← Explore professions

Technology

Cybersecurity Analyst

Based on 36 assessments

39% Moderate risk

Average realistic automation risk across all Cybersecurity Analyst profiles in the dataset.

Raw potential
81%
Realistic risk
39%
Research benchmark ?
54%

Raw potential = I/O automation ceiling. Realistic risk = adjusted for informal knowledge and social context. Research benchmark: Eloundou et al. (2023)

Distribution across 36 profiles. Middle half of Cybersecurity Analysts score between 35% and 44%.

0% 50% 100%
p10 · 30%
48% · p90
On-screen work 80%

Done entirely on a computer. High AI exposure — these tasks are already in the automation zone.

In-person + screen 16%

Physical sensing, digital output — e.g. interviewing someone then writing a report. Partially protected.

Computer + action 5%

Computer input, real-world output — needs someone to act on it, not just software.

Fully in-person 0%

No computer required. Furthest from automation — the strongest human advantage.

3 synthetic profiles for a Cybersecurity Analyst, ordered by automation exposure. Tab between them to see how task mix drives the score difference.

Task Time Type Exposure
Monitoring security alerts from SIEM (Security Information and Event Management) systems to detect potential threats or breaches in real-time
27% DD 62%
Conducting vulnerability assessments and penetration tests to identify weaknesses in systems, networks, or applications
deep expertise social element
18% AD 11%
Providing security awareness training to employees, explaining risks like phishing, social engineering, or safe data handling practices
deep expertise social element
18% DA 0%
Investigating and analyzing security incidents to determine their scope, impact, and root cause, often involving log analysis and forensic tools
deep expertise social element
16% DD 21%
Collaborating with IT teams to implement security patches, updates, or mitigations for identified vulnerabilities
some context needed
12% DD 32%
Developing and updating security policies, procedures, and documentation to ensure compliance with regulations and best practices
deep expertise social element
4% DD 22%
Configuring and maintaining security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection platforms
1% DD 56%

Work as a Cybersecurity Analyst? Map your specific role.

Start assessment →