Takeover Tracker
37%medium risk

Information Security Analysts

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Higher risk than 70% of occupations
Checking for existing plan...

How AI Impacts Each Task

12 tasks analyzed

Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.

Risk: 54.3%AI: 68.33ObservedTime: 15%

Monitor current reports of computer viruses to determine when to update virus protection systems.

Risk: 74.2%AI: 62.5ObservedTime: 10%

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Risk: 50.4%AI: 58.4ObservedTime: 10%

Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.

Risk: 47.1%AI: 50.28ObservedTime: 12%

Modify computer security files to incorporate new software, correct errors, or change individual access status.

Risk: 66.4%AI: 43.03ObservedTime: 10%

Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.

Risk: 9.0%AI: 0EstimatedTime: 3%

Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.

Risk: 29.0%AI: 35EstimatedTime: 5%

Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.

Risk: 31.0%AI: 40EstimatedTime: 8%

Document computer security and emergency measures policies, procedures, and tests.

Risk: 72.1%AI: 57.2ObservedTime: 8%

Monitor use of data files and regulate access to safeguard information in computer files.

Risk: 56.2%AI: 17.6ObservedTime: 8%

Coordinate implementation of computer system plan with establishment personnel and outside vendors.

Risk: 37.6%AI: 56.47ObservedTime: 6%

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Risk: 33.0%AI: 45EstimatedTime: 5%

Skill Impact Analysis

AI-Vulnerable Skills (6)

Reading Comprehension10%

High reliance on Reading Comprehension is a risk area. Consider developing complementary AI-resistant skills to maintain value.

Information Ordering5%

High reliance on Information Ordering is a risk area. Consider developing complementary AI-resistant skills to maintain value.

Mathematics10%

Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.

Programming15%

Programming is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.

Mathematics10%

Mathematics is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.

Memorization5%

Memorization is AI-vulnerable but has moderate importance in this role. AI tools may handle this; focus on higher-value skills.

AI-Resistant Skills (11)

Adaptability/Flexibility85%

Adaptability/Flexibility is AI-resistant — strengthening this skill provides durable career protection.

Leadership88%

Leadership is AI-resistant — strengthening this skill provides durable career protection.

Complex Problem Solving75%

Complex Problem Solving is AI-resistant — strengthening this skill provides durable career protection.

Coordination70%

Coordination is AI-resistant — strengthening this skill provides durable career protection.

Instructing75%

Instructing is AI-resistant — strengthening this skill provides durable career protection.

Service Orientation82%

Service Orientation is AI-resistant — strengthening this skill provides durable career protection.

Social Perceptiveness90%

Social Perceptiveness is AI-resistant — strengthening this skill provides durable career protection.

Negotiation85%

Negotiation is AI-resistant — strengthening this skill provides durable career protection.

Recommended Courses

Courses matched to Information Security Analysts skill gaps, ranked by relevance to your displacement risk profile.

Get personalized recommendations. Answer a few questions about your experience and skills to get course suggestions tailored specifically to you.

Upskill to Reduce Risk

Courses addressing your most AI-vulnerable skills

DataCampbeginner

SQL Fundamentals Skill Track

by DataCamp

21 hours$25/mo4.7Certificate
Addresses vulnerability: Information Ordering

Estimated Impact

-7.6pt risk

AI-Augmentation Tools

Learn to work alongside AI and boost your productivity

Coursera

Creative Writing Specialization

by Wesleyan University

~8 weeks$49/mo4.7Certificate
Enhances AI augmentation: Writing

Estimated Impact

-5.3pt risk

Strengthen Your Edge

Double down on skills AI can't replicate

Courseraintermediate

Leading People and Teams Specialization

by University of Michigan

~6 weeks$49/mo4.7Certificate
Strengthens resilience: Leadership

Estimated Impact

-3.9pt risk

We may earn a commission when you enroll through our links, at no extra cost to you. This helps fund the Takeover Tracker.

Risk reduction and salary impact are estimates based on skill gap analysis, course relevance, and labor market data. Actual results vary by individual circumstance.

Score History

Risk score over 3 scoring runs

-7.6

overall change

Education & Training

Percentage of workers at each education and training level

Prior Experience Needed

Work experience required to enter this job

8-10 years18%
Over 10 years13%

Training Provided After Hiring

How long it typically takes to learn on the job

None13%
Up to 1 month4%
1-3 months23%
3-6 months13%
6 months - 1 year27%
1-2 years7%
4-6 years6%
6-8 years7%

Related News

Recent articles about AI affecting this occupation

4 articles

Rippling Automates SOC 2 Audits, Threatening Compliance Jobs

The workforce management platform has launched a tool that dramatically simplifies and automates the historically labor-intensive SOC 2 audit process. This threatens to reduce billable hours and headcount requirements for IT compliance professionals.

CPA Practice Advisoryesterday

The Emotional Toll of AI Safety Testing and Jailbreaking

Human testers tasked with breaking AI safety guardrails are experiencing severe emotional distress from exposure to toxic generated content. This highlights a dark new category of tech labor where workers bear the psychological burden of AI alignment.

The Guardian AIyesterday

IT Leaders Must Build New Frameworks to Manage Rising AI Agent Sprawl

A new framework urges organizations to actively govern the rapid proliferation of autonomous AI agents. IT and operations teams will need to develop new oversight protocols to prevent security risks and operational chaos as these tools multiply.

Gartner AI2d ago

Anthropic's Autonomous AI Hunts Cyber Flaws, Threatening Security Roles

Regulators and Wall Street banks are scrambling to adapt to Anthropic's new autonomous system capable of independently finding cybersecurity vulnerabilities. The AI's ability to hunt flaws without human oversight threatens entry-level cybersecurity analysis jobs.

Bloomberg Technology5d ago

Last scored March 14, 2026 · Based on BLS employment data and O*NET task analysis