

Civil litigation support, corporate investigations methodology, and surveillance law

Recommended Next Certifications

PCICFECertified Anti-Money Laundering Specialist (CAMS)

Technical Systems Translation

Military systems you've used and their civilian equivalents for your resume.

Military SystemCivilian Equivalent
CHIMS (Counterintelligence and HUMINT Information Management System)Investigative case management and reporting systems
HOT-R (HUMINT Online Tasking and Reporting)Task management and intelligence reporting platforms
Analyst's Notebook (i2)IBM i2 link analysis and investigative data visualization
CIDNE (Combined Information Data Network Exchange)Incident and intelligence database management systems
Palantir GOTHAMData integration, entity resolution, and analytics platform

Ready to Translate Your Experience?

Our AI-powered translator converts your 35M experience into ATS-optimized civilian resume language.

Translate My Resume — Free