Takeover Tracker
vs

50 shared · 18 different

core competencies

43%medium risk
Web Developers

Side-by-Side Comparison

MetricInformation Security AnalystsWeb Developers
Risk Score36.5%42.8%
Risk TierMedium RiskMedium Risk
Risk Percentile70th87th
Tasks at Risk (>50%)6 / 129 / 15
Median SalaryN/AN/A
EmploymentN/AN/A

Skill Comparison

|

Sorted by largest difference

ProgrammingAI-Vulnerable
Telecommunications
Evaluating Information to Determine Compliance with Standards
Thinking Creatively
Operations Analysis
Monitor Processes, Materials, or Surroundings
Identifying Objects, Actions, and Events
Education and Training
Administration and Management
Engineering and Technology
Scheduling Work and Activities
Documenting/Recording Information

Protective Factors

Higher values indicate stronger protection against AI displacement

Information Security Analysts

29%

total discount

Web Developers

28%

total discount

Task Risk Comparison

Tasks sorted by AI automation risk — higher means more automatable

Information Security Analysts

6 of 12 at risk
74%Monitor current reports of computer viruses to determine when to update virus protection systems.
72%Document computer security and emergency measures policies, procedures, and tests.
66%Modify computer security files to incorporate new software, correct errors, or change individual access status.
56%Monitor use of data files and regulate access to safeguard information in computer files.
54%Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.

Web Developers

9 of 15 at risk
87%Perform Web site tests according to planned schedules, or after any Web site or product revision.
86%Back up files from Web sites to local directories for instant recovery in case of problems.
70%Perform or direct Web site updates.
67%Monitor security system performance logs to identify problems and notify security specialists when problems occur.
54%Select programming languages, design tools, or applications.

Premium Head-to-Head Analysis

Displacement Timeline Comparison

Information Security Analysts20282035
Web Developers20282035
20242030203520402045

Information Security Analysts has a longer runway before significant displacement, projected 0 years later than Web Developers.

Transition Feasibility

1%

Skill Overlap

Low overlap — significant retraining needed for transition

0

Unique to Information

0

Unique to Web

Combined Protection Strategy

Regardless of which path you choose, focus on these protective factors

Regulatory Barriers
Creativity
Fine Manipulation
Decision Complexity
Information Security AnalystsWeb Developers