High Automation Risk
This role has an above-average probability of significant AI or automation disruption. Consider upskilling and monitoring AI tooling in this sector.
Systems Engineer (JRN-32601)
👤 For candidates
🤖 Enhance with AI
- ›Leverage AI tools for automated threat detection and alerting
- ›Use Copilot to draft and update security documentation faster
- ›Apply orchestration platforms for streamlined incident response
📈 Disruption outlook
% risk of significant disruption
🎓 Learn now
📚 For full-time, part-time & evening courses on the Isle of Man, visit University College Isle of Man (UCM)
🏢 For employers
🔄 Alternatives
Automates threat detection and incident response workflows
Orchestrates security operations and automates routine tasks
External team manages monitoring and compliance 24/7
⚡ Recommendation
🔀 Hybrid approachAI augments technical tasks but human oversight and collaboration remain essential
Microsoft Copilot & M365
Automate threat monitoring and incident detection
Draft and update security policies efficiently
Streamline routine access control and reporting tasks
Information Security Analysts
O*NET 15-1212.00
🏢 For Employers
This role scores highly for automation potential. You may want to consider a technological solution - or redesign the role to focus on tasks that benefit from human judgement.
👤 For Candidates
This role is highly automatable. Unless you can augment your work using AI tools, long-term prospects in this area may be limited. Consider building complementary skills that are harder to automate.
Job Description
Automation Risk
This role contains a mix of routine (e.g., access control, firewall configuration), augmented (e.g., monitoring, risk assessment), and human-centric (e.g., user interaction, vendor coordination) tasks. Many technical tasks are increasingly automated or AI-assisted, but the need for judgment, cross-team collaboration, and policy development keeps full automation risk moderate. GenAI and orchestration tools can augment most documentation, monitoring, and analysis activities, resulting in high AI exposure.
Task analysis
- Plan and implement security measures to protect computer networks and information.
- Monitor and analyze reports of computer viruses and security breaches.
- Perform risk assessments and execute tests of data processing systems to ensure security.
- Develop and document security policies, procedures, and emergency measures.
- Modify security files and access controls to incorporate new software or correct errors.
- Coordinate with internal staff and external vendors to implement system plans.
- Review and address violations of computer security procedures.
- Confer with users to discuss data access needs and resolve security issues.
- Encrypt data transmissions and configure firewalls to protect confidential information.
Occupational Classification
UK Salary Benchmark
Architectural and engineering activities; technical testing and analysis · ONS ASHE 2024 annual earnings
👤 For Candidates
AI & future-of-work guidance
🤖 Enhance with AI
- ›Leverage AI tools for automated threat detection and alerting
- ›Use Copilot to draft and update security documentation faster
- ›Apply orchestration platforms for streamlined incident response
📈 Disruption outlook
% risk of significant disruption
🎓 Learn now
📚 For full-time, part-time & evening courses on the Isle of Man, visit University College Isle of Man (UCM)
🏢 For Employers
Strategic hiring options & technology alternatives
🔄 Alternatives
Automates threat detection and incident response workflows
Orchestrates security operations and automates routine tasks
External team manages monitoring and compliance 24/7
⚡ Recommendation
🔀 Hybrid approachAI augments technical tasks but human oversight and collaboration remain essential
Microsoft Copilot & M365
Automate threat monitoring and incident detection
Draft and update security policies efficiently
Streamline routine access control and reporting tasks
Key Skills
Knowledge Areas
O*NET Competency Skills
Alternative Career Paths
Advise organizations on security strategies, risk assessments, and compliance frameworks.
Design and implement complex computer networks with a focus on security and scalability.
Lead technology projects, including security system upgrades and infrastructure rollouts.
Monitor, detect, and respond to security incidents in real time.
Also Consider
🔥 Hot Technologies
In-demand tools for this occupation (O*NET)
Work Activities
General work activities from O*NET
- Working with Computers
- Getting Information
- Identifying Objects, Actions, and Events
- Evaluating Information to Determine Compliance with Standards
- Analyzing Data or Information
- Processing Information
- Documenting/Recording Information
- Updating and Using Relevant Knowledge
- Communicating with Supervisors, Peers, or Subordinates
- Making Decisions and Solving Problems
- Monitoring Processes, Materials, or Surroundings
- Interpreting the Meaning of Information for Others
- Organizing, Planning, and Prioritizing Work
- Thinking Creatively
- Establishing and Maintaining Interpersonal Relationships
Anthropic Economic Index
Real-world AI adoption data from millions of Claude conversations · Dataset ↗
Observed Claude Usage
49%
of conversations
Similar Jobs
Software Engineer
61%Search and Select Recruitment Agency
AgencyExact role match
Closes 31 May 2026
Business Analyst - 35217
31%Itchyfeet Recruitment Agency
AgencyBroad sector match
Closes 22 April 2026
Business Analyst PP22613
25%Paragon Recruitment
AgencyBroad sector match
Closes 15 April 2026
Project Manager
24%Manx Telecom Ltd
Broad sector match
Closes 23 March 2026
