The table below looks at the prevalence of the term Cryptography in IT jobs advertised for the Yorkshire region. Included is a guide to the salaries offered in IT jobs that have cited Cryptography over the 3 months to 4 December 2016 with a comparison to the same period over the previous 2 years.

3 months to
4 Dec 2016
Same period 2015 Same period 2014
Cryptography (Cryptology)
Rank 214 248 274
Rank change year-on-year
+34 +26
Permanent jobs citing Cryptography 11 1 9
As % of all permanent IT jobs located in Yorkshire 0.21% 0.016% 0.12%
As % of the Miscellaneous category 0.65% 0.046% 0.36%
Number of salaries quoted 5 1 5
Median salary £65,000 £57,500 £40,500
Median salary % change year-on-year
+13.04% +41.97%
UK excluding London median salary £55,000 £50,000 £51,000
% change year-on-year
+10.00% -1.96%
Cryptography
England

The following table is for comparison with the above and provides statistics for the entire Miscellaneous category in permanent jobs advertised in the Yorkshire region.

Miscellaneous Category
Yorkshire
Permanent IT job ads with a match in the
Miscellaneous category
1693 2179 2530
As % of all permanent IT jobs located in Yorkshire 31.94% 34.48% 33.47%
Number of salaries quoted 1435 1634 2010
Median salary £40,000 £40,000 £38,500
Median salary % change year-on-year
- +3.89%
90% offered a salary of more than £25,000 £23,500 £25,000
10% offered a salary of more than £60,000 £55,000 £60,000
UK excluding London median salary £42,500 £42,500 £40,000
% change year-on-year
- +6.25%

Cryptography
Jobs Demand Trend in Yorkshire

The demand trend of job ads across the Yorkshire region citing Cryptography as a proportion of all IT jobs with a match in the Miscellaneous category.

Cryptography Jobs Demand Trend in Yorkshire

Cryptography
Salary Trend in Yorkshire

This chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Cryptography across the Yorkshire region.

Cryptography Salary Trend in Yorkshire

Cryptography
Job Locations in Yorkshire

The table below looks at the demand and provides a guide to the median salaries quoted in IT jobs citing Cryptography within the Yorkshire region over the 3 months to 4 December 2016. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year.

Location
(Click see detailed
statistics and trends)
Rank Change
on Same Period
Last Year
Matching
Permanent
IT Job Ads
Median Salary
Last 3 Months
Median Salary
% Change
on Same Period
Last Year
Live
Job
Vacancies
South Yorkshire - 6 - -
North Yorkshire - 5 £65,000 -
Cryptography
England

Cryptography
Top 30 Related IT Skills in Yorkshire

For the 6 months to 4 December 2016, IT jobs citing Cryptography also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all job ads across the Yorkshire region with a requirement for Cryptography.

1 15 (100.00%) Linux
2 14 (93.33%) Finance
3 9 (60.00%) AIX
4 8 (53.33%) Windows
4 8 (53.33%) Firewall
4 8 (53.33%) Middleware
4 8 (53.33%) Network Security
4 8 (53.33%) SIEM
4 8 (53.33%) Identity Access Management
5 7 (46.67%) Security Architecture
5 7 (46.67%) OWASP
5 7 (46.67%) PCI DSS
5 7 (46.67%) Mainframe
5 7 (46.67%) CISM
5 7 (46.67%) Migration
5 7 (46.67%) TOGAF
5 7 (46.67%) Vulnerability Assessment
5 7 (46.67%) Information Security
5 7 (46.67%) ISO/IEC 27001
5 7 (46.67%) Java
5 7 (46.67%) Perl
5 7 (46.67%) ITIL
5 7 (46.67%) CISSP
5 7 (46.67%) Microsoft
5 7 (46.67%) Shell Script
6 6 (40.00%) Nagios
6 6 (40.00%) EMC
6 6 (40.00%) HTTP
6 6 (40.00%) NFS
6 6 (40.00%) SNMP

Cryptography
Top Related IT Skills in Yorkshire by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Application Platforms
1 6 (40.00%) Apache
1 6 (40.00%) JBoss
1 6 (40.00%) Liferay
1 6 (40.00%) Tomcat
2 1 (6.67%) Confluence
Applications
1 2 (13.33%) MS Excel
2 1 (6.67%) MS Office
2 1 (6.67%) MS PowerPoint
2 1 (6.67%) MS Project
Communications & Networking
1 8 (53.33%) Firewall
1 8 (53.33%) Network Security
2 6 (40.00%) DHCP
2 6 (40.00%) DNS
2 6 (40.00%) HTTP
2 6 (40.00%) iSCSI
2 6 (40.00%) LDAP
2 6 (40.00%) NAS
2 6 (40.00%) SAN
2 6 (40.00%) SMTP
2 6 (40.00%) SNMP
2 6 (40.00%) SSL
2 6 (40.00%) TCP/IP
2 6 (40.00%) tcpdump
2 6 (40.00%) Telnet
3 1 (6.67%) FTP
3 1 (6.67%) Internet
Database & Business Intelligence
1 6 (40.00%) MySQL
1 6 (40.00%) Oracle Database
1 6 (40.00%) PostgreSQL
2 1 (6.67%) Pentaho
Development Applications
1 6 (40.00%) Git (software)
1 6 (40.00%) Hudson
1 6 (40.00%) Jenkins
2 1 (6.67%) JIRA
General
1 14 (93.33%) Finance
Job Titles
1 6 (40.00%) Administrator
1 6 (40.00%) Linux Administrator
1 6 (40.00%) Security Specialist
2 1 (6.67%) Architect
2 1 (6.67%) Data Migration Specialist
2 1 (6.67%) Information Officer
2 1 (6.67%) Information Security Officer
2 1 (6.67%) Infrastructure Architect
2 1 (6.67%) IT Architect
2 1 (6.67%) IT Infrastructure Architect
2 1 (6.67%) IT Security Architect
2 1 (6.67%) Migration Specialist
2 1 (6.67%) Security Architect
2 1 (6.67%) Security Officer
2 1 (6.67%) Senior Information Security Officer
Libraries, Frameworks & Software Standards
1 8 (53.33%) Middleware
2 6 (40.00%) JDBC
2 6 (40.00%) LAMP
2 6 (40.00%) LAPP Stack
Miscellaneous
1 7 (46.67%) Mainframe
2 6 (40.00%) Clustering
2 6 (40.00%) Management Information System
3 2 (13.33%) Analytical Skills
4 1 (6.67%) Data Extraction
4 1 (6.67%) Data Integration
Operating Systems
1 15 (100.00%) Linux
2 9 (60.00%) AIX
3 8 (53.33%) Windows
4 6 (40.00%) SUSE Linux Enterprise Server
5 1 (6.67%) Red Hat Enterprise Linux
5 1 (6.67%) Unix
Processes & Methodologies
1 8 (53.33%) Identity Access Management
1 8 (53.33%) SIEM
2 7 (46.67%) Information Security
2 7 (46.67%) ITIL
2 7 (46.67%) Migration
2 7 (46.67%) OWASP
2 7 (46.67%) Security Architecture
2 7 (46.67%) TOGAF
2 7 (46.67%) Vulnerability Assessment
3 6 (40.00%) Disaster Recovery
3 6 (40.00%) High Availability
3 6 (40.00%) Load Balancing
3 6 (40.00%) Memory Management
4 1 (6.67%) Data Migration
4 1 (6.67%) Data Validation
4 1 (6.67%) ETL
4 1 (6.67%) Incident Management
4 1 (6.67%) PRINCE2
4 1 (6.67%) Time Management
4 1 (6.67%) Validation
Programming Languages
1 7 (46.67%) Java
1 7 (46.67%) Perl
1 7 (46.67%) Shell Script
2 6 (40.00%) AWK
2 6 (40.00%) Bash Shell
2 6 (40.00%) sed
2 6 (40.00%) SQL
Qualifications
1 7 (46.67%) CISM
1 7 (46.67%) CISSP
2 6 (40.00%) Degree
2 6 (40.00%) RHCE
Quality Assurance & Compliance
1 7 (46.67%) ISO/IEC 27001
1 7 (46.67%) PCI DSS
System Software
1 6 (40.00%) iptables
1 6 (40.00%) NFS
1 6 (40.00%) Postfix
1 6 (40.00%) Squid
1 6 (40.00%) VMware Infrastructure
2 1 (6.67%) Tivoli Workload Scheduler
Systems Management
1 6 (40.00%) Nagios
1 6 (40.00%) Nmap
1 6 (40.00%) Puppet
2 1 (6.67%) Tivoli
Vendors
1 7 (46.67%) Microsoft
2 6 (40.00%) EMC
2 6 (40.00%) NetApp
2 6 (40.00%) Novell
2 6 (40.00%) Oracle
2 6 (40.00%) Red Hat
2 6 (40.00%) SAP
2 6 (40.00%) VMware