Will AI Replace DORA Third-Party Risk Analyst Jobs?

Mid-Level (3-5 years experience) Security Governance Security Compliance Live Tracked This assessment is actively monitored and updated as AI capabilities change.
YELLOW (Urgent)
0.0
/100
Score at a Glance
Overall
0.0 /100
TRANSFORMING
Task ResistanceHow resistant daily tasks are to AI automation. 5.0 = fully human, 1.0 = fully automatable.
0/5
EvidenceReal-world market signals: job postings, wages, company actions, expert consensus. Range -10 to +10.
+0/10
Barriers to AIStructural barriers preventing AI replacement: licensing, physical presence, unions, liability, culture.
0/10
Protective PrinciplesHuman-only factors: physical presence, deep interpersonal connection, moral judgment.
0/9
AI GrowthDoes AI adoption create more demand for this role? 2 = strong boost, 0 = neutral, negative = shrinking.
+0/2
Score Composition 38.8/100
Task Resistance (50%) Evidence (20%) Barriers (15%) Protective (10%) AI Growth (5%)
Where This Role Sits
0 — At Risk 100 — Protected
DORA Third-Party Risk Analyst (Mid-Level): 38.8

This role is being transformed by AI. The assessment below shows what's at risk — and what to do about it.

DORA mandates third-party ICT provider oversight, but 45% of this analyst's task time — register maintenance, vendor questionnaire processing, and continuous monitoring — is already being displaced by AI-native TPRM platforms. The regulatory mandate protects the function, not the headcount. 3-5 year adaptation window.

Role Definition

FieldValue
Job TitleDORA Third-Party Risk Analyst (ICT TPRM Analyst)
Seniority LevelMid-Level (3-5 years experience)
Primary FunctionAssesses and monitors risks from ICT third-party service providers under DORA Chapter V. Conducts vendor due diligence, maintains the Register of Information (Article 28(3)), analyses concentration risk across critical ICT providers, manages vendor questionnaire workflows, tracks exit strategy readiness, and supports regulatory reporting to competent authorities. Operates within the TPRM function, typically reporting to a Third-Party Risk Lead or DORA ICT Risk Officer.
What This Role Is NOTNOT a DORA ICT Risk Officer (owns the full ICT risk framework, management body reporting, incident classification — scored 55.2 GREEN). NOT a Third Party Risk Lead (Cyber) at senior level (strategic programme ownership, vendor negotiation authority — scored 59.3 GREEN). NOT a GRC Analyst (general governance/risk/compliance across all domains — scored 28.0 YELLOW). NOT a Supply Chain Security Analyst (software supply chain, SBOM analysis — scored 34.9 YELLOW). This role executes third-party risk assessments within an established DORA framework rather than designing the framework itself.
Typical Experience3-5 years in third-party risk management, IT risk, or financial services compliance. Certifications: CTPRP (Shared Assessments), CRISC, CISM, PECB DORA Foundation. Reports to Head of TPRM, DORA ICT Risk Officer, or CISO.

Seniority note: A junior TPRM coordinator focused on questionnaire chasing and register data entry would score deeper Yellow or low Red. A senior Third-Party Risk Lead with strategic vendor negotiation, concentration risk decisions, and management body reporting scores Green (59.3).


Protective Principles + AI Growth Correlation

Human-Only Factors
Embodied Physicality
No physical presence needed
Deep Interpersonal Connection
Some human interaction
Moral Judgment
Some ethical decisions
AI Effect on Demand
AI slightly boosts jobs
Protective Total: 2/9
PrincipleScore (0-3)Rationale
Embodied Physicality0Fully digital. GRC platforms, vendor portals, regulatory templates, stakeholder calls.
Deep Interpersonal Connection1Coordinates with ICT providers during assessments and internally with legal, procurement, and IT. Transactional relationships rather than deep trust-based advisory.
Goal-Setting & Moral Judgment1Interprets DORA requirements for specific vendor scenarios and flags concentration risk, but works within a framework designed by the DORA ICT Risk Officer or Risk Lead. Limited strategic authority.
Protective Total2/9
AI Growth Correlation1DORA creates a regulatory demand floor — every in-scope financial entity must maintain ICT third-party oversight. AI adoption introduces new ICT provider categories (LLM APIs, AI-as-a-Service) requiring assessment. Weak positive — regulation drives demand, not AI growth itself.

Quick screen result: Protective 2 + Correlation 1 = Likely Yellow Zone.


Task Decomposition (Agentic AI Scoring)

Work Impact Breakdown
45%
50%
Displaced Augmented Not Involved
Vendor risk assessment & due diligence
25%
3/5 Augmented
Register of Information maintenance
20%
4/5 Displaced
Concentration risk analysis & monitoring
15%
2/5 Augmented
Vendor questionnaire management
15%
4/5 Displaced
Continuous monitoring & compliance tracking
10%
4/5 Displaced
Stakeholder communication & reporting
10%
2/5 Augmented
Exit strategy & contract clause analysis
5%
3/5 Augmented
TaskTime %Score (1-5)WeightedAug/DispRationale
Vendor risk assessment & due diligence25%30.75AUGAI pre-screens vendor documentation, extracts contract clauses (audit rights, exit provisions, data residency), cross-references against DORA RTS requirements. Human evaluates nuanced provider capabilities, assesses whether SOC 2/ISO 27001 evidence truly covers DORA-specific requirements, determines risk ratings for complex multi-service arrangements.
Concentration risk analysis & monitoring15%20.30AUGAI maps provider dependency chains and flags concentration thresholds. Human interprets whether concentration creates systemic risk for the specific entity, considers substitutability of critical providers, evaluates fourth/Nth-party dependencies. Genuine judgment required — no two entities have the same ICT dependency landscape.
Register of Information maintenance20%40.80DISPMaintaining the DORA Article 28(3) register of ICT third-party arrangements. Structured data fields, template-driven, deterministic updates. GRC platforms (ServiceNow, Archer, MetricStream) with DORA modules handle end-to-end with human exception review only. OneTrust and Panorays automate RoI population from contract metadata.
Vendor questionnaire management15%40.60DISPDesigning, distributing, collecting, and scoring vendor questionnaires. Panorays, TrustCloud, and Prevalent automate questionnaire generation, response analysis, and risk scoring. AI NLP extracts answers from uploaded vendor documentation without manual review. Human handles exceptions and escalations only.
Continuous monitoring & compliance tracking10%40.40DISPSecurityScorecard, BitSight, and UpGuard provide continuous external risk scoring. Automated alerts for rating changes, breach notifications, and compliance drift. Human reviews flagged exceptions but does not perform ongoing monitoring.
Stakeholder communication & reporting10%20.20AUGPresenting assessment findings to internal stakeholders, coordinating remediation with providers, contributing to regulatory submissions. Requires organisational context and relationship navigation. AI drafts reports but human delivers and negotiates.
Exit strategy & contract clause analysis5%30.15AUGAI extracts and flags exit clause adequacy, maps contractual provisions against DORA Article 28 requirements. Human evaluates whether exit strategies are operationally viable given the entity's ICT architecture and provider alternatives.
Total100%3.20

Task Resistance Score: 6.00 - 3.20 = 2.80/5.0

Displacement/Augmentation split: 45% displacement, 50% augmentation, 0% not involved.

Reinstatement check (Acemoglu): Moderate. AI-powered ICT providers (LLM APIs, AI-as-a-Service platforms) create a new category of third-party arrangements requiring assessment methodologies that do not yet exist in standard DORA templates. The analyst who can assess AI provider concentration risk and model dependency performs work that did not exist two years ago. However, this new work is bounded — it supplements rather than replaces the automating baseline.


Evidence Score

Market Signal Balance
+4/10
Negative
Positive
Job Posting Trends
+1
Company Actions
+1
Wage Trends
+1
AI Tool Maturity
0
Expert Consensus
+1
DimensionScore (-2 to 2)Evidence
Job Posting Trends1Rothschild & Co actively recruiting "TPRM Analyst — DORA (F/H)." ECB hiring ICT Risk Experts for third-party oversight. Indeed shows 185 Third Party Vendor Risk Analyst openings in New York State. Demand growing but concentrated in EU/EEA financial services — limited total addressable market. Direction clearly positive.
Company Actions1Deloitte Wave 3: 39% of financial entities dedicate 5-7 FTEs to DORA compliance; 50% still not fully compliant by end-2025. EBA July 2025 consultation on non-ICT third-party risk creates 2-year transitional period through 2027. Organisations investing in TPRM functions, but total headcount per entity is small (2-4 analysts typical for mid-tier firms).
Wage Trends1Ireland: EUR 40K-60K mid-level IT Risk Analyst (Savvi Recruitment). Selby Jennings Europe: EUR 65K-100K Associate/AVP risk management. Glassdoor US: $117K IT Risk Manager. DORA-specific premium emerging but not yet separated from general risk management wages. Tracking above inflation.
AI Tool Maturity0SecurityScorecard, BitSight, Panorays, TrustCloud displace monitoring and questionnaire tasks (45% of role). GRC platforms with DORA-specific modules automate RoI maintenance. But vendor risk assessment judgment, concentration risk interpretation, and exit strategy evaluation remain human-led. Anthropic observed exposure: Compliance Officers 12.1%, Financial Risk Specialists 26.5% — both moderate-low. Mixed: significant displacement of execution tasks, augmentation of analytical tasks.
Expert Consensus1Copla: "DORA compliance not just 2025 — ongoing obligation with continuous improvement." Panorays: 46% of institutions cite RoI as most challenging area. ISC2 2025: 87% expect AI to enhance roles, 2% expect replacement. Consensus: regulation-driven demand persists, but the analyst role compresses toward judgment and away from execution as platforms mature.
Total4

Barrier Assessment

Structural Barriers to AI
Moderate 3/10
Regulatory
1/2
Physical
0/2
Union Power
0/2
Liability
1/2
Cultural
1/2

Reframed question: What prevents AI execution even when programmatically possible?

BarrierScore (0-2)Rationale
Regulatory/Licensing1DORA mandates the ICT risk management function (Article 6(4)) but does not require a named analyst role — it requires a control function. The analyst operates within this mandated function but is not the named accountable person (that is the DORA ICT Risk Officer or CISO). CTPRP/CRISC certifications expected but not legally mandated. Moderate regulatory protection via the function, not the individual.
Physical Presence0Fully remote-capable.
Union/Collective Bargaining0Financial services professional role. No union representation typical in TPRM functions.
Liability/Accountability1Vendor risk assessment errors can result in regulatory findings if a critical provider fails and the assessment was inadequate. But personal liability sits with the named control function owner (DORA ICT Risk Officer) and management body (Article 5(2)), not the mid-level analyst. Shared accountability, not direct.
Cultural/Ethical1Financial regulators expect human assessors behind third-party risk decisions. Third-party providers expect human counterparts for assessment queries and remediation discussions. However, this cultural expectation is weakening as automated risk scoring platforms (SecurityScorecard, BitSight) gain regulatory acceptance for initial screening.
Total3/10

AI Growth Correlation Check

Confirmed at 1 (Weak Positive). DORA's mandatory ICT third-party oversight creates a regulatory demand floor for the function. AI adoption introduces new provider categories requiring assessment (LLM APIs, AI scoring services, AI-as-a-Service providers) — expanding the Register of Information and creating novel concentration risk questions. But the analyst role's existence is driven by regulation, not AI growth. The function grows with DORA enforcement, not with AI adoption rates.


JobZone Composite Score (AIJRI)

Score Waterfall
38.8/100
Task Resistance
+28.0pts
Evidence
+8.0pts
Barriers
+4.5pts
Protective
+2.2pts
AI Growth
+2.5pts
Total
38.8
InputValue
Task Resistance Score2.80/5.0
Evidence Modifier1.0 + (4 x 0.04) = 1.16
Barrier Modifier1.0 + (3 x 0.02) = 1.06
Growth Modifier1.0 + (1 x 0.05) = 1.05

Raw: 2.80 x 1.16 x 1.06 x 1.05 = 3.6150

JobZone Score: (3.6150 - 0.54) / 7.93 x 100 = 38.8/100

Zone: YELLOW (Green >=48, Yellow 25-47, Red <25)

Sub-Label Determination

MetricValue
% of task time scoring 3+75%
AI Growth Correlation1
Sub-labelYellow (Urgent) — AIJRI 25-47 AND >=40% scoring 3+

Assessor override: None — formula score accepted. Score sits 0.5 points above Third Party Risk Lead (Cyber) Mid-Level (38.3), reflecting very similar risk profiles. The DORA-specific regulatory context provides marginally more barrier protection than generic cyber TPRM, but the analyst's execution-heavy task mix (45% displacement) keeps it firmly Yellow. Score is 16.4 points below DORA ICT Risk Officer (55.2), which has framework ownership, management body reporting, and incident classification authority that this analyst role lacks.


Assessor Commentary

Score vs Reality Check

The 38.8 places this role 13.8 points above the Yellow/Red boundary — not borderline, but firmly in the "adapt or be absorbed" territory. The score sits remarkably close to Third Party Risk Lead (Cyber) Mid-Level (38.3) because the core problem is identical: vendor risk assessment execution is being automated by the platforms that were originally built to support it. DORA's regulatory mandate protects the function but does not protect the analyst headcount — one DORA ICT Risk Officer with AI-native TPRM platforms can cover what previously required 2-3 analysts.

What the Numbers Don't Capture

  • Function-spending vs people-spending. Financial entities are investing heavily in DORA compliance (Deloitte: EUR 2-5M per entity), but the spend is going to GRC platforms and TPRM tools (Panorays, OneTrust, ServiceNow DORA modules), not to additional analyst headcount. Budget growth does not equal hiring growth.
  • Geographic concentration. DORA applies only to EU/EEA-regulated financial entities and their critical ICT third-party providers. UK has separate PRA/FCA operational resilience rules. US institutions are not in scope. The total addressable market is narrower than the cybersecurity domain's general demand signals suggest.
  • Role absorption risk. At smaller payment providers, investment firms, and crypto-asset service providers, this analyst function is absorbed into the DORA ICT Risk Officer or CISO role rather than existing as a standalone position. The standalone analyst is most viable at tier-1 banks and large insurers.
  • Platform maturity trajectory. Panorays, TrustCloud, and OneTrust TPRM are adding AI-native features quarterly — contract clause extraction, automated risk scoring, continuous monitoring, and questionnaire automation. The 45% displacement today could reach 60% by 2028.

Who Should Worry (and Who Shouldn't)

If your primary work is maintaining the Register of Information, chasing vendor questionnaire responses, and updating risk registers — these are exactly the tasks that GRC platforms automate fastest. Your 2028 role looks like a platform configuration specialist, not a risk analyst.

If you evaluate complex concentration risk scenarios, assess whether new AI-powered providers create systemic dependencies, and advise on exit strategy viability — you hold the judgment-intensive version that platforms cannot replicate. The analyst who tells the DORA ICT Risk Officer "this AI provider serves 40% of our critical functions and has no viable substitute" is performing irreplaceable work.

The single biggest separator: whether you assess risk or process risk data. The analyst who can determine whether a SOC 2 Type II report actually covers DORA-specific resilience requirements is safer than the analyst who collects SOC 2 reports and checks boxes.


What This Means

The role in 2028: The surviving DORA Third-Party Risk Analyst is a specialist risk assessor — evaluating complex ICT provider arrangements that AI platforms flag but cannot resolve. AI-powered providers, multi-layered sub-contracting chains, and cross-border concentration risk scenarios require human judgment. Register maintenance, questionnaire workflows, and continuous monitoring are fully platform-managed.

Survival strategy:

  1. Master concentration risk analysis. This is DORA's most complex requirement — assessing whether ICT dependencies create systemic risk across the entity and the broader financial system. Platforms can flag thresholds; humans must interpret what they mean.
  2. Specialise in AI provider risk assessment. As financial entities adopt AI-as-a-Service, LLM APIs, and AI-powered third-party tools, someone must assess whether these providers meet DORA's digital operational resilience requirements. This sub-specialism does not yet exist in standard frameworks.
  3. Build toward DORA ICT Risk Officer. The mid-level analyst role compresses; the strategic framework owner role (55.2 GREEN) does not. Develop management body reporting skills, incident classification judgment, and cross-regulation expertise (NIS2, EU AI Act, GDPR).

Where to look next. If you're considering a career shift, these Green Zone roles share transferable skills with DORA Third-Party Risk Analyst:

  • DORA ICT Risk Officer (AIJRI 55.2) — direct progression; your DORA knowledge and vendor risk expertise transfer directly into framework ownership and management body advisory.
  • Cybersecurity Risk Manager (AIJRI 52.9) — broader risk management scope beyond DORA; your risk assessment methodology and regulatory interpretation skills apply directly.
  • Data Protection Officer (AIJRI 50.7) — privacy regulation expertise transfers; DORA's data residency and third-party data processing requirements overlap significantly with GDPR DPO responsibilities.

Browse all scored roles at jobzonerisk.com to find the right fit for your skills and interests.

Timeline: 3-5 years. Platform automation of execution tasks accelerates annually. The regulatory demand floor sustains the function but not the current analyst headcount.


Transition Path: DORA Third-Party Risk Analyst (Mid-Level)

We identified 4 green-zone roles you could transition into. Click any card to see the breakdown.

Your Role

DORA Third-Party Risk Analyst (Mid-Level)

YELLOW (Urgent)
38.8/100
+16.4
points gained
Target Role

DORA ICT Risk Officer (Mid-Level)

GREEN (Transforming)
55.2/100

DORA Third-Party Risk Analyst (Mid-Level)

45%
50%
Displacement Augmentation

DORA ICT Risk Officer (Mid-Level)

10%
80%
10%
Displacement Augmentation Not Involved

Tasks You Lose

3 tasks facing AI displacement

20%Register of Information maintenance
15%Vendor questionnaire management
10%Continuous monitoring & compliance tracking

Tasks You Gain

5 tasks AI-augmented

20%ICT risk management framework governance
20%ICT third-party risk oversight
15%ICT incident reporting & classification
10%Digital operational resilience testing oversight
15%Regulatory interpretation & gap analysis

AI-Proof Tasks

1 task not impacted by AI

10%Stakeholder communication & management body reporting

Transition Summary

Moving from DORA Third-Party Risk Analyst (Mid-Level) to DORA ICT Risk Officer (Mid-Level) shifts your task profile from 45% displaced down to 10% displaced. You gain 80% augmented tasks where AI helps rather than replaces, plus 10% of work that AI cannot touch at all. JobZone score goes from 38.8 to 55.2.

Want to compare with a role not listed here?

Full Comparison Tool

Green Zone Roles You Could Move Into

DORA ICT Risk Officer (Mid-Level)

GREEN (Transforming) 55.2/100

DORA mandates an independent ICT risk control function at every in-scope financial entity — regulation creates and protects this role. Third-party risk oversight, incident classification, and management body advisory resist automation, but 45% of task time is shifting to AI-augmented workflows as monitoring, evidence collection, and register maintenance become agent-executable. 5-7+ year horizon.

Cybersecurity Risk Manager (Mid-Senior)

GREEN (Transforming) 52.9/100

Core risk judgment, risk acceptance decisions, and stakeholder communication resist automation — but 45% of task time is shifting to AI-augmented workflows as risk scoring, monitoring, and evidence gathering become agent-executable. The risk manager's function evolves from risk analyst to strategic risk advisor. 5-7+ year horizon.

Data Protection Officer (Mid-Senior)

GREEN (Transforming) 50.7/100

The DPO role is protected by GDPR's legal mandate requiring a named human officer — AI cannot fulfill this statutory function. Strong demand and growing regulatory scope keep the role safe, but 70% of daily task time is being restructured by automation platforms. The role survives; the operational version of it doesn't. 5+ year horizon.

Also known as dpo

AI Governance Lead (Mid-Level)

GREEN (Accelerated) 72.3/100

Every AI deployment creates governance scope. EU AI Act mandates governance for high-risk systems. Demand compounds with AI adoption. Safe for 5+ years.

Also known as ai governance ai implementation consultant

Sources

Useful Resources

Get updates on DORA Third-Party Risk Analyst (Mid-Level)

This assessment is live-tracked. We'll notify you when the score changes or new AI developments affect this role.

No spam. Unsubscribe anytime.

Personal AI Risk Assessment Report

What's your AI risk score?

This is the general score for DORA Third-Party Risk Analyst (Mid-Level). Get a personal score based on your specific experience, skills, and career path.

No spam. We'll only email you if we build it.