medium risk
Computer Network Architectsvs
56 shared · 21 different
core competencies
medium risk
Information Security AnalystsSide-by-Side Comparison
Computer Network Architects leads 3–1| Metric | Computer Network Architects | Information Security Analysts |
|---|---|---|
| Risk Score | 32.1% | 36.5% |
| Risk Tier | Medium Risk | Medium Risk |
| Risk Percentile | 52th | 70th |
| Tasks at Risk (>50%) | 7 / 15 | 6 / 12 |
| Median Salary | N/A | N/A |
| Employment | N/A | N/A |
Skill Comparison
|
Sorted by largest difference
Design
Telecommunications
Provide Consultation and Advice to Others
MathematicsAI-Vulnerable
Engineering and Technology
MathematicsAI-Vulnerable
Making Decisions and Solving Problems
Guiding, Directing, and Motivating Subordinates
ProgrammingAI-Vulnerable
Interacting With Computers
Technology DesignAI-Augmented
Developing and Building Teams
Protective Factors
Higher values indicate stronger protection against AI displacement
Computer Network Architects
31%
total discount
Information Security Analysts
29%
total discount
Task Risk Comparison
Tasks sorted by AI automation risk — higher means more automatable
Computer Network Architects
7 of 15 at risk80%Estimate time and materials needed to complete projects.
70%Maintain networks by performing activities such as file addition, deletion, or backup.
59%Adjust network sizes to meet volume or capacity demands.
55%Develop conceptual, logical, or physical network designs.
53%Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
Information Security Analysts
6 of 12 at risk74%Monitor current reports of computer viruses to determine when to update virus protection systems.
72%Document computer security and emergency measures policies, procedures, and tests.
66%Modify computer security files to incorporate new software, correct errors, or change individual access status.
56%Monitor use of data files and regulate access to safeguard information in computer files.
54%Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Premium Head-to-Head Analysis
Displacement Timeline Comparison
Computer Network Architects2028–2035
Information Security Analysts2028–2035
20242030203520402045
Computer Network Architects has a longer runway before significant displacement, projected 0 years later than Information Security Analysts.
Transition Feasibility
1%
Skill Overlap
Low overlap — significant retraining needed for transition
0
Unique to Computer
0
Unique to Information
Combined Protection Strategy
Regardless of which path you choose, focus on these protective factors
Social Intelligence
Decision Complexity
Creativity
Regulatory Barriers
Computer Network ArchitectsInformation Security Analysts