How does it work?

Computer & Mathematical

Information Security Analysts

61.3%Moderate Risk

Summary

Information security analysts face moderate risk as AI automates routine threat monitoring, access management, and policy documentation. While technical detection and encryption are increasingly handled by algorithms, human expertise remains essential for strategic risk planning and managing complex vendor relationships. The role is shifting from manual system monitoring toward high level security orchestration and human centered incident response.

Scored by Gemini 3.1 Pro·How does scoring work?

The AI Jury

ClaudeToo High

The Diplomat

AI can flag anomalies but the adversarial, ever-shifting threat landscape demands human judgment that no static model can reliably replicate. Security analysts are essentially playing chess against other humans.

45%
GrokToo Low

The Chaos Agent

Virus monitoring and firewall tweaks? AI's crushing it already. Score's naively clinging to human oversight myths.

78%
DeepSeekToo High

The Contrarian

AI excels at threat detection but creates more complex attack surfaces; human analysts become cyber war tacticians, not replaceable code-monkeys.

55%
ChatGPTToo High

The Optimist

AI will swallow a lot of alert triage and policy drafting, but defenders still need human judgment, trust, and calm in the middle of messy incidents.

54%

Task-by-Task Breakdown

Monitor current reports of computer viruses to determine when to update virus protection systems.
90

Threat intelligence feeds and modern Endpoint Detection and Response (EDR) systems already automate the continuous monitoring and updating of virus protection without human intervention.

Modify computer security files to incorporate new software, correct errors, or change individual access status.
85

Routine Identity and Access Management (IAM) and configuration changes are highly automatable via scripts, HR system integrations, and AI-driven provisioning tools.

Monitor use of data files and regulate access to safeguard information in computer files.
85

AI-driven Data Loss Prevention (DLP) and User and Entity Behavior Analytics (UEBA) systems already automate the continuous monitoring and regulation of file access patterns.

Document computer security and emergency measures policies, procedures, and tests.
80

Large Language Models excel at generating standard security documentation, policies, and procedural drafts based on system logs or brief prompts, requiring only human review.

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
70

AI-assisted network configuration and Infrastructure as Code (IaC) tools can automate much of this deployment, though human oversight is still needed to approve complex rulesets and prevent business disruption.

Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
65

Automated vulnerability scanners and AI-driven penetration testing tools handle the execution, but human analysts are required to interpret complex vulnerabilities within a business context.

Train users and promote security awareness to ensure system security and to improve server and network efficiency.
55

AI can generate training materials and run automated phishing simulations, but driving genuine organizational culture change and security awareness benefits heavily from human leadership.

Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
45

While AI chatbots can handle routine access requests, discussing complex programming changes or sensitive security issues requires human judgment and interpersonal communication.

Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
40

While AI can suggest frameworks and draft policies, developing comprehensive security strategies requires deep understanding of specific organizational contexts, risk appetites, and business goals.

Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
35

AI can easily detect and flag violations, but discussing them with employees to ensure understanding and behavioral change requires human empathy, authority, and negotiation.

Coordinate implementation of computer system plan with establishment personnel and outside vendors.
30

Managing projects across multiple human stakeholders and external vendors requires social intelligence, negotiation, and adaptability that AI lacks.