medium risk
Information Security Analystsvs
38 shared · 27 different
core competencies
medium risk
Software Developers, Systems SoftwareSide-by-Side Comparison
Software Developers, Systems Software leads 3–0| Metric | Information Security Analysts | Software Developers, Systems Software |
|---|---|---|
| Risk Score | 36.5% | 35.4% |
| Risk Tier | Medium Risk | Medium Risk |
| Risk Percentile | 70th | 67th |
| Tasks at Risk (>50%) | 6 / 12 | 6 / 15 |
| Median Salary | N/A | N/A |
| Employment | N/A | N/A |
Skill Comparison
|
Sorted by largest difference
Evaluating Information to Determine Compliance with Standards
Monitor Processes, Materials, or Surroundings
Identifying Objects, Actions, and Events
MathematicsAI-Vulnerable
Design
Documenting/Recording Information
Thinking Creatively
Interpreting the Meaning of Information for Others
Performing Administrative Activities
Computers and Electronics
Judging the Qualities of Things, Services, or People
Quality Control Analysis
Protective Factors
Higher values indicate stronger protection against AI displacement
Information Security Analysts
29%
total discount
Software Developers, Systems Software
28%
total discount
Task Risk Comparison
Tasks sorted by AI automation risk — higher means more automatable
Information Security Analysts
6 of 12 at risk74%Monitor current reports of computer viruses to determine when to update virus protection systems.
72%Document computer security and emergency measures policies, procedures, and tests.
66%Modify computer security files to incorporate new software, correct errors, or change individual access status.
56%Monitor use of data files and regulate access to safeguard information in computer files.
54%Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Software Developers, Systems Software
6 of 15 at risk86%Monitor functioning of equipment to ensure system operates in conformance with specifications.
85%Coordinate installation of software system.
69%Prepare reports or correspondence concerning project specifications, activities, or status.
66%Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
55%Design or develop software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.
Premium Head-to-Head Analysis
Displacement Timeline Comparison
Information Security Analysts2028–2035
Software Developers, Systems Software2028–2035
20242030203520402045
Software Developers, Systems Software has a longer runway before significant displacement, projected 0 years later than Information Security Analysts.
Transition Feasibility
1%
Skill Overlap
Low overlap — significant retraining needed for transition
0
Unique to Information
0
Unique to Software
Combined Protection Strategy
Regardless of which path you choose, focus on these protective factors
Fine Manipulation
Social Intelligence
Decision Complexity
Creativity
Information Security AnalystsSoftware Developers, Systems Software