High Automation Risk
This role has an above-average probability of significant AI or automation disruption. Consider upskilling and monitoring AI tooling in this sector.
Systems Engineer
👤 For candidates
🤖 Enhance with AI
- ›Leverage Copilot to automate routine documentation tasks
- ›Use AI-driven tools for real-time threat monitoring
- ›Apply machine learning for advanced vulnerability analysis
📈 Disruption outlook
% risk of significant disruption
🎓 Learn now
📚 For full-time, part-time & evening courses on the Isle of Man, visit University College Isle of Man (UCM)
🏢 For employers
🔄 Alternatives
Automates threat analysis and incident reporting
Cloud-based SIEM for automated monitoring and response
External team for 24/7 security monitoring
⚡ Recommendation
🔀 Hybrid approachAI augments technical tasks but human oversight remains essential for incident response
Microsoft Copilot & M365
Automate incident analysis and recommendations
Streamline routine access reviews and documentation
Centralise monitoring and automate alert triage
Information Security Analysts
O*NET 15-1212.00
🏢 For Employers
This role scores highly for automation potential. You may want to consider a technological solution - or redesign the role to focus on tasks that benefit from human judgement.
👤 For Candidates
This role is highly automatable. Unless you can augment your work using AI tools, long-term prospects in this area may be limited. Consider building complementary skills that are harder to automate.
Job Description
Automation Risk
This role features a mix of routine (e.g., documentation, access reviews), augmented (e.g., monitoring, vulnerability scanning), and human-centric (e.g., incident response, policy development) tasks. Many technical tasks are increasingly supported by AI and automation, but the need for judgment, contextual understanding, and cross-team coordination keeps full automation risk moderate. However, exposure to GenAI tools is high due to the prevalence of documentation, analysis, and monitoring tasks that can be augmented or partially substituted by AI.
Task analysis
- Monitor computer networks and systems for security breaches or intrusions.
- Conduct vulnerability assessments and penetration testing to identify security risks.
- Develop and implement security policies, protocols, and procedures.
- Respond to and investigate security incidents, including root cause analysis.
- Configure and manage firewalls, encryption, and other security tools.
- Document security incidents, policies, and compliance activities.
- Train staff on security awareness and best practices.
- Coordinate with vendors and internal teams on security upgrades and incident response.
- Review and update user access permissions and security controls.
Occupational Classification
UK Salary Benchmark
Scientific research and development · ONS ASHE 2024 annual earnings
👤 For Candidates
AI & future-of-work guidance
🤖 Enhance with AI
- ›Leverage Copilot to automate routine documentation tasks
- ›Use AI-driven tools for real-time threat monitoring
- ›Apply machine learning for advanced vulnerability analysis
📈 Disruption outlook
% risk of significant disruption
🎓 Learn now
📚 For full-time, part-time & evening courses on the Isle of Man, visit University College Isle of Man (UCM)
🏢 For Employers
Strategic hiring options & technology alternatives
🔄 Alternatives
Automates threat analysis and incident reporting
Cloud-based SIEM for automated monitoring and response
External team for 24/7 security monitoring
⚡ Recommendation
🔀 Hybrid approachAI augments technical tasks but human oversight remains essential for incident response
Microsoft Copilot & M365
Automate incident analysis and recommendations
Streamline routine access reviews and documentation
Centralise monitoring and automate alert triage
Key Skills
Knowledge Areas
O*NET Competency Skills
Alternative Career Paths
Advise organizations on security strategy, risk assessment, and compliance.
Lead and coordinate technology projects, including security implementations.
Design and oversee complex computer networks with a focus on security.
Monitor and respond to security incidents in real time within a SOC environment.
Also Consider
🔥 Hot Technologies
In-demand tools for this occupation (O*NET)
Work Activities
General work activities from O*NET
- Working with Computers
- Getting Information
- Identifying Objects, Actions, and Events
- Evaluating Information to Determine Compliance with Standards
- Analyzing Data or Information
- Processing Information
- Documenting/Recording Information
- Updating and Using Relevant Knowledge
- Communicating with Supervisors, Peers, or Subordinates
- Making Decisions and Solving Problems
- Monitoring Processes, Materials, or Surroundings
- Interpreting the Meaning of Information for Others
- Organizing, Planning, and Prioritizing Work
- Thinking Creatively
- Establishing and Maintaining Interpersonal Relationships
Anthropic Economic Index
Real-world AI adoption data from millions of Claude conversations · Dataset ↗
Observed Claude Usage
49%
of conversations
Similar Jobs
Software Engineer
51%Search and Select Recruitment Agency
AgencySame occupational group
Closes 31 May 2026
Project Manager
30%Manx Telecom Ltd
Broad sector match
Closes 23 March 2026
Auditor - Job Ref 34881
25%Itchyfeet Recruitment Agency Ltd
AgencyBroad sector match
Closes 25 March 2026
Business Analyst - 35217
25%Itchyfeet Recruitment Agency
AgencyBroad sector match
Closes 22 April 2026
