AI Risk Logo

Computer Network Architects

Medium50.66%
Salary Range
Low (10th %)$77,960
Median$129,840
High (90th %)$195,000

AI Prompt Guides for Computer Network Architects

Unlock expert prompt guides tailored for this Computer Network Architects. Get strategies to boost your productivity and results with AI.

AI Prompt Tool for Computer Network Architects

Experiment with and customize AI prompts designed for this occupation. Try, edit, and save prompts for your workflow.

Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning, including analysis of capacity needs for network infrastructures. May also design network and computer security measures. May research and recommend network and data communications hardware and software.

The occupation "Computer Network Architects" has an automation risk of 50.7%, which positions it close to the base risk value of 51.5%. This suggests that while roughly half of the tasks associated with the role could be automated with current or near-future technology, the other half require uniquely human skills that resist automation. The automation risk reflects the dual nature of this profession: it includes many repeatable, pattern-based tasks suitable for AI and software, as well as tasks that require critical thinking, judgment, and adaptability. As technology advances, many network management and routine design decisions can be handed over to AI-powered systems. However, complex problem-solving and creative decision-making remain challenging to automate completely. Among the most automatable tasks for Computer Network Architects are developing disaster recovery plans, recommending or implementing network security measures like firewalls and automated security probes, and devising solutions for network problems. These duties are increasingly supported by intelligent automation tools capable of simulating attack scenarios, conducting routine audits, and diagnosing issues using large datasets and predefined logic. As such, tools can perform these repetitive, analytically driven functions faster and more reliably than humans in many cases. Automation platforms now routinely generate and test disaster recovery plans, or routinely probe networks for vulnerabilities, making these components of the role particularly vulnerable to displacement by automation. Conversely, the tasks most resistant to automation center around maintenance coordination, project reporting, and staying current with rapid changes in technology. Specifically, maintaining network peripherals like printers often involves hands-on, situational problem-solving that automation struggles to replicate. Developing or maintaining project reporting systems, while partially automatable, often requires human judgment for interpretation and customization to unique organizational needs. Most notably, the necessity for ongoing professional development—such as attending conferences, vendor visits, and technical journal reviews—demands a level of originality (measured at 3.0–3.6%) and adaptive thinking that AI has yet to achieve. These bottleneck skills create a buffer against full automation, ensuring the continuing importance of human expertise in this evolving field.

Filter by Automatable Status
Develop disaster recovery plans.
Partially Automatable
Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
Partially Automatable
Develop and implement solutions for network problems.
Partially Automatable
Maintain networks by performing activities such as file addition, deletion, or backup.
Automatable
Coordinate network operations, maintenance, repairs, or upgrades.
Partially Automatable
Coordinate installation of new equipment.
Partially Automatable
Develop network-related documentation.
Partially Automatable
Develop and write procedures for installation, use, or troubleshooting of communications hardware or software.
Partially Automatable
Participate in network technology upgrade or expansion projects, including installation of hardware and software and integration testing.
Partially Automatable
Design, build, or operate equipment configuration prototypes, including network hardware, software, servers, or server operation systems.
Partially Automatable
Develop conceptual, logical, or physical network designs.
Partially Automatable
Evaluate network designs to determine whether customer requirements are met efficiently and effectively.
Partially Automatable
Communicate with vendors to gather information about products, alert them to future needs, resolve problems, or address system maintenance issues.
Partially Automatable
Develop plans or budgets for network equipment replacement.
Partially Automatable
Communicate with customers, sales staff, or marketing staff to determine customer needs.
Partially Automatable
Prepare detailed network specifications, including diagrams, charts, equipment configurations, or recommended technologies.
Partially Automatable
Supervise engineers or other staff in the design or implementation of network solutions.
Partially Automatable
Research and test new or modified hardware or software products to determine performance and interoperability.
Partially Automatable
Estimate time and materials needed to complete projects.
Partially Automatable
Design, organize, and deliver product awareness, skills transfer, or product education sessions for staff or suppliers.
Partially Automatable
Explain design specifications to integration or test engineers.
Partially Automatable
Coordinate network or design activities with designers of associated networks.
Partially Automatable
Prepare or monitor project schedules, budgets, or cost control systems.
Partially Automatable
Prepare design presentations and proposals for staff or customers.
Partially Automatable
Use network computer-aided design (CAD) software packages to optimize network designs.
Partially Automatable
Visit vendors, attend conferences or training sessions, or study technical journals to keep up with changes in technology.
Partially Automatable
Develop or maintain project reporting systems.
Partially Automatable
Maintain or coordinate the maintenance of network peripherals, such as printers.
Partially Automatable
Monitor and analyze network performance and reports on data input or output to detect problems, identify inefficient use of computer resources, or perform capacity planning.
Partially Automatable
Adjust network sizes to meet volume or capacity demands.
Automatable
Communicate with system users to ensure accounts are set up properly or to diagnose and solve operational problems.
Partially Automatable
Determine specific network hardware or software requirements, such as platforms, interfaces, bandwidths, or routine schemas.
Partially Automatable
Develop procedures to track, project, or report network availability, reliability, capacity, or utilization.
Partially Automatable

Monitoring Processes, Materials, or SurroundingsGetting InformationIdentifying Objects, Actions, and EventsInspecting Equipment, Structures, or MaterialsEstimating the Quantifiable Characteristics of Products, Events, or InformationJudging the Qualities of Objects, Services, or PeopleProcessing InformationEvaluating Information to Determine Compliance with StandardsAnalyzing Data or InformationMaking Decisions and Solving ProblemsThinking CreativelyUpdating and Using Relevant KnowledgeDeveloping Objectives and StrategiesScheduling Work and ActivitiesOrganizing, Planning, and Prioritizing WorkOperating Vehicles, Mechanized Devices, or EquipmentWorking with ComputersRepairing and Maintaining Electronic EquipmentDrafting, Laying Out, and Specifying Technical Devices, Parts, and EquipmentDocumenting/Recording InformationInterpreting the Meaning of Information for OthersCommunicating with Supervisors, Peers, or SubordinatesCommunicating with People Outside the OrganizationEstablishing and Maintaining Interpersonal RelationshipsAssisting and Caring for OthersSelling or Influencing OthersResolving Conflicts and Negotiating with OthersPerforming for or Working Directly with the PublicRepairing and Maintaining Mechanical EquipmentCoordinating the Work and Activities of OthersDeveloping and Building TeamsTraining and Teaching OthersGuiding, Directing, and Motivating SubordinatesCoaching and Developing OthersProviding Consultation and Advice to OthersPerforming Administrative ActivitiesStaffing Organizational UnitsMonitoring and Controlling ResourcesPerforming General Physical ActivitiesControlling Machines and ProcessesHandling and Moving Objects

Microsoft SQL ServerCitrix cloud computing softwareIBM Cognos ImpromptuIBM DominoCisco WebexAmazon Web Services AWS softwareDrupalApache HiveApache PigApache SolrCElasticsearchAdobe ActionScriptGitHubEclipse IDEHypertext markup language HTMLApache CassandraAutodesk AutoCADApple macOSAutodesk RevitFirewall softwareApache HTTP ServerApache MavenApache TomcatC#C++Enterprise JavaBeansHelp desk softwareHewlett Packard HP-UXHewlett Packard LoadRunnerApache KafkaAmazon DynamoDBAnsible softwareBashChefCisco IOSDassault Systemes SolidWorksDjangoDockerGitGoApache GroovyBlinkESRI ArcGIS softwareAtlassian BambooGoogle AngularDynamic hypertext markup language DHTMLAJAXApache AntApache StrutsExt JSCisco Systems CiscoWorksApplication management softwareAutomated installation softwareDiagramming softwareApache Subversion SVNDomain name system DNSEtherealIBM AIXEncryption softwareConfiguration management softwareAmazon Simple Storage Service S3Border Gateway Protocol BGPAirMagnet EnterpriseApplication server softwareAruba Networks AirWaveBroadSoft BroadWorksCA eTrustCapacity planning softwareCisco Systems Hot Standby Router Protocol HSRPCitrix XenAppCompaq Insight ManagerComputer Associates ArcServ BackupComputer intrusion detection systemsContent filter softwareDynatraceEmail management softwareEMC Smarts Network Protocol ManagerMicrosoft PowerPointMicrosoft ProjectMicrosoft SharePointMicrosoft WordPHPIBM Power Systems softwareMcAfeeMicrosoft ExchangeMicrosoft SQL ServerMicrosoft VisioMicrosoft WindowsMicroStrategyMinitabNagiosOracle DatabaseOracle SolarisPostgreSQLPuppetJavaScriptLAMP StackMicrosoft Azure softwareMySQLNoSQLOracle JavaServer Pages JSPOracle PL/SQLPythonOracle Fusion ApplicationsIBM WebSphereMicrosoft ExcelKornShellLinuxMicrosoft .NET FrameworkMicrosoft Visual StudioMicrosoft Windows ServerMongoDBNode.jsOracle JavaOracle WebLogic ServerPerlPerforce Helix softwareJavaScript Object Notation JSONMicrosoft PowerShellMicrosoft Active Server Pages ASPjQueryJUnitMicrosoft ActiveXMicrosoft ASP.NETOracle JDBCMicrosoft Active DirectoryPatch and update management softwareMcAfee VirusScanMicro Focus OpenViewPenetration testing softwarePing IdentityPacket filter softwareIntegrated development environment IDE softwareIntrusion prevention system IPSIBM TerraformIBM WebSphere MQInfoblox NetMRIIntermediate System to Intermediate System IS-ISInternet Protocol Security IPSECLogical partition LPAR softwareLogRhythmLucent VitalSuiteMicrosoft Forefront Threat Management GatewayMultiprotocol Label Switching MPLSNetIQNetreo OmniCenterNetScout InfinitiStream ConsoleNetwork and component performance analysis softwareNetwork architecture design softwareNetwork bridge softwareNetwork documentation softwareNetwork reporting softwareNetwork storage softwareNetwork traffic probe softwareOnline traffic calculator softwareOPNET APMXpertOptical network management softwarePacket analysis softwarePacket tracing softwareSAP softwareWeb browser softwareTableauQuest Erwin Data ModelerSplunk EnterpriseTeradata DatabaseThe MathWorks MATLABVeritas NetBackupRubyRuby on RailsSwiftShell scriptRed Hat WildFlySpring FrameworkUNIXScalaVMwareSeleniumTime reporting softwareTrimble SketchUp ProRelational database management softwareUbuntuWiresharkWide area network WAN softwareTransact-SQLVirtual private networking VPN softwareSnortSoftware distribution softwareSpring BootSystem testing softwareUNIX ShellRed Hat OpenShiftVirus scanning softwareTcpdumpSolarWindsSecurity incident management softwareWebsense Data Loss PreventionStorage area network SAN softwareRemote access softwareRiverbed TechnologyRoot cause analysis softwareSession Initiation Protocol SIPSilver PeakSimple network management protocol SNMP softwareStorage management softwareSystems and applications migration softwareTransparent Interconnection of Lots of Links TRILLVirtual Router Redundancy Protocol VRRPWide area network WAN optimization softwareMicrosoft WindowsNortonLifeLock cybersecurity softwareOracle E-Business Suite FinancialsApache HadoopApple macOSCitrix cloud computing softwareCisco WebexDrupalAmazon RedshiftApache HiveApache SolrCCascading style sheets CSSElasticsearchEclipse IDEApache CassandraAutodesk RevitApache HTTP ServerApache MavenApache TomcatC#C++Enterprise JavaBeansApache KafkaAmazon DynamoDBAnsible softwareBashChefDassault Systemes CATIADjangoDockerApache GroovyBlinkESRI ArcGIS softwareAtlassian BambooAJAXApache AntApache SparkApplication management softwareAutomated installation softwareApache Subversion SVNAccess management softwareDomain name system DNSEncryption softwareConfiguration management softwareAmazon Simple Storage Service S3Border Gateway Protocol BGPAirMagnet EnterpriseAruba Networks AirWaveCA eTrustCapacity planning softwareCisco Systems Hot Standby Router Protocol HSRPCitrix XenAppCompaq Insight ManagerComputer Associates ArcServ BackupContent filter softwareDynatraceEMC Smarts Network Protocol ManagerElement management softwareComputer based training softwareAsset management administration softwareDiscrete event simulation softwareMicrosoft PowerPointMicrosoft ProjectMicrosoft SharePointJob control language JCLMicrosoft WordIBM Cognos ImpromptuIBM DominoIBM NotesMcAfeeMicrosoft ExchangeMicrosoft VisioMicrosoft Visual BasicMicroStrategyMinitabNagiosOracle DatabaseJavaScriptGitHubLAMP StackMySQLNoSQLOracle Business Intelligence Enterprise EditionHypertext markup language HTMLFirewall softwareOperating system softwareOracle Fusion ApplicationsMicrosoft ExcelHelp desk softwareHewlett Packard HP-UXIBM WebSphereKornShellLinuxLocal area network LAN softwareMicrosoft .NET FrameworkMicrosoft Visual StudioMongoDBNode.jsOracle Fusion MiddlewareOracle JavaMicrosoft operating systemGitGoJavaScript Object Notation JSONMicrosoft SQL Server Reporting Services SSRSMicrosoft PowerShellGoogle AngularGoogle AndroidExt JSHibernate ORMjQueryMicrosoft ActiveXMicrosoft ASP.NET Core MVCEtherealMcAfee VirusScanIBM AIXNetwork intrusion detection softwareIntrusion prevention system IPSIBM TerraformIBM WebSphere MQInfoblox NetMRIIntermediate System to Intermediate System IS-ISInternet Protocol Security IPSECLogical partition LPAR softwareLogRhythmLucent VitalSuiteMicrosoft Forefront Threat Management GatewayMultiprotocol Label Switching MPLSNetIQNetreo OmniCenterNetScout InfinitiStream ConsoleNetwork and component performance analysis softwareNetwork architecture design softwareNetwork bridge softwareNetwork documentation softwareNetwork reporting softwareNetwork storage softwareNetwork traffic probe softwareNetwork, server and operating system optimization softwareOnline traffic calculator softwareOPNET APMXpertOptical network management softwareNetwork intrusion prevention systems NIPSPHPSAP softwareWeb browser softwareTableauOracle SolarisPostgreSQLPuppetQlik Tech QlikViewSplunk EnterpriseTeradata DatabaseThe MathWorks MATLABVeritas NetBackupOracle PL/SQLPythonRubyRuby on RailsSwiftOracle WebLogic ServerPerlShell scriptRed Hat WildFlySpring FrameworkUNIXVMwareSeleniumTime reporting softwarePerforce Helix softwareScalaUbuntuVerilogWiresharkTransact-SQLOracle JDBCSnortSoftware distribution softwareSpring BootSystem testing softwareUNIX ShellPatch and update management softwarePenetration testing softwareRed Hat OpenShiftVirus scanning softwarePing IdentityTcpdumpSolarWindsPacket filter softwarePacket analysis softwareSecurity incident management softwareRemote access softwareRoot cause analysis softwareSilver PeakStorage management softwareSystems and applications migration softwareTransparent Interconnection of Lots of Links TRILLVirtual Router Redundancy Protocol VRRPWide area network WAN optimization softwareVideoconferencing softwareOracle Java Enterprise Edition EERisk assessment softwareSegue SilkPerformerSimple mail transfer protocol SMTPSymantec Intruder AlertAmazon Web Services AWS softwareAdobe After EffectsMicrosoft Azure softwareOracle JavaServer Pages JSPHuman resource management software HRMSAtlassian JIRASupervisory control and data acquisition SCADA softwareMicrosoft Visual Basic Scripting Edition VBScriptMicrosoft Visual Basic Scripting Edition VBScriptLocal area network LAN softwareExtensible markup language XMLOracle Fusion MiddlewareRed Hat Enterprise LinuxRed Hat Enterprise LinuxMicrosoft AccessTrimble SketchUp ProAmazon Elastic Compute Cloud EC2Dassault Systemes SolidWorksNational Instruments LabVIEWDynamic hypertext markup language DHTMLAdvanced business application programming ABAPAdvanced business application programming ABAPMicrosoft Active Server Pages ASPMicrosoft ASP.NETMicrosoft Active DirectoryCommon business oriented language COBOLAmazon Web Services AWS CloudFormationAmazon Web Services AWS CloudFormationVirtual private networking VPN softwareSystem and data disaster recovery softwareCisco Systems Gateway Load Balancing Protocol GLBPCisco Systems Gateway Load Balancing Protocol GLBPIntegrated development environment IDE softwareNetwork, server and operating system optimization softwarePacket tracing softwareVoice over internet protocol VoIP system softwareRelational database management softwareAtlassian ConfluenceAutodesk AutoCADIBM InfoSphere DataStageIBM NotesJob control language JCLMicrosoft Visual BasicNortonLifeLock cybersecurity softwareQlik Tech QlikViewQuest Erwin Data ModelerSupervisory control and data acquisition SCADA softwareAdobe After EffectsAmazon RedshiftApache PigCascading style sheets CSSAdobe ActionScriptExtensible hypertext markup language XHTMLOperating system softwareCommon business oriented language COBOLMicrosoft Windows ServerMicrosoft SQL Server Reporting Services SSRSUnified modeling language UMLUnified modeling language UMLHewlett Packard LoadRunnerMicrosoft operating systemAmazon Elastic Compute Cloud EC2Cisco IOSDassault Systemes CATIAVerilogNational Instruments LabVIEWWide area network WAN softwareVideoconferencing softwareGoogle AndroidApache SparkApache StrutsHibernate ORMJUnitMicrosoft ASP.NET Core MVCCisco Systems CiscoWorksAccess management softwareDiagramming softwareElement management softwareNetwork intrusion prevention systems NIPSSystem and data disaster recovery softwareVoice over internet protocol VoIP system softwareRequirements management softwareRequirements management softwareMicro Focus OpenViewNetwork and system vulnerability assessment softwareNetwork and system vulnerability assessment softwareWebsense Data Loss PreventionNetwork intrusion detection softwareStorage area network SAN softwareCisco Systems CiscoWorks LAN Management SolutionCisco Systems CiscoWorks LAN Management SolutionApplication server softwareBroadSoft BroadWorksComputer intrusion detection systemsEmail management softwareComputer based training softwareNetwork and application load and performance testing softwareNetwork and application load and performance testing softwareNetwork availability monitoring softwareNetwork availability monitoring softwareNetwork traffic flow monitoring and analysis softwareNetwork traffic flow monitoring and analysis softwareAsset management administration softwareDiscrete event simulation softwareOracle Java Enterprise Edition EEMulti-router traffic grapher MRTG softwareMulti-router traffic grapher MRTG softwareCisco Systems Cisco Web Cache Communication Protocol WCCPCisco Systems Cisco Web Cache Communication Protocol WCCPCisco Systems Wireless Control System WCSCisco Systems Wireless Control System WCSEnhanced Interior Gateway Routing Protocol EIGRPEnhanced Interior Gateway Routing Protocol EIGRPInfoblox security and networking softwareInfoblox security and networking softwareIpswitch WhatsUp GoldIpswitch WhatsUp GoldMicrosoft Forefront Identify ManagerMicrosoft Forefront Identify ManagerNetwork modeling, mapping, and analysis softwareNetwork modeling, mapping, and analysis softwareOpen Shortest Path First OSPFOpen Shortest Path First OSPFRiverbed TechnologySession Initiation Protocol SIPSimple network management protocol SNMP softwareVirtual local area network management softwareVirtual local area network management softwareRisk assessment softwareSegue SilkPerformerSimple mail transfer protocol SMTPSymantec Intruder AlertTicket information tracking softwareTicket information tracking softwareMicrosoft DynamicsApache HadoopAtlassian ConfluenceIBM InfoSphere DataStageStructured query language SQLIBM Power Systems softwareOracle E-Business Suite FinancialsExtensible hypertext markup language XHTMLHuman resource management software HRMSOracle Business Intelligence Enterprise EditionAtlassian JIRAExtensible markup language XMLMicrosoft DynamicsMicrosoft Office softwareMicrosoft Office softwareCustomer information control system CICSCustomer information control system CICSMicrosoft AccessStructured query language SQL

Computer and Information Systems Managers
Medium46.26%
Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.
Security Management Specialists
Medium47.83%
Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security or the safety of employees and facilities.
Computer Systems Analysts
Medium48.05%
Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.
Information Security Analysts
Medium53.69%
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Computer Network Support Specialists
Medium55.92%
Analyze, test, troubleshoot, and evaluate existing network systems, such as local area networks (LAN), wide area networks (WAN), cloud networks, servers, and other data communications networks. Perform network maintenance to ensure networks operate correctly with minimal interruption.
Computer User Support Specialists
Medium55.42%
Provide technical assistance to computer users. Answer questions or resolve computer problems for clients in person, via telephone, or electronically. May provide assistance concerning the use of computer hardware and software, including printing, installation, word processing, electronic mail, and operating systems.
Telecommunications Engineering Specialists
Medium56.77%
Design or configure wired, wireless, and satellite communications systems for voice, video, and data services. Supervise installation, service, and maintenance.
Database Administrators
Medium50.55%
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases.
Database Architects
Medium50.12%
Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality.
Network and Computer Systems Administrators
Medium57.76%
Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), data communications network, operating systems, and physical and virtual servers. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system backups. Analyze network and server resource consumption and control user access. Install and upgrade software and maintain software licenses. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software.
Software Developers
Medium51.32%
Research, design, and develop computer and network software or specialized utility programs. Analyze user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis. Update software or enhance existing software capabilities. May work with computer hardware engineers to integrate hardware and software systems, and develop specifications and performance requirements. May maintain databases within an application area, working individually or coordinating database development as part of a team.
Penetration Testers
Medium51.14%
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Information Security Engineers
Medium52.50%
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Blockchain Engineers
Medium51.47%
Maintain and support distributed and decentralized blockchain-based networks or block-chain applications such as cryptocurrency exchange, payment processing, document sharing, and digital voting. Design and deploy secure block-chain design patterns and solutions over geographically distributed networks using advanced technologies. May assist with infrastructure setup and testing for application transparency and security.
Computer Systems Engineers/Architects
Medium50.80%
Design and develop solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions.
Computer Hardware Engineers
Medium46.34%
Research, design, develop, or test computer or computer-related equipment for commercial, industrial, military, or scientific use. May supervise the manufacturing and installation of computer or computer-related equipment and components.
Electronics Engineers, Except Computer
Medium47.85%
Research, design, develop, or test electronic components and systems for commercial, industrial, military, or scientific use employing knowledge of electronic theory and materials properties. Design electronic circuits and components for use in fields such as telecommunications, aerospace guidance and propulsion control, acoustics, or instruments and controls.
Radio Frequency Identification Device Specialists
Medium48.06%
Design and implement radio frequency identification device (RFID) systems used to track shipments or goods.
Electrical and Electronic Engineering Technologists and Technicians
Medium44.30%
Apply electrical and electronic theory and related knowledge, usually under the direction of engineering staff, to design, build, repair, adjust, and modify electrical components, circuitry, controls, and machinery for subsequent evaluation and use by engineering staff in making engineering design decisions.
Telecommunications Equipment Installers and Repairers, Except Line Installers
Medium40.45%
Install, set up, rearrange, or remove switching, distribution, routing, and dialing equipment used in central offices or headends. Service or repair telephone, cable television, Internet, and other communications equipment on customers' property. May install communications equipment or communications wiring in buildings.
Computer and Information Research Scientists
Medium45.73%
Conduct research into fundamental computer and information science as theorists, designers, or inventors. Develop solutions to problems in the field of computer hardware and software.
Data Warehousing Specialists
Medium49.22%
Design, model, or implement corporate data warehousing activities. Program and configure warehouses of database information and provide support to warehouse users.
Computer Programmers
Medium53.56%
Create, modify, and test the code and scripts that allow computer applications to run. Work from specifications drawn up by software and web developers or other individuals. May develop and write computer programs to store, locate, and retrieve specific documents, data, and information.
Web Developers
Medium61.87%
Develop and implement websites, web applications, application databases, and interactive web interfaces. Evaluate code to ensure that it is properly structured, meets industry standards, and is compatible with browsers and devices. Optimize website performance, scalability, and server-side code and processes. May develop website infrastructure and integrate websites with other computer applications.
Web and Digital Interface Designers
Medium60.00%
Design digital user interfaces or websites. Develop and test layouts, interfaces, functionality, and navigation menus to ensure compatibility and usability across browsers or devices. May use web framework applications as well as client-side code and processes. May evaluate web design following web and accessibility standards, and may analyze web use metrics and optimize websites for marketability and search engine ranking. May design and test interfaces that facilitate the human-computer interaction and maximize the usability of digital devices, websites, and software with a focus on aesthetics and design. May create graphics used in websites and manage website content and links.
Web Administrators
Medium53.44%
Manage web environment design, deployment, development and maintenance activities. Perform testing and quality assurance of web sites and web applications.
Digital Forensics Analysts
Medium56.25%
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Broadcast Technicians
Medium59.28%
Set up, operate, and maintain the electronic equipment used to acquire, edit, and transmit audio and video for radio or television programs. Control and adjust incoming and outgoing broadcast signals to regulate sound volume, signal strength, and signal clarity. Operate satellite, microwave, or other transmitter equipment to broadcast radio or television programs.

AI Readiness Accelerator

A practical course designed for small and medium businesses to master AI and automation. Learn how to identify opportunities, implement AI tools, and streamline your operations for a future-proof business. No technical background required!

Learn More

AI Prompt Guides

Unlock industry- and job-specific prompt guides to get the most out of AI tools. Our guides are tailored for your sector and role, helping you craft effective prompts for real-world results. Stay ahead with expert strategies!

Browse Guides

AI Prompt Tool

Find, try, and share expert prompts and automations for key jobs and tasks. Access a growing library from our experts and the community, and test prompts with your own data. Discover new ways to automate and innovate!

Try the Tool