The table below looks at the statistics for Vulnerability Assessment skills in IT jobs advertised for the Yorkshire region. Included is a guide to the salaries offered in IT jobs that have cited Vulnerability Assessment over the 3 months to 23 February 2017 with a comparison to the same period over the previous 2 years.

3 months to
23 Feb 2017
Same period 2016 Same period 2015
Vulnerability Assessment
England / Yorkshire
Rank 214 241 242
Rank change year-on-year
+27 +1
Permanent jobs citing Vulnerability Assessment 17 12 22
As % of all permanent IT jobs located in Yorkshire 0.32% 0.19% 0.30%
As % of the Processes & Methodologies category 0.36% 0.21% 0.34%
Number of salaries quoted 2 8 21
Median salary £40,000 £55,000 £38,000
Median salary % change year-on-year
-27.27% +44.73%
UK excluding London median salary £52,500 £50,000 £49,375
% change year-on-year
+5.00% +1.26%

The following table is for comparison with the above and provides statistics for the entire Processes & Methodologies category in permanent jobs advertised in the Yorkshire region.

Processes & Methodologies Category
Yorkshire
Permanent IT job ads with a match in the
Processes & Methodologies category
4709 5603 6497
As % of all permanent IT jobs located in Yorkshire 89.56% 87.70% 89.56%
Number of salaries quoted 4034 4664 5315
Median salary £42,500 £42,500 £40,000
Median salary % change year-on-year
- +6.25%
90% offered a salary of more than £30,000 £30,000 £27,500
10% offered a salary of more than £60,000 £55,000 £62,500
UK excluding London median salary £45,000 £45,000 £42,500
% change year-on-year
- +5.88%

Vulnerability Assessment
Jobs Demand Trend in Yorkshire

The demand trend of job ads across the Yorkshire region citing Vulnerability Assessment as a proportion of all IT jobs with a match in the Processes & Methodologies category.

Vulnerability Assessment Jobs Demand Trend in Yorkshire

Vulnerability Assessment
Salary Trend in Yorkshire

This chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Vulnerability Assessment across the Yorkshire region.

Vulnerability Assessment Salary Trend in Yorkshire

Vulnerability Assessment
Job Locations in Yorkshire

The table below looks at the demand and provides a guide to the median salaries quoted in IT jobs citing Vulnerability Assessment within the Yorkshire region over the 3 months to 23 February 2017. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year.

Location Rank Change
on Same Period
Last Year
Matching
Permanent
IT Job Ads
Median Salary
Last 3 Months
Median Salary
% Change
on Same Period
Last Year
Live
Job
Vacancies
West Yorkshire +26 8 - -
North Yorkshire +5 5 £40,000 -38.46%
South Yorkshire +14 3 - - 1
Vulnerability Assessment
England

Vulnerability Assessment
Top 30 Related IT Skills in Yorkshire

For the 6 months to 23 February 2017, IT jobs citing Vulnerability Assessment also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all job ads across the Yorkshire region with a requirement for Vulnerability Assessment.

1 26 (68.42%) Information Security
2 24 (63.16%) Finance
3 21 (55.26%) Penetration Testing
4 17 (44.74%) Degree
5 16 (42.11%) ISO/IEC 27001
5 16 (42.11%) Security Cleared
5 16 (42.11%) Management Information System
6 15 (39.47%) Windows
6 15 (39.47%) CISSP
6 15 (39.47%) PCI DSS
7 14 (36.84%) Social Engineering
7 14 (36.84%) Network Packet Capture
7 14 (36.84%) Firewall
7 14 (36.84%) CISM
8 13 (34.21%) Network Security
9 12 (31.58%) Security Architecture
9 12 (31.58%) TOGAF
9 12 (31.58%) Mainframe
10 11 (28.95%) CHECK Team Leader
10 11 (28.95%) CREST Certified
11 10 (26.32%) Vulnerability Scanning
11 10 (26.32%) Cybersecurity
12 9 (23.68%) Internet
12 9 (23.68%) Linux
13 8 (21.05%) Virtual Team
14 7 (18.42%) SIEM
14 7 (18.42%) Security Testing
14 7 (18.42%) Unix
14 7 (18.42%) Microsoft
15 6 (15.79%) Middleware

Vulnerability Assessment
Top Related IT Skills in Yorkshire by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Applications
1 1 (2.63%) MS Office
Communications & Networking
1 14 (36.84%) Firewall
2 13 (34.21%) Network Security
3 9 (23.68%) Internet
4 4 (10.53%) HTTP
4 4 (10.53%) Wireless
5 3 (7.89%) DNS
5 3 (7.89%) LAN
5 3 (7.89%) TCP/IP
5 3 (7.89%) VPN
5 3 (7.89%) WAN
6 2 (5.26%) DHCP
6 2 (5.26%) Wi-Fi
6 2 (5.26%) Wireshark
7 1 (2.63%) Intrusion Detection
7 1 (2.63%) MPLS
7 1 (2.63%) Spanning Tree
7 1 (2.63%) SSL
7 1 (2.63%) VLAN
Development Applications
1 1 (2.63%) Burp Suite
General
1 24 (63.16%) Finance
Job Titles
1 10 (26.32%) Penetration Tester
1 10 (26.32%) Tester
2 9 (23.68%) Security Specialist
3 6 (15.79%) Architect
3 6 (15.79%) Ethical Hacker
3 6 (15.79%) Security Architect
4 5 (13.16%) Analyst
4 5 (13.16%) Consultant
4 5 (13.16%) Security Penetration Tester
4 5 (13.16%) Security Tester
5 4 (10.53%) Vulnerability Consultant
5 4 (10.53%) Vulnerability Tester
6 3 (7.89%) Security Analyst
7 2 (5.26%) Information Analyst
7 2 (5.26%) Information Security Analyst
7 2 (5.26%) Information Security Specialist
7 2 (5.26%) Information Specialist
8 1 (2.63%) IT Security Analyst
8 1 (2.63%) IT Security Specialist
8 1 (2.63%) Testing Consultant
Libraries, Frameworks & Software Standards
1 6 (15.79%) Middleware
2 5 (13.16%) .NET
3 4 (10.53%) .NET Framework
Miscellaneous
1 16 (42.11%) Management Information System
2 12 (31.58%) Mainframe
3 8 (21.05%) Virtual Team
4 6 (15.79%) Computer Science
5 4 (10.53%) CESG
6 1 (2.63%) iPad
6 1 (2.63%) iPhone
6 1 (2.63%) Linux Command Line
6 1 (2.63%) PKI
Operating Systems
1 15 (39.47%) Windows
2 9 (23.68%) Linux
3 7 (18.42%) Unix
4 6 (15.79%) AIX
5 1 (2.63%) Kali Linux
5 1 (2.63%) Solaris
5 1 (2.63%) Windows 7
Processes & Methodologies
1 26 (68.42%) Information Security
2 21 (55.26%) Penetration Testing
3 14 (36.84%) Network Packet Capture
3 14 (36.84%) Social Engineering
4 12 (31.58%) Security Architecture
4 12 (31.58%) TOGAF
5 10 (26.32%) Cybersecurity
5 10 (26.32%) Vulnerability Scanning
6 7 (18.42%) Security Testing
6 7 (18.42%) SIEM
7 6 (15.79%) Cryptography
7 6 (15.79%) Ethical Hacking
7 6 (15.79%) Identity Access Management
7 6 (15.79%) Matrix Management
7 6 (15.79%) OWASP
7 6 (15.79%) Security Management
7 6 (15.79%) Vulnerability Management
8 5 (13.16%) Information Security Management
8 5 (13.16%) Project Management
8 5 (13.16%) Remediation Plan
Programming Languages
1 5 (13.16%) C
1 5 (13.16%) C#
1 5 (13.16%) C++
1 5 (13.16%) Java
1 5 (13.16%) PHP
1 5 (13.16%) VB.NET
2 2 (5.26%) Perl
3 1 (2.63%) JavaScript
3 1 (2.63%) PowerShell
3 1 (2.63%) Python
3 1 (2.63%) Ruby
3 1 (2.63%) SQL
Qualifications
1 17 (44.74%) Degree
2 16 (42.11%) Security Cleared
3 15 (39.47%) CISSP
4 14 (36.84%) CISM
5 11 (28.95%) CHECK Team Leader
5 11 (28.95%) CREST Certified
6 5 (13.16%) SC Cleared
7 4 (10.53%) CHECK Team Member
8 2 (5.26%) CCNA
8 2 (5.26%) CCNP
8 2 (5.26%) CISA
8 2 (5.26%) Cisco Certification
8 2 (5.26%) OSCP
9 1 (2.63%) CEH
9 1 (2.63%) GPEN
9 1 (2.63%) GWAPT
Quality Assurance & Compliance
1 16 (42.11%) ISO/IEC 27001
2 15 (39.47%) PCI DSS
System Software
1 1 (2.63%) Active Directory
Systems Management
1 2 (5.26%) Computer Emergency Response Teams
1 2 (5.26%) Nessus
1 2 (5.26%) Nmap
Vendors
1 7 (18.42%) Microsoft
2 2 (5.26%) Cisco
2 2 (5.26%) HP
Sheffield, South Yorkshire
Rullion
Posted: 4 days ago