You are the one who remembers. Filter calm keeps your nervous system quiet. Steady drive keeps you rooted. But your Vigilant threat detection is always running, pointed outward toward the people you have claimed as yours. Empath resonance means you feel their pain as your own. Deep plasticity means every threat you have ever identified is permanently filed. You do not just protect the group. You remember every danger that ever came near it.
Filter gating and Steady drive create a calm, unhurried base. You do not startle easily, and you are not restless. But Vigilant threat detection runs a continuous perimeter scan, and Empath processing converts every detected risk into a felt urgency. The engine fires when something threatens the people inside your perimeter, not for novelty or reward.
Deep plasticity holds every rule, precedent, and past danger in permanent storage. Empath processing tags each memory with the emotional weight of who was affected. Scanner attention keeps the full landscape in view, feeding new data into the record for comparison. New situations are matched against everything that has come before.
A living institutional memory with a protective mandate. You catch the threat others forgot was possible because your record never purges. The cost is that the record does not distinguish between current danger and historical pattern. Past threats carry the same weight as present ones.
These dimension spectrums are derived from real scientific research (view documentation).
This profile is a narrative layer on top of the science to make it easier to understand. It maps the baseline mode of this neurotype — before masking or compensating.
In your personalized report: exact dimension scores + 6 deep dives calibrated to your intensity.
Generational Stewardship. Your Vigilant threat detection guards the perimeter while your Empath processing tracks every member inside it. Deep plasticity means the lessons you learn about protecting your people never fade. You build institutions that outlast you.
The Closed Gate. Your Vigilant alarm system treats any risk to your people as a threat to contain. Deep plasticity means every past danger is permanently filed. The cost is that your protective perimeter can tighten until the people inside it have no room to take the risks they need to grow.
In your personalized report: your stress signature — which dimensions break first under pressure.
You process the world through a single continuous question: is the group safe? Your Scanner attention sweeps the environment, Vigilant processing scores each signal against your people, and Empath resonance tells you who inside the perimeter is vulnerable. Scan. Assess. Shield.
You hold your ground. Your Filter calm and Steady drive keep you planted, and your Vigilant alarm system ensures you do not move until every threat to the group has been accounted for. You advance only when the ground ahead is clear for everyone.
The Headcount. Knowing exactly where everyone is and that they are safe. Doors locked, check-ins received, the group accounted for. Your engine runs at its lowest metabolic cost when the perimeter is secure and your Empath processing confirms that everyone inside it is settled.
Casual Risk-Taking. When someone you care about treats their own safety as optional, your Vigilant system flags a threat you cannot close. Your Empath resonance absorbs their potential pain before it happens. The gap between their indifference and your alarm is metabolically expensive and has no resolution except their safe return.
The Nest. Curating your home environment into a controlled perimeter of comfort. Low sensory input, familiar objects, the people you protect within reach. The act of arranging the space resets your Vigilant system by confirming that everything within the boundary is accounted for.
In your personalized report: your energy budget — what charges and drains you across all 6 dimensions.
Your hardware is optimized for long-term protective stewardship of known groups. Every dimension is tuned for sustained vigilance over people rather than systems, with permanent encoding of every threat that has ever touched the perimeter. You run the deepest group-defense architecture in the model.
In small-group ancestral contexts, this is the clan protector: the one who holds the boundary, remembers every past danger, and builds the rules and spaces that keep the vulnerable shielded across seasons and generations. The group's explorers and seekers depend on this configuration maintaining the safe ground they return to. Without this wiring, the group has no institutional memory of what nearly destroyed it.
Stable, people-centered environments with long time horizons, clear protective mandates, and defined group boundaries. Small, consistent teams where relationships compound over years. Structured authority, low personnel turnover, and a culture that treats caution as a professional virtue rather than an obstacle to progress. Your hardware runs cheapest when the group stays the same, the rules are clear, and your vigilance is recognized as care rather than control.
High-turnover, risk-tolerant, individually-driven environments. Fast-growth startups that celebrate failure, competitive sales floors, organizations that rotate teams by quarter, and any context where attachment to specific people is treated as a liability rather than an asset. These environments demand emotional detachment, comfort with uncontrolled risk to others, and rapid release of protective bonds: the three highest-cost operations for your hardware. The cost is not poor output. It is a threat-detection system permanently scanning for people who are no longer yours to protect, burning resources on a perimeter that the environment keeps redrawing.
Social Work, HR Compliance, Estate Planning, Nursing Management, Community Safety Coordination, Institutional Governance. Any role where the mandate is to protect people across long timeframes.
Separation Anxiety / Codependency. Your Vigilant alarm system binds threat detection to the proximity of your people. Empath resonance makes their distress register as your own. Deep plasticity crystallizes every separation into a permanent record. When the people you protect move out of range, your threat system reads it as active danger.
In your personalized report: your environment guide — where you do your best work.
Reframe Recklessness as Growth Seeking. The Explorers and Seekers in your life are not careless. Their hardware generates motivation from risk in the same way yours generates alarm. Their near-misses are data collection, not self-destruction. Your role is the soft landing, not the locked door.
The Safety Brief. When a Seeker or Laser type brings you a new project, acknowledge the project before you flag the risk. Lead with the question: how can we make this safe for everyone? You become the co-engineer of the plan, not the obstacle in front of it.
You are the Cultural Bedrock. The people who take risks do it because something you built is underneath them. That is the work, even when they never look down to see what is holding them up.
Your filters keep the volume low and your attention casts wide. You move through chaos untouched, but the cost is that important signals get the same weight as noise.
Low input and low drive mean your system runs on minimal resources. Almost nothing disrupts the baseline. The cost is that the landscape can shift around you while you hold still.
Low sensory noise lets your threat detection run on clean, analytical data. You don't feel the danger physically; you model it. Cold, strategic, and rarely blindsided.
You read emotions clearly without absorbing the sensory weight. You can hold space indefinitely without burning out, which makes you the person everyone leans on and nobody checks in on.
Low input and permanent encoding mean what little gets through your filters stays forever. Your system is slow to update and hard to overwrite. Changes are rare but structural.
Wide attention and low drive let you drift between interests without urgency. Nothing demands to be finished, and that's not a failure state; it's your system at rest.
Wide attention locked onto threat detection means you're constantly scanning for what could go wrong. You catch danger early, but your system never fully stands down.
Wide attention and empathic processing mean you're reading the emotional state of everyone at once. You manage a room's energy instinctively, and the cost is the sheer volume of feeling you process.
Wide attention and permanent encoding mean you accumulate a vast, cross-referenced archive. Your knowledge is broad, interconnected, and it never drops out of storage.
Low drive and active threat detection create a system that insulates rather than engages. You don't seek the world and you don't trust it. Withdrawal is your system's rational output.
Low drive and deep empathy create a system tuned for quiet, sustained connection. You don't need to change the world. You invest deeply in the people closest to you, and that investment compounds.
Low drive and permanent encoding create a system that resists change at the hardware level. What you learned early is what you trust. Updates feel like threats to stable infrastructure.
Active threat detection and deep empathy create a system that constantly monitors for signs of rupture. You feel the connection and you fear losing it, so your system checks the bond on repeat.
Active threat detection and permanent encoding mean every fear gets archived at full resolution. Your threat library only grows. Old dangers stay as vivid as new ones.
Deep empathy and permanent encoding create intense, irreversible emotional bonds. When you connect, it writes to permanent storage. The depth of love is matched by the cost of loss.
In your personalized report: all 15 alloys ranked with extended analysis.
Take the assessment to discover what this page can't tell you — your stress triggers, energy budget, and growth edges calibrated to your specific wiring.
Already took the assessment? View your results →