The table below looks at the statistics for Vulnerability Assessment skills in IT jobs advertised for the Reading region. Included is a guide to the salaries offered in IT jobs that have cited Vulnerability Assessment over the 3 months to 8 December 2016 with a comparison to the same period over the previous 2 years.

3 months to
8 Dec 2016
Same period 2015 Same period 2014
Vulnerability Assessment
Rank - 152 156
Permanent jobs citing Vulnerability Assessment 0 3 1
As % of all permanent IT jobs located in Reading - 0.12% 0.038%
As % of the Processes & Methodologies category - 0.14% 0.045%
Number of salaries quoted 0 2 0
Median salary - £57,500 -
UK excluding London median salary £55,000 £55,000 £46,387
% change year-on-year
- +18.56%
Vulnerability Assessment
Berkshire

The following table is for comparison with the above and provides statistics for the entire Processes & Methodologies category in permanent jobs advertised in the Reading region.

Processes & Methodologies Category
Reading
Permanent IT job ads with a match in the
Processes & Methodologies category
1385 2081 2223
As % of all permanent IT jobs located in Reading 85.23% 84.66% 84.62%
Number of salaries quoted 984 1676 1360
Median salary £50,000 £50,500 £50,000
Median salary % change year-on-year
-0.99% +1.00%
90% offered a salary of more than £32,500 £35,000 £33,500
10% offered a salary of more than £70,000 £75,000 £67,500
UK excluding London median salary £45,000 £45,000 £42,500
% change year-on-year
- +5.88%

Vulnerability Assessment
Jobs Demand Trend in Reading

The demand trend of job ads across the Reading region citing Vulnerability Assessment as a proportion of all IT jobs with a match in the Processes & Methodologies category.

Vulnerability Assessment Jobs Demand Trend in Reading

Vulnerability Assessment
Salary Trend in Reading

This chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Vulnerability Assessment across the Reading region.

Vulnerability Assessment Salary Trend in Reading

Vulnerability Assessment
Top 30 Related IT Skills in Reading

For the 6 months to 8 December 2016, IT jobs citing Vulnerability Assessment also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all job ads across the Reading region with a requirement for Vulnerability Assessment.

1 4 (80.00%) Information Security
2 3 (60.00%) CISSP
2 3 (60.00%) SIEM
2 3 (60.00%) Splunk
3 2 (40.00%) Amazon AWS
3 2 (40.00%) Open Source
3 2 (40.00%) Linux
3 2 (40.00%) CISM
3 2 (40.00%) Nessus
3 2 (40.00%) Drupal
3 2 (40.00%) Qualys
3 2 (40.00%) OWASP
4 1 (20.00%) Coverity
4 1 (20.00%) DV Cleared
4 1 (20.00%) Security Cleared
4 1 (20.00%) CEH
4 1 (20.00%) Nmap
4 1 (20.00%) Intrusion Detection
4 1 (20.00%) Penetration Testing
4 1 (20.00%) PKI
4 1 (20.00%) ISO/IEC 27001
4 1 (20.00%) Firewall
4 1 (20.00%) Management Information System
4 1 (20.00%) Telecoms
4 1 (20.00%) GIAC
4 1 (20.00%) GSEC
4 1 (20.00%) Python
4 1 (20.00%) TCP/IP
4 1 (20.00%) C
4 1 (20.00%) C++

Vulnerability Assessment
Top Related IT Skills in Reading by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Application Platforms
1 2 (40.00%) Drupal
Cloud Services
1 2 (40.00%) Amazon AWS
Communications & Networking
1 1 (20.00%) Firewall
1 1 (20.00%) Intrusion Detection
1 1 (20.00%) TCP/IP
General
1 1 (20.00%) Telecoms
Job Titles
1 2 (40.00%) Analyst
1 2 (40.00%) AWS Consultant
1 2 (40.00%) CISSP Consultant
1 2 (40.00%) Consultant
1 2 (40.00%) Information Security Consultant
1 2 (40.00%) Security Analyst
1 2 (40.00%) Security Consultant
2 1 (20.00%) Architect
2 1 (20.00%) CISSP Architect
2 1 (20.00%) Information Architect
2 1 (20.00%) Information Security Architect
2 1 (20.00%) Operations Analyst
2 1 (20.00%) Security Architect
2 1 (20.00%) Security Operations Analyst
2 1 (20.00%) SOC Analyst
Miscellaneous
1 1 (20.00%) Data Centre
1 1 (20.00%) Embedded Systems
1 1 (20.00%) Management Information System
1 1 (20.00%) PKI
1 1 (20.00%) Security Operations Centre
Operating Systems
1 2 (40.00%) Linux
2 1 (20.00%) Windows
Processes & Methodologies
1 4 (80.00%) Information Security
2 3 (60.00%) SIEM
3 2 (40.00%) Open Source
3 2 (40.00%) OWASP
4 1 (20.00%) Cybersecurity
4 1 (20.00%) Dashboard Development
4 1 (20.00%) Penetration Testing
4 1 (20.00%) Security Operations
4 1 (20.00%) Threat Analysis
Programming Languages
1 1 (20.00%) Bash Shell
1 1 (20.00%) C
1 1 (20.00%) C++
1 1 (20.00%) Java
1 1 (20.00%) Perl
1 1 (20.00%) Python
1 1 (20.00%) SQL
Qualifications
1 3 (60.00%) CISSP
2 2 (40.00%) CISM
3 1 (20.00%) CEH
3 1 (20.00%) DV Cleared
3 1 (20.00%) GIAC
3 1 (20.00%) GSEC
3 1 (20.00%) OSCP
3 1 (20.00%) Security Cleared
Quality Assurance & Compliance
1 1 (20.00%) ISO/IEC 27001
Systems Management
1 2 (40.00%) Nessus
2 1 (20.00%) Nmap
2 1 (20.00%) OpenVAS
Vendors
1 3 (60.00%) Splunk
2 2 (40.00%) Qualys
3 1 (20.00%) ArcSight
3 1 (20.00%) Coverity