Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
How AI Impacts Each Task
12 tasks analyzed
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
Monitor current reports of computer viruses to determine when to update virus protection systems.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
Modify computer security files to incorporate new software, correct errors, or change individual access status.
Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Document computer security and emergency measures policies, procedures, and tests.
Monitor use of data files and regulate access to safeguard information in computer files.
Coordinate implementation of computer system plan with establishment personnel and outside vendors.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
| Task | AI Capability | Risk | Time % | |
|---|---|---|---|---|
| Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. | 68.33Observed | 54.3% | 15% | |
| Monitor current reports of computer viruses to determine when to update virus protection systems. | 62.5Observed | 74.2% | 10% | |
| Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. | 58.4Observed | 50.4% | 10% | |
| Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. | 50.28Observed | 47.1% | 12% | |
| Modify computer security files to incorporate new software, correct errors, or change individual access status. | 43.03Observed | 66.4% | 10% | |
| Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations. | 0Estimated | 9.0% | 3% | |
| Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. | 35Estimated | 29.0% | 5% | |
| Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. | 40Estimated | 31.0% | 8% | |
| Document computer security and emergency measures policies, procedures, and tests. | 57.2Observed | 72.1% | 8% | |
| Monitor use of data files and regulate access to safeguard information in computer files. | 17.6Observed | 56.2% | 8% | |
| Coordinate implementation of computer system plan with establishment personnel and outside vendors. | 56.47Observed | 37.6% | 6% | |
| Train users and promote security awareness to ensure system security and to improve server and network efficiency. | 45Estimated | 33.0% | 5% |
Skill Impact Analysis
AI-Vulnerable Skills (6)
High reliance on Reading Comprehension is a risk area. Consider developing complementary AI-resistant skills to maintain value.
High reliance on Information Ordering is a risk area. Consider developing complementary AI-resistant skills to maintain value.
Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Programming is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
Memorization is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.
AI-Resistant Skills (11)
Adaptability/Flexibility is AI-resistant — strengthening this skill provides durable career protection.
Leadership is AI-resistant — strengthening this skill provides durable career protection.
Complex Problem Solving is AI-resistant — strengthening this skill provides durable career protection.
Coordination is AI-resistant — strengthening this skill provides durable career protection.
Instructing is AI-resistant — strengthening this skill provides durable career protection.
Service Orientation is AI-resistant — strengthening this skill provides durable career protection.
Social Perceptiveness is AI-resistant — strengthening this skill provides durable career protection.
Negotiation is AI-resistant — strengthening this skill provides durable career protection.
Recommended Courses
Courses matched to Information Security Analysts skill gaps, ranked by relevance to your displacement risk profile.
Get personalized recommendations. Answer a few questions about your experience and skills to get course suggestions tailored specifically to you.
Upskill to Reduce Risk
Courses addressing your most AI-vulnerable skills
SQL Fundamentals Skill Track
by DataCamp
Estimated Impact
AI-Augmentation Tools
Learn to work alongside AI and boost your productivity
Creative Writing Specialization
by Wesleyan University
Estimated Impact
Strengthen Your Edge
Double down on skills AI can't replicate
Leading People and Teams Specialization
by University of Michigan
Estimated Impact
We may earn a commission when you enroll through our links, at no extra cost to you. This helps fund the Takeover Tracker.
Risk reduction and salary impact are estimates based on skill gap analysis, course relevance, and labor market data. Actual results vary by individual circumstance.
Alternate Career Paths
See all transitionsComputer and Information Systems Managers
31%Median salary: $171,200
Higher risk than 45% of other occupations
Computer Network Architects
32%Higher risk than 52% of other occupations
Computer Systems Analysts
33%Higher risk than 57% of other occupations
Computer Systems Engineers/Architects
34%Higher risk than 60% of other occupations
Database Administrators
35%Higher risk than 65% of other occupations
Logistics Analysts
40%Median salary: $80,880
Higher risk than 82% of other occupations
Software Developers, Systems Software
35%Higher risk than 67% of other occupations
Software Quality Assurance Engineers and Testers
41%Higher risk than 83% of other occupations
Validation Engineers
38%Median salary: $117,750
Higher risk than 74% of other occupations
Web Administrators
40%Higher risk than 80% of other occupations
Score History
Risk score over 3 scoring runs
overall change
Education & Training
Percentage of workers at each education and training level
Prior Experience Needed
Work experience required to enter this job
Training Provided After Hiring
How long it typically takes to learn on the job
Related News
Recent articles about AI affecting this occupation

Rippling Automates SOC 2 Audits, Threatening Compliance Jobs
The workforce management platform has launched a tool that dramatically simplifies and automates the historically labor-intensive SOC 2 audit process. This threatens to reduce billable hours and headcount requirements for IT compliance professionals.

The Emotional Toll of AI Safety Testing and Jailbreaking
Human testers tasked with breaking AI safety guardrails are experiencing severe emotional distress from exposure to toxic generated content. This highlights a dark new category of tech labor where workers bear the psychological burden of AI alignment.

IT Leaders Must Build New Frameworks to Manage Rising AI Agent Sprawl
A new framework urges organizations to actively govern the rapid proliferation of autonomous AI agents. IT and operations teams will need to develop new oversight protocols to prevent security risks and operational chaos as these tools multiply.

Anthropic's Autonomous AI Hunts Cyber Flaws, Threatening Security Roles
Regulators and Wall Street banks are scrambling to adapt to Anthropic's new autonomous system capable of independently finding cybersecurity vulnerabilities. The AI's ability to hunt flaws without human oversight threatens entry-level cybersecurity analysis jobs.
Last scored March 14, 2026 · Based on BLS employment data and O*NET task analysis