Since I am unemployed, am optimistic to work as an intelligence analyst in the US Department of Justice and Investigation. My primary responsibilities will be the preparation of briefing for the FBI officials, reviewing special reports of agents, and creating a liaison between the law enforcement agencies. The signing of the mobility agreement is essential for my profession. Therefore, operational security is a crucial aspect of my job. The paper has illustrated how I will use operation security when I am employed as an intelligence analyst.Negligent employees and the crime perpetrator are my possible threats when I become an Intelligence analyst. Negligent employees sometimes can send classified documents without encrypting. Also, during coordination between the law enforcement agencies, the third party is the potential threat. If the information reaches to an unintended party, all the operation can be compromised. Social media platform is another threat. Office gadget should never be used to login to the social media accounts since the hacker can use to monitor all the Bureau activities.Since I deal with information regarding the national security am supposed to analyze possible vulnerabilities and security holes. First, the position itself is vulnerable since I analyze and locate sensitive evidence through using the database. The information system is another vulnerable tool since the technology keeps evolving making it susceptible to hackers. The information should be stored in both hard copy and soft copy to minimize the data being lost. The bureau should ensure the software am using is updated.The probability of an external perpetrator hacking into my system of evidence database is minimal though there is a possibility of an attack happening. The recovery up to the full functioning of the system will require 72 hours. The agency will need to access the information stored in the cloud and cross check with the one stored in the hard copy before continue using. Assessment of the risk is very crucial since it determines the mitigation protocol.