The table below looks at the statistics for Vulnerability Assessment skills in IT contracts advertised for the Reading region. Included is a guide to the contractor rates offered in IT contracts that have cited Vulnerability Assessment over the 3 months to 30 June 2016 with a comparison to the same period over the previous 2 years.

Note that daily contractor rates and hourly contractor rates are treated separately. When calculating average contractor rates, daily rates are not derived from quoted hourly rates or vice versa.

3 months to
30 Jun 2016
Same period 2015 Same period 2014
Vulnerability Assessment
Rank 68 63 72
Rank change year-on-year
-5 +9
Contract jobs citing Vulnerability Assessment 3 2 1
As % of all contract IT jobs located in Reading 0.34% 0.24% 0.11%
As % of the Processes & Methodologies category 0.44% 0.31% 0.14%
Number of daily rates quoted 2 0 1
Median daily rate £380 - £450
UK excluding London median daily rate £450 £350 £445
% change year-on-year
+28.57% -21.34%
Number of hourly rates quoted 0 0 0
Median hourly rate - - -
UK excluding London median hourly rate - - £28.99
Vulnerability Assessment
Berkshire

The following table is for comparison with the above and provides statistics for the entire Processes & Methodologies category in contract jobs advertised in the Reading region.

Processes & Methodologies Category
Reading
Contract IT job ads with a match in the
Processes & Methodologies category
688 646 708
As % of all contract IT jobs located in Reading 78.99% 76.00% 74.92%
Number of daily rates quoted 413 327 327
Median daily rate £400 £400 £400
90% offered a daily rate of more than £249 £260 £273
10% offered a daily rate of more than £500 £500 £525
UK excluding London median daily rate £400 £383 £375
% change year-on-year
+4.57% +2.00%
Number of hourly rates quoted 21 27 13
Median hourly rate £20.00 £21.55 £20.50
Median hourly rate % change year-on-year
-7.19% +5.12%
90% offered a hourly rate of more than £19.61 £14.00 £15.00
10% offered a hourly rate of more than £41.12 £46.00 £22.50
UK excluding London median hourly rate £28.50 £30.00 £30.00
% change year-on-year
-5.00% -

Vulnerability Assessment
Jobs Demand Trend in Reading

The demand trend of contract jobs across the Reading region citing Vulnerability Assessment as a proportion of all IT contracts with a match in the Processes & Methodologies category.

Vulnerability Assessment Jobs Demand Trend in Reading

Vulnerability Assessment
Daily Rate Trend in Reading

This chart provides the 3-month moving average for daily rates quoted in IT contract jobs citing Vulnerability Assessment across the Reading region.

Vulnerability Assessment Daily Rate Trend in Reading

Vulnerability Assessment
Top 30 Related IT Skills in Reading

For the 6 months to 30 June 2016, IT contractor jobs citing Vulnerability Assessment also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all contract ads across the Reading region with a requirement for Vulnerability Assessment.

1 5 (100.00%) Cybersecurity
2 4 (80.00%) Security Operations
3 3 (60.00%) CISSP
4 2 (40.00%) TCP/IP
4 2 (40.00%) GCIA
4 2 (40.00%) GCIH
4 2 (40.00%) Sarbanes-Oxley
4 2 (40.00%) CEH
4 2 (40.00%) Intrusion Detection
4 2 (40.00%) Penetration Testing
4 2 (40.00%) Incident Management
4 2 (40.00%) Security Operations Centre
4 2 (40.00%) SIEM
4 2 (40.00%) Vulnerability Management
4 2 (40.00%) Qualys
4 2 (40.00%) PCI DSS
4 2 (40.00%) iPad
5 1 (20.00%) F5
5 1 (20.00%) REST
5 1 (20.00%) OWASP
5 1 (20.00%) Rapid7
5 1 (20.00%) Algorithms
5 1 (20.00%) SDLC
5 1 (20.00%) Vulnerability Scanning
5 1 (20.00%) Nexpose
5 1 (20.00%) Service Delivery
5 1 (20.00%) Firewall
5 1 (20.00%) Identity Management
5 1 (20.00%) Data Security
5 1 (20.00%) Information Security

Vulnerability Assessment
Top Related IT Skills in Reading by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Communications & Networking
1 2 (40.00%) Intrusion Detection
1 2 (40.00%) TCP/IP
2 1 (20.00%) Firewall
2 1 (20.00%) HTTP
2 1 (20.00%) SSH
2 1 (20.00%) SSL
2 1 (20.00%) VPN
Database & Business Intelligence
1 1 (20.00%) DB2
Job Titles
1 2 (40.00%) Consultant
1 2 (40.00%) Cybersecurity Consultant
1 2 (40.00%) Security Consultant
2 1 (20.00%) Analyst
2 1 (20.00%) Security Analyst
2 1 (20.00%) Security Engineer
Libraries, Frameworks & Software Standards
1 1 (20.00%) .NET
1 1 (20.00%) Apache Flex
1 1 (20.00%) Middleware
1 1 (20.00%) REST
1 1 (20.00%) SOAP
Miscellaneous
1 2 (40.00%) iPad
1 2 (40.00%) Security Operations Centre
2 1 (20.00%) Algorithms
2 1 (20.00%) PKI
Operating Systems
1 1 (20.00%) Unix
Processes & Methodologies
1 5 (100.00%) Cybersecurity
2 4 (80.00%) Security Operations
3 2 (40.00%) Incident Management
3 2 (40.00%) Penetration Testing
3 2 (40.00%) SIEM
3 2 (40.00%) Vulnerability Management
4 1 (20.00%) Data Security
4 1 (20.00%) Identity Management
4 1 (20.00%) Information Security
4 1 (20.00%) OWASP
4 1 (20.00%) SDLC
4 1 (20.00%) Service Delivery
4 1 (20.00%) Vulnerability Scanning
Programming Languages
1 1 (20.00%) C++
1 1 (20.00%) Java
Qualifications
1 3 (60.00%) CISSP
2 2 (40.00%) CEH
2 2 (40.00%) GCIA
2 2 (40.00%) GCIH
Quality Assurance & Compliance
1 2 (40.00%) PCI DSS
1 2 (40.00%) Sarbanes-Oxley
Systems Management
1 1 (20.00%) Nessus
1 1 (20.00%) Nexpose
1 1 (20.00%) Nmap
Vendors
1 2 (40.00%) Qualys
2 1 (20.00%) F5
2 1 (20.00%) Oracle
2 1 (20.00%) Rapid7