medium risk
Computer and Information Research Scientistsvs
48 shared · 26 different
core competencies
medium risk
Information Security AnalystsSide-by-Side Comparison
Computer and Information Research Scientists leads 4–0| Metric | Computer and Information Research Scientists | Information Security Analysts |
|---|---|---|
| Risk Score | 32.4% | 36.5% |
| Risk Tier | Medium Risk | Medium Risk |
| Risk Percentile | 53th | 70th |
| Tasks at Risk (>50%) | 5 / 15 | 6 / 12 |
| Median Salary | N/A | N/A |
| Employment | N/A | N/A |
Skill Comparison
|
Sorted by largest difference
MathematicsAI-Vulnerable
Monitor Processes, Materials, or Surroundings
Thinking Creatively
ProgrammingAI-Vulnerable
MathematicsAI-Vulnerable
Provide Consultation and Advice to Others
Systems Evaluation
Scheduling Work and Activities
Education and Training
Communicating with Persons Outside Organization
Making Decisions and Solving Problems
Evaluating Information to Determine Compliance with Standards
Protective Factors
Higher values indicate stronger protection against AI displacement
Computer and Information Research Scientists
33%
total discount
Information Security Analysts
29%
total discount
Task Risk Comparison
Tasks sorted by AI automation risk — higher means more automatable
Computer and Information Research Scientists
5 of 15 at risk80%Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
78%Approve, prepare, monitor, and adjust operational budgets.
65%Assign or schedule tasks to meet work priorities and goals.
56%Apply theoretical expertise and innovation to create or apply new technology, such as adapting principles for applying computers to new uses.
51%Analyze problems to develop solutions involving computer hardware and software.
Information Security Analysts
6 of 12 at risk74%Monitor current reports of computer viruses to determine when to update virus protection systems.
72%Document computer security and emergency measures policies, procedures, and tests.
66%Modify computer security files to incorporate new software, correct errors, or change individual access status.
56%Monitor use of data files and regulate access to safeguard information in computer files.
54%Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Premium Head-to-Head Analysis
Displacement Timeline Comparison
Computer and Information Research Scientists2028–2035
Information Security Analysts2028–2035
20242030203520402045
Computer and Information Research Scientists has a longer runway before significant displacement, projected 0 years later than Information Security Analysts.
Transition Feasibility
1%
Skill Overlap
Low overlap — significant retraining needed for transition
0
Unique to Computer
0
Unique to Information
Combined Protection Strategy
Regardless of which path you choose, focus on these protective factors
Creativity
Social Intelligence
Fine Manipulation
Regulatory Barriers
Computer and Information Research ScientistsInformation Security Analysts