← Explore professions
Technology
Cybersecurity Analyst
Based on 36 assessments
39%
Moderate risk
Average realistic automation risk across all Cybersecurity Analyst profiles in the dataset.
Score spread
Distribution across 36 profiles.
Middle half of Cybersecurity Analysts score between 35% and 44%.
0%
50%
100%
Task breakdown by work type
Done entirely on a computer. High AI exposure — these tasks are already in the automation zone.
Physical sensing, digital output — e.g. interviewing someone then writing a report. Partially protected.
Computer input, real-world output — needs someone to act on it, not just software.
No computer required. Furthest from automation — the strongest human advantage.
Typical tasks
3 synthetic profiles for a Cybersecurity Analyst, ordered by automation exposure.
Tab between them to see how task mix drives the score difference.
Monitoring security alerts from SIEM (Security Information and Event Management) systems to detect potential threats or breaches in real-time
27%
DD
62%
Conducting vulnerability assessments and penetration tests to identify weaknesses in systems, networks, or applications
deep expertise
social element
18%
AD
11%
Providing security awareness training to employees, explaining risks like phishing, social engineering, or safe data handling practices
deep expertise
social element
18%
DA
0%
Investigating and analyzing security incidents to determine their scope, impact, and root cause, often involving log analysis and forensic tools
deep expertise
social element
16%
DD
21%
Collaborating with IT teams to implement security patches, updates, or mitigations for identified vulnerabilities
some context needed
social core
12%
DD
32%
Developing and updating security policies, procedures, and documentation to ensure compliance with regulations and best practices
deep expertise
social element
4%
DD
22%
Configuring and maintaining security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection platforms
1%
DD
56%
Conducting vulnerability assessments and penetration tests to identify weaknesses in systems, networks, or applications
deep expertise
social element
27%
AD
12%
Monitoring security alerts from SIEM (Security Information and Event Management) systems to detect potential threats or breaches in real-time
23%
DD
69%
Collaborating with IT teams to implement security patches, updates, or mitigations for identified vulnerabilities
social core
20%
DD
48%
Investigating and analyzing security incidents to determine their scope, impact, and root cause, often involving log analysis and forensic tools
deep expertise
social element
15%
DD
29%
Configuring and maintaining security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection platforms
10%
DD
52%
Providing security awareness training to employees, explaining risks like phishing, social engineering, or safe data handling practices
deep expertise
social core
1%
DA
16%
Developing and updating security policies, procedures, and documentation to ensure compliance with regulations and best practices
deep expertise
social element
1%
DD
29%
Monitoring security alerts from SIEM (Security Information and Event Management) systems to detect potential threats or breaches in real-time
32%
DD
63%
Investigating and analyzing security incidents to determine their scope, impact, and root cause, often involving log analysis and forensic tools
24%
DD
61%
Conducting vulnerability assessments and penetration tests to identify weaknesses in systems, networks, or applications
19%
AD
32%
Configuring and maintaining security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection platforms
13%
DD
49%
Collaborating with IT teams to implement security patches, updates, or mitigations for identified vulnerabilities
some context needed
social core
7%
DD
35%
Developing and updating security policies, procedures, and documentation to ensure compliance with regulations and best practices
deep expertise
social element
1%
DD
28%
Providing security awareness training to employees, explaining risks like phishing, social engineering, or safe data handling practices
deep expertise
social core
1%
DA
7%
Save & share