The following table provides summary statistics for permanent job vacancies advertised in Berkshire with a requirement for Ethical Hacking skills. Included is a benchmarking guide to the salaries offered in vacancies that have cited Ethical Hacking over the 3 months to 29 March 2017 with a comparison to the same period in the previous 2 years.

Ethical Hacking
South East / Berkshire
3 months to
29 Mar 2017
Same period 2016 Same period 2015
Rank 175 215 221
Rank change year-on-year +40 +6  
Permanent jobs citing Ethical Hacking 11 10 7
As % of all permanent IT jobs advertised in Berkshire 0.33% 0.20% 0.13%
As % of the Processes & Methodologies category 0.38% 0.23% 0.15%
Number of salaries quoted 7 9 4
Median salary £50,000 £47,500 £53,000
Median salary % change year-on-year +5.26% -10.37%  
UK excluding London median salary £52,500 £57,500 £54,250
% change year-on-year -8.69% +5.99%  

Ethical Hacking is in the process and methodology skills category. The next table is for comparison with the above and provides summary statistics for all permanent job vacancies advertised in Berkshire with a requirement for process and methodology skills.

Process & Methodology Skills
Berkshire
Permanent job vacancies with a requirement for process and methodology skills 2873 4374 4663
As % of all permanent IT job vacancies advertised in Berkshire 85.23% 87.22% 86.02%
Number of salaries quoted 2248 3515 3349
Median salary £52,500 £52,500 £52,500
90% offered a salary of more than £32,500 £35,000 £35,000
10% offered a salary of more than £72,500 £75,000 £72,000
UK excluding London median salary £45,000 £45,000 £43,000
% change year-on-year - +4.65%  

Ethical Hacking
Job Vacancy Trend in Berkshire

The job posting trend of jobs advertised in Berkshire citing Ethical Hacking as a proportion of all permanent or contract IT jobs with a match in the Processes & Methodologies category.

Job vacancy trend for Ethical Hacking in Berkshire

Ethical Hacking
Salary Trend in Berkshire

This chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Ethical Hacking in Berkshire.

Salary trend for Ethical Hacking in Berkshire

Ethical Hacking
Salary Histogram in Berkshire

The salary distribution of IT jobs citing Ethical Hacking in Berkshire over the 3 months to 29 March 2017.

Salary histogram for Ethical Hacking in Berkshire

Ethical Hacking
Job Locations in Berkshire

The table below looks at the demand and provides a guide to the median salaries quoted in IT jobs citing Ethical Hacking within the Berkshire region over the 3 months to 29 March 2017. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year.

Location Rank Change
on Same Period
Last Year
Matching
Permanent
IT Job Ads
Median Salary
Last 3 Months
Median Salary
% Change
on Same Period
Last Year
Live
Job
Vacancies
Reading +37 5 £50,000 -
Bracknell - 4 - -
Ethical Hacking
South East

For the 6 months to 29 March 2017, IT jobs citing Ethical Hacking also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all job ads across the Berkshire region with a requirement for Ethical Hacking.

1 15 (88.24%) Firewall
1 15 (88.24%) Information Security
1 15 (88.24%) Penetration Testing
2 10 (58.82%) HTTP
2 10 (58.82%) TCP/IP
3 8 (47.06%) Project Management
3 8 (47.06%) SDLC
4 7 (41.18%) CREST Certified
4 7 (41.18%) Social Engineering
5 6 (35.29%) Content Management
5 6 (35.29%) VMware
5 6 (35.29%) VMware ESX
5 6 (35.29%) Wireless
5 6 (35.29%) Finance
5 6 (35.29%) Degree
5 6 (35.29%) QA
5 6 (35.29%) CRM
5 6 (35.29%) SMTP
5 6 (35.29%) CISSP
5 6 (35.29%) Middleware
5 6 (35.29%) Solaris
5 6 (35.29%) C
5 6 (35.29%) C++
5 6 (35.29%) OWASP
5 6 (35.29%) iSeries
6 5 (29.41%) SIEM
6 5 (29.41%) Security Operations
6 5 (29.41%) Cybersecurity
6 5 (29.41%) .NET
6 5 (29.41%) Java

Ethical Hacking
Co-occurring IT Skills in Berkshire by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Application Platforms
1 1 (5.88%) Elasticsearch
Communications & Networking
1 15 (88.24%) Firewall
2 10 (58.82%) HTTP
2 10 (58.82%) TCP/IP
3 6 (35.29%) SMTP
3 6 (35.29%) Wireless
4 4 (23.53%) SSL
Database & Business Intelligence
1 1 (5.88%) Big Data
1 1 (5.88%) NoSQL
1 1 (5.88%) SQL Server
General
1 6 (35.29%) Finance
Job Titles
1 7 (41.18%) Consultant
1 7 (41.18%) Penetration Tester
1 7 (41.18%) Tester
2 6 (35.29%) Security Consultant
3 2 (11.76%) Operational Security Manager
3 2 (11.76%) Operations Manager
3 2 (11.76%) Security Manager
3 2 (11.76%) Security Operations Manager
3 2 (11.76%) Security Penetration Tester
3 2 (11.76%) Security Tester
4 1 (5.88%) 3rd Line Support
4 1 (5.88%) Applications Support
4 1 (5.88%) Architect
4 1 (5.88%) Cybersecurity Architect
4 1 (5.88%) Security Architect
4 1 (5.88%) Senior Architect
4 1 (5.88%) Senior Consultant
4 1 (5.88%) Senior Security Architect
4 1 (5.88%) Senior Tester
4 1 (5.88%) SOC Manager
Libraries, Frameworks & Software Standards
1 6 (35.29%) Middleware
2 5 (29.41%) .NET
3 4 (23.53%) Ajax
3 4 (23.53%) HTML
Miscellaneous
1 6 (35.29%) iSeries
2 3 (17.65%) Distributed Denial-of-Service
2 3 (17.65%) Management Information System
3 2 (11.76%) Cyberthreat
4 1 (5.88%) Mobile App
4 1 (5.88%) Security Operations Centre
Operating Systems
1 6 (35.29%) Solaris
2 5 (29.41%) Linux
3 4 (23.53%) Unix
4 1 (5.88%) CentOS
4 1 (5.88%) Windows
4 1 (5.88%) Windows Server
4 1 (5.88%) Windows Server 2008
Processes & Methodologies
1 15 (88.24%) Information Security
1 15 (88.24%) Penetration Testing
2 8 (47.06%) Project Management
2 8 (47.06%) SDLC
3 7 (41.18%) Social Engineering
4 6 (35.29%) Content Management
4 6 (35.29%) CRM
4 6 (35.29%) OWASP
5 5 (29.41%) Cybersecurity
5 5 (29.41%) Security Operations
5 5 (29.41%) SIEM
5 5 (29.41%) Vulnerability Assessment
6 4 (23.53%) Risk Management
7 3 (17.65%) Cryptography
7 3 (17.65%) DDoS Mitigation
7 3 (17.65%) Incident Management
8 2 (11.76%) ITIL
9 1 (5.88%) DoDAF
9 1 (5.88%) MODAF
9 1 (5.88%) Security Testing
Programming Languages
1 6 (35.29%) C
1 6 (35.29%) C++
2 5 (29.41%) Java
3 4 (23.53%) Bash Shell
3 4 (23.53%) Perl
3 4 (23.53%) PHP
3 4 (23.53%) PowerShell
3 4 (23.53%) Python
3 4 (23.53%) Ruby
4 1 (5.88%) SQL
Qualifications
1 7 (41.18%) CREST Certified
2 6 (35.29%) CISSP
2 6 (35.29%) Degree
3 5 (29.41%) CISM
4 1 (5.88%) CISA
4 1 (5.88%) DV Cleared
4 1 (5.88%) GCIA
4 1 (5.88%) GCIH
4 1 (5.88%) OSCP
4 1 (5.88%) Security Cleared
Quality Assurance & Compliance
1 6 (35.29%) QA
2 2 (11.76%) ISO/IEC 27001
2 2 (11.76%) PCI DSS
2 2 (11.76%) SLA
System Software
1 6 (35.29%) VMware ESX
2 1 (5.88%) Active Directory
Systems Management
1 1 (5.88%) Grafana
1 1 (5.88%) Nessus
Vendors
1 6 (35.29%) VMware
2 4 (23.53%) Blue Coat
2 4 (23.53%) F5
3 2 (11.76%) Cisco
4 1 (5.88%) AlienVault
4 1 (5.88%) ArcSight
4 1 (5.88%) Intel Security
4 1 (5.88%) LogRhythm