Period
to 20 November 2017

The following table provides summary statistics for permanent job vacancies advertised in Reading with a requirement for Ethical Hacking skills. Included is a benchmarking guide to the salaries offered in vacancies that have cited Ethical Hacking over the 6 months to 20 November 2017 with a comparison to the same period in the previous 2 years.

Ethical Hacking
Berkshire > Reading
6 months to
20 Nov 2017
Same period 2016 Same period 2015
Rank 152 - 212
Rank change year-on-year - +212 +3
Permanent jobs citing Ethical Hacking 4 0 4
As % of all permanent IT jobs advertised in Reading 0.17% - 0.086%
As % of the Processes & Methodologies category 0.20% - 0.10%
Number of salaries quoted 1 0 3
Reading median annual salary £45,000 - £80,000
Berkshire median annual salary £45,000 £65,000 £80,000
% change year-on-year -30.77% -18.75% -20.00%

Ethical Hacking is in the Processes and Methodologies category. The following table is for comparison with the above and provides summary statistics for all permanent job vacancies advertised in Reading with a requirement for process or methodology skills.

All Process and Methodology Skills
Reading
Permanent vacancies with a requirement for process or methodology skills 2004 3032 3986
As % of all permanent IT jobs advertised in Reading 85.02% 88.04% 86.07%
Number of salaries quoted 1608 2221 3111
Reading median annual salary £50,000 £50,000 £48,000
Median salary % change year-on-year - +4.17% -3.03%
10th Percentile £29,000 £29,500 £30,000
90th Percentile £75,000 £72,500 £70,000
Berkshire median annual salary £50,000 £50,000 £50,000

Ethical Hacking
Job Vacancy Trend in Reading

Job postings citing Ethical Hacking as a percentage of all IT jobs advertised in Reading.

Job vacancy trend for Ethical Hacking in Reading

Ethical Hacking
Salary Trend in Reading

This chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Ethical Hacking in Reading.

Salary trend for Ethical Hacking in Reading

For the 6 months to 20 November 2017, IT jobs citing Ethical Hacking also mentioned the following skills in order of popularity. The figures indicate the number co-occurrences and its proportion to all job ads across the Reading region with a requirement for Ethical Hacking.

1 3 (75.00%) Information Security
2 2 (50.00%) CESG
2 2 (50.00%) C#
2 2 (50.00%) C++
2 2 (50.00%) Java
2 2 (50.00%) VB.NET
2 2 (50.00%) .NET
2 2 (50.00%) OSCP
2 2 (50.00%) Vulnerability Management
2 2 (50.00%) Unix
2 2 (50.00%) Windows
2 2 (50.00%) ISO/IEC 27001
2 2 (50.00%) Degree
2 2 (50.00%) Computer Science
2 2 (50.00%) Security Testing
2 2 (50.00%) Network Security
2 2 (50.00%) Penetration Testing
2 2 (50.00%) CREST Certified
2 2 (50.00%) ISO/IEC 27002 (supersedes ISO/IEC 17799)
2 2 (50.00%) Computer Science Degree
3 1 (25.00%) Security Operations Centre
3 1 (25.00%) Security Monitoring
3 1 (25.00%) Cyber Kill Chain
3 1 (25.00%) SANS
3 1 (25.00%) Security Operations
3 1 (25.00%) Open Source
3 1 (25.00%) SIEM
3 1 (25.00%) CISA
3 1 (25.00%) CISM
3 1 (25.00%) Disaster Recovery

Ethical Hacking
Co-occurring IT Skills in Reading by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Application Platforms
1 1 (25.00%) Apache
Communications & Networking
1 2 (50.00%) Network Security
2 1 (25.00%) Firewall
2 1 (25.00%) TCP/IP
Database & Business Intelligence
1 1 (25.00%) MySQL
General
1 1 (25.00%) Games
Job Titles
1 2 (50.00%) Penetration Tester
1 2 (50.00%) Tester
2 1 (25.00%) Analyst
2 1 (25.00%) Ethical Hacker
2 1 (25.00%) Radar Analyst
2 1 (25.00%) Security Analyst
2 1 (25.00%) Security Assurance Manager
2 1 (25.00%) Security Manager
2 1 (25.00%) SIEM Analyst
Libraries, Frameworks & Software Standards
1 2 (50.00%) .NET
Miscellaneous
1 2 (50.00%) CESG
1 2 (50.00%) Computer Science
2 1 (25.00%) Analytical Skills
2 1 (25.00%) Cyber Kill Chain
2 1 (25.00%) Security Operations Centre
Operating Systems
1 2 (50.00%) Unix
1 2 (50.00%) Windows
2 1 (25.00%) FreeBSD
2 1 (25.00%) Linux
Processes & Methodologies
1 3 (75.00%) Information Security
2 2 (50.00%) Penetration Testing
2 2 (50.00%) Security Testing
2 2 (50.00%) Vulnerability Management
3 1 (25.00%) Analytics
3 1 (25.00%) Disaster Recovery
3 1 (25.00%) ITIL
3 1 (25.00%) Mentoring
3 1 (25.00%) Network Packet Capture
3 1 (25.00%) Open Source
3 1 (25.00%) Risk Assessment
3 1 (25.00%) Risk Management
3 1 (25.00%) Security Monitoring
3 1 (25.00%) Security Operations
3 1 (25.00%) SIEM
3 1 (25.00%) Vulnerability Assessment
Programming Languages
1 2 (50.00%) C#
1 2 (50.00%) C++
1 2 (50.00%) Java
1 2 (50.00%) VB.NET
Qualifications
1 2 (50.00%) Computer Science Degree
1 2 (50.00%) CREST Certified
1 2 (50.00%) Degree
1 2 (50.00%) OSCP
2 1 (25.00%) CCNA
2 1 (25.00%) CCSA
2 1 (25.00%) CISA
2 1 (25.00%) Cisco Certification
2 1 (25.00%) CISM
2 1 (25.00%) CISSP
2 1 (25.00%) GIAC
2 1 (25.00%) ITIL Foundation Certificate
2 1 (25.00%) SANS
Quality Assurance & Compliance
1 2 (50.00%) ISO/IEC 27001
1 2 (50.00%) ISO/IEC 27002 (supersedes ISO/IEC 17799)
Systems Management
1 1 (25.00%) Juniper STRM
1 1 (25.00%) QRadar
1 1 (25.00%) RSA enVision
1 1 (25.00%) RSA Security Analytics
Vendors
1 1 (25.00%) CheckPoint
1 1 (25.00%) Cisco
1 1 (25.00%) IBM
1 1 (25.00%) Juniper
1 1 (25.00%) LogRhythm
1 1 (25.00%) Sun