Will AI Replace DORA ICT Risk Officer Jobs?

Mid-Level (3-7 years experience) Security Governance Security Compliance Live Tracked This assessment is actively monitored and updated as AI capabilities change.
GREEN (Transforming)
0.0
/100
Score at a Glance
Overall
0.0 /100
PROTECTED
Task ResistanceHow resistant daily tasks are to AI automation. 5.0 = fully human, 1.0 = fully automatable.
0/5
EvidenceReal-world market signals: job postings, wages, company actions, expert consensus. Range -10 to +10.
+0/10
Barriers to AIStructural barriers preventing AI replacement: licensing, physical presence, unions, liability, culture.
0/10
Protective PrinciplesHuman-only factors: physical presence, deep interpersonal connection, moral judgment.
0/9
AI GrowthDoes AI adoption create more demand for this role? 2 = strong boost, 0 = neutral, negative = shrinking.
+0/2
Score Composition 55.2/100
Task Resistance (50%) Evidence (20%) Barriers (15%) Protective (10%) AI Growth (5%)
Where This Role Sits
0 — At Risk 100 — Protected
DORA ICT Risk Officer (Mid-Level): 55.2

This role is protected from AI displacement. The assessment below explains why — and what's still changing.

DORA mandates an independent ICT risk control function at every in-scope financial entity — regulation creates and protects this role. Third-party risk oversight, incident classification, and management body advisory resist automation, but 45% of task time is shifting to AI-augmented workflows as monitoring, evidence collection, and register maintenance become agent-executable. 5-7+ year horizon.

Role Definition

FieldValue
Job TitleDORA ICT Risk Officer (ICT Risk Manager / Digital Operational Resilience Officer)
Seniority LevelMid-Level (3-7 years experience)
Primary FunctionManages the ICT risk management framework mandated by the EU Digital Operational Resilience Act (DORA) within a financial entity. Identifies, classifies, and monitors ICT risks; oversees third-party ICT provider risk; coordinates ICT incident reporting to competent authorities; maintains the Register of Information; supports TLPT programmes; and reports ICT risk posture to the management body. Operates as the second-line control function required under DORA Article 6(4).
What This Role Is NOTNOT a CISO (sets enterprise security strategy at executive/board level — scored 83.0). NOT a Cybersecurity Risk Manager (manages broader cyber risk beyond DORA scope — scored 52.9). NOT an IT Auditor (third-line independent assessment of controls). NOT a Compliance Officer (owns regulatory compliance broadly). NOT an AI Risk Manager (AI-specific risk — scored 62.8). This role owns the DORA-mandated ICT risk control function — narrower than general cyber risk, deeper than compliance, operationally focused on digital operational resilience in financial services.
Typical Experience3-7 years in ICT risk, information security, or financial services technology risk. Certifications: CRISC, CISM, ISO 27001 Lead Implementer, DORA-specific training (PECB DORA Foundation/Lead Manager). Reports to CISO, CRO, or Head of Operational Risk.

Seniority note: A junior DORA compliance administrator focused on register maintenance and template population would score Yellow. A senior Head of Digital Operational Resilience with management body advisory and multi-entity oversight would score higher Green.


Protective Principles + AI Growth Correlation

Human-Only Factors
Embodied Physicality
No physical presence needed
Deep Interpersonal Connection
Some human interaction
Moral Judgment
Significant moral weight
AI Effect on Demand
AI slightly boosts jobs
Protective Total: 3/9
PrincipleScore (0-3)Rationale
Embodied Physicality0Fully digital, desk-based. GRC platforms, risk registers, regulatory portals, stakeholder meetings.
Deep Interpersonal Connection1Reports ICT risk posture to management body, coordinates with ICT third-party providers, liaises with national competent authorities during incident reporting. Requires influence but not deep trust-based relationships.
Goal-Setting & Moral Judgment2Determines ICT risk tolerance levels, classifies ICT incidents by severity (major vs non-major under Article 19), makes judgment calls on third-party concentration risk, interprets DORA RTS/ITS for novel scenarios. Risk appetite decisions involve genuine judgment.
Protective Total3/9
AI Growth Correlation1DORA creates a fixed regulatory demand floor — every financial entity needs this function. AI adoption in financial services creates new ICT risks (AI model dependencies, AI-powered third-party services) that expand scope. But the role exists because of regulation, not AI growth. Weak positive.

Quick screen result: Protective 3 + Correlation 1 = Likely Yellow or low Green (proceed to quantify).


Task Decomposition (Agentic AI Scoring)

Work Impact Breakdown
10%
80%
10%
Displaced Augmented Not Involved
ICT risk management framework governance
20%
2/5 Augmented
ICT third-party risk oversight
20%
3/5 Augmented
ICT incident reporting & classification
15%
3/5 Augmented
Regulatory interpretation & gap analysis
15%
2/5 Augmented
Digital operational resilience testing oversight
10%
2/5 Augmented
Stakeholder communication & management body reporting
10%
1/5 Not Involved
Register of Information maintenance & evidence management
10%
4/5 Displaced
TaskTime %Score (1-5)WeightedAug/DispRationale
ICT risk management framework governance20%20.40AUGAI drafts framework policies, maps DORA articles to controls, benchmarks against RTS/ITS. Human designs framework architecture, selects risk methodologies, adapts to entity-specific ICT landscape, presents to management body for approval. DORA Article 6(1) requires framework to be "sound, comprehensive and well-documented" — human owns design and sign-off.
ICT third-party risk oversight20%30.60AUGAI pre-screens vendor documentation, automates contract clause extraction, monitors provider performance metrics, flags concentration risk thresholds. Human evaluates critical provider dependencies, assesses substitutability, negotiates exit strategies, makes concentration risk decisions. DORA Articles 28-30 mandate detailed oversight — significant AI acceleration but human leads assessment.
ICT incident reporting & classification15%30.45AUGAI triages ICT incident alerts, matches against known patterns, pre-populates incident notification templates for competent authorities. Human classifies major ICT-related incidents (Article 19), determines root cause in novel scenarios, makes regulatory notification decisions, manages cross-border reporting obligations.
Digital operational resilience testing oversight10%20.20AUGAI schedules testing cycles, tracks remediation actions, analyses test results against benchmarks. Human designs the testing programme, interprets TLPT results, determines remediation priorities, ensures testing covers critical functions. Articles 24-27 require human-led testing strategy.
Regulatory interpretation & gap analysis15%20.30AUGAI maps DORA articles and RTS/ITS to existing controls, identifies gaps, tracks regulatory updates from ESAs. Human interprets novel regulatory guidance (delegated acts still being published through 2026), resolves ambiguities, determines proportionate implementation for the entity's size and risk profile.
Stakeholder communication & management body reporting10%10.10NOTPresenting ICT risk posture to management body, advising on ICT risk appetite, communicating with competent authorities. Article 5(2) requires management body to "define, approve, oversee and be responsible" for ICT risk management — the officer IS the communication channel.
Register of Information maintenance & evidence management10%40.40DISPMaintaining contractual register of ICT third-party arrangements (Article 28(3)), compiling evidence for supervisory review, updating risk registers, generating compliance dashboards. Structured, template-based, deterministic. GRC platforms (ServiceNow, Archer, MetricStream) automate end-to-end with human exception review.
Total100%2.45

Task Resistance Score: 6.00 - 2.45 = 3.55/5.0

Displacement/Augmentation split: 10% displacement, 80% augmentation, 10% not involved.

Reinstatement check (Acemoglu): Moderate. DORA's phased RTS/ITS rollout creates ongoing interpretation requirements through 2027+. AI-powered third-party services (LLM APIs, AI-as-a-Service) introduce novel ICT concentration risks requiring new assessment methodologies. TLPT scope expansion to cover AI-dependent critical functions creates new testing requirements. Net new work, but bounded by the regulation's finite scope.


Evidence Score

Market Signal Balance
+5/10
Negative
Positive
Job Posting Trends
+1
Company Actions
+2
Wage Trends
+1
AI Tool Maturity
0
Expert Consensus
+1
DimensionScore (-2 to 2)Evidence
Job Posting Trends1ECB actively recruiting ICT Risk Experts for DORA third-party oversight. Savvi Recruitment: DORA "opening up cybersecurity careers in finance." Title fragments across ICT Risk Manager, Operational Resilience Manager, DORA Compliance Officer. EU-centric demand limits total posting volume vs global cyber roles, but direction is clearly positive.
Company Actions2Deloitte Wave 3: 96% of financial entities estimated DORA compliance costs (EUR 2-5M each). 39% dedicate 5-7 FTEs to compliance. Only 50% expected full compliance by end-2025, 38% targeting 2026 — hiring still ramping. ESAs building oversight teams for critical third-party providers. EIOPA establishing EU-wide oversight framework. Strong institutional investment.
Wage Trends1Selby Jennings Europe 2026: Associate/AVP risk management EUR 65K-100K. Mid-level DORA specialists EUR 75K-120K. Glassdoor IT Risk Manager US: $117K. Premium over general risk roles but not dramatic growth above inflation. DORA-specific premium emerging but not yet quantified separately.
AI Tool Maturity0GRC platforms (ServiceNow, Archer, MetricStream) now offer DORA-specific modules for register maintenance, control monitoring, and evidence collection — displacing 10% of task time. AI-powered third-party risk tools (Panorays, Bitsight, TrustCloud) automate vendor screening. But framework design, incident classification, and regulatory interpretation remain human-led. Anthropic observed exposure: Compliance Officers 12.1%, Financial Risk Specialists 26.5% — both low. Mixed impact.
Expert Consensus1Fintechfutures: talent attraction ongoing priority for European banking. Copla: DORA compliance not just 2025 — ongoing obligation with continuous improvement. Panorays: 46% of institutions cite Register of Information as most challenging compliance area. Consensus: regulation-driven demand with structural protection, bounded by DORA's specific scope.
Total5

Barrier Assessment

Structural Barriers to AI
Moderate 5/10
Regulatory
2/2
Physical
0/2
Union Power
0/2
Liability
2/2
Cultural
1/2

Reframed question: What prevents AI execution even when programmatically possible?

BarrierScore (0-2)Rationale
Regulatory/Licensing2DORA Article 6(4) mandates financial entities "assign the responsibility for managing and overseeing ICT risk to a control function and ensure an appropriate level of independence." Legal requirement — the role exists because regulation demands it. CRISC/CISM certifications expected. Financial regulators (ECB, EBA, EIOPA) enforce compliance.
Physical Presence0Fully remote-capable.
Union/Collective Bargaining0Financial services professional role, no union representation typical.
Liability/Accountability2DORA Article 5(2): management body bears "overall responsibility" — but the ICT risk officer is the named control function owner. Major incident misclassification delaying regulatory notification creates direct supervisory exposure. Fines up to 1% daily turnover for critical providers, 2% global turnover for the entity. Personal accountability chain is structural.
Cultural/Ethical1Financial regulators and management bodies expect a human accountable for the ICT risk control function. Third-party providers expect human counterparts for contract negotiation and exit strategy discussions. Cultural resistance to AI owning regulatory reporting decisions.
Total5/10

AI Growth Correlation Check

Confirmed at 1 (Weak Positive). DORA creates a regulatory demand floor — every in-scope financial entity must have an ICT risk control function. AI adoption introduces new ICT third-party dependencies (LLM APIs, AI scoring services) that expand the Register of Information and create novel concentration risk questions. But the role's growth driver is regulation, not AI itself. Existence is not causally driven by AI adoption the way AI Security Engineer's is.


JobZone Composite Score (AIJRI)

Score Waterfall
55.2/100
Task Resistance
+35.5pts
Evidence
+10.0pts
Barriers
+7.5pts
Protective
+3.3pts
AI Growth
+2.5pts
Total
55.2
InputValue
Task Resistance Score3.55/5.0
Evidence Modifier1.0 + (5 x 0.04) = 1.20
Barrier Modifier1.0 + (5 x 0.02) = 1.10
Growth Modifier1.0 + (1 x 0.05) = 1.05

Raw: 3.55 x 1.20 x 1.10 x 1.05 = 4.9203

JobZone Score: (4.9203 - 0.54) / 7.93 x 100 = 55.2/100

Zone: GREEN (Green >=48, Yellow 25-47, Red <25)

Sub-Label Determination

MetricValue
% of task time scoring 3+45%
AI Growth Correlation1
Sub-labelGreen (Transforming) — >=20% task time scores 3+

Assessor override: None — formula score accepted. Score sits 2.3 points above Cybersecurity Risk Manager (52.9), reflecting stronger regulatory barriers and company action evidence. Sits 7.6 points below AI Risk Manager (62.8) due to lower growth correlation and narrower scope. Without barriers, score drops to 49.6 — still Green but borderline.


Assessor Commentary

Score vs Reality Check

The 55.2 places this role solidly Green, 7.2 points above threshold. The premium over Cybersecurity Risk Manager (52.9) is driven by stronger barriers and evidence — DORA Article 6(4) mandates the control function in a way general cybersecurity risk management is not mandated. Task resistance is slightly lower (3.55 vs 3.60) because DORA's structured requirements make more task time amenable to platform automation. The score is modestly barrier-dependent — removing barriers drops it to 49.6, still Green but borderline. The 46% of institutions citing Register of Information as most challenging (Deloitte Wave 3) confirms institutional demand is real and ongoing.

What the Numbers Don't Capture

  • Regulatory ceiling as well as floor. DORA creates the role but constrains its scope. Unlike the Cybersecurity Risk Manager who can expand into AI risk, cloud security, or OT security, this role's mandate is regulation-bounded. When initial compliance matures (2027-2028), build workload drops to maintenance — though RTS/ITS updates and supervisory inspections sustain demand.
  • Entity-size determines role independence. At tier-1 banks, this is a dedicated team. At smaller payment providers or crypto-asset service providers, DORA ICT risk is absorbed into CISO or CRO functions. The standalone role is strongest at large, complex financial entities.
  • Concentration in EU/EEA. Geographically constrained to EU/EEA-regulated entities and their critical ICT third-party providers. UK follows separate PRA/FCA operational resilience framework. US institutions not in scope. Limits total addressable market.
  • Platform automation advancing. ServiceNow, Archer, and MetricStream now offer DORA-specific modules. The 10% displacement today could reach 20-25% by 2028 as platforms mature.

Who Should Worry (and Who Shouldn't)

If you own the DORA ICT risk framework design, present to management body, classify major incidents, and make third-party concentration risk decisions — you hold the strongest version of this role. Article 6(4) mandates your function. Regulators will inspect your framework. The management body is personally accountable under Article 5(2), which means they need you.

If your primary value is maintaining the Register of Information, populating incident templates, and tracking remediation actions — those tasks are what GRC platforms automate fastest. The officer whose day looks like a DORA compliance administrator faces greater compression than the score suggests.

The single biggest separator: whether you interpret DORA for novel situations or execute established DORA processes. The officer who tells the management body "this new AI-powered payment processor creates concentration risk our framework doesn't address" is protected. The officer who populates registers is being replaced by ServiceNow.


What This Means

The role in 2028: The surviving DORA ICT Risk Officer is a regulatory risk advisor — interpreting evolving delegated acts for the entity's specific ICT landscape, assessing novel third-party concentration risks (especially AI-powered services), classifying complex incidents that don't fit standard templates, and advising management body on proportionate resilience measures. GRC platforms handle register maintenance, evidence compilation, and routine monitoring.

Survival strategy:

  1. Own the management body relationship. DORA Article 5 creates personal accountability for management bodies. Be the person they rely on for ICT risk posture, not the person who feeds dashboards.
  2. Master third-party concentration risk. DORA's most complex requirement — assessing whether ICT dependencies create systemic risk — requires judgment platforms cannot provide. Especially as AI-as-a-Service creates new concentration patterns.
  3. Build cross-regulation expertise. DORA intersects with NIS2, EU AI Act, GDPR, and PSD2. The officer who navigates overlapping requirements provides value beyond DORA-specific compliance.

Timeline: 5-7+ years. The regulatory mandate provides a durable floor. The compressed timeline (2-3 years) applies to junior DORA compliance administrators without framework design authority or management body access.


Other Protected Roles

AI Governance Lead (Mid-Level)

GREEN (Accelerated) 72.3/100

Every AI deployment creates governance scope. EU AI Act mandates governance for high-risk systems. Demand compounds with AI adoption. Safe for 5+ years.

Also known as ai governance ai implementation consultant

Chief Privacy Officer (Executive/C-Suite)

GREEN (Transforming) 70.6/100

The CPO role is protected by irreducible accountability, board-level trust, and regulatory mandates that require a named human responsible for data protection. AI governance is expanding the mandate. The role is safe — but the version without AI governance expertise is not. 5-10+ year horizon.

Also known as cpo

AI Risk Manager (Mid-Level)

GREEN (Accelerated) 62.8/100

AI deployments compound risk governance scope. EU AI Act mandates risk management systems for high-risk AI. NIST AI RMF adoption accelerating. The risk judgment, incident classification, and cross-functional advisory layer resists automation. Safe for 5+ years.

Third Party Risk Lead (Cyber) (Mid-to-Senior)

GREEN (Transforming) 59.3/100

Seniority shifts this role from operational questionnaire coordination (Yellow at mid-level) to strategic TPRM programme ownership with risk acceptance authority, board reporting, and regulatory interpretation. DORA, NIS2, and expanding AI vendor ecosystems sustain demand. Protected for 5+ years at the programme leadership level, but daily work is transforming as TPRM platforms absorb assessment execution.

Sources

Useful Resources

Get updates on DORA ICT Risk Officer (Mid-Level)

This assessment is live-tracked. We'll notify you when the score changes or new AI developments affect this role.

No spam. Unsubscribe anytime.

Personal AI Risk Assessment Report

What's your AI risk score?

This is the general score for DORA ICT Risk Officer (Mid-Level). Get a personal score based on your specific experience, skills, and career path.

No spam. We'll only email you if we build it.