Period
to 31 October 2020

The following table provides summary statistics for permanent job vacancies with a requirement for Metasploit skills. Included is a benchmarking guide to the salaries offered in vacancies that have cited Metasploit over the 6 months to 31 October 2020 with a comparison to the same period in the previous 2 years.

Rapid7 Metasploit
UK
6 months to
31 Oct 2020
Same period 2019 Same period 2018
Rank 652 998 1089
Rank change year-on-year +346 +91 +22
Permanent jobs citing Metasploit 35 70 88
As % of all permanent jobs advertised in the UK 0.070% 0.051% 0.054%
As % of the Development Applications category 0.34% 0.27% 0.27%
Number of salaries quoted 19 55 65
Median annual salary £62,500 £55,000 £60,000
Median salary % change year-on-year +13.64% -8.33% +25.00%
10th Percentile £44,100 £41,750 £45,000
90th Percentile £65,000 £113,250 £100,000
UK excluding London median annual salary £62,500 £53,750 £56,250
% change year-on-year +16.28% -4.44% +50.00%

Metasploit is in the Development Applications category. The following table is for comparison with the above and provides summary statistics for all permanent job vacancies with a requirement for development application skills.

All Development Application Skills
UK
Permanent vacancies with a requirement for development application skills 10,443 25,861 32,928
As % of all permanent IT jobs advertised in the UK 21.00% 18.92% 20.06%
Number of salaries quoted 8,632 20,559 26,581
Median annual salary £55,000 £52,500 £50,000
Median salary % change year-on-year +4.76% +5.00% -
10th Percentile £35,000 £32,500 £32,500
90th Percentile £82,500 £82,500 £80,000
UK excluding London median annual salary £50,000 £47,500 £45,000
% change year-on-year +5.26% +5.56% -

Metasploit
Job Vacancy Trend

Job postings citing Metasploit as a proportion of all IT jobs advertised.

Job vacancy trend for Metasploit in the UK

Metasploit
Salary Trend

3-month moving average salary quoted in jobs citing Metasploit.

Salary trend for Metasploit in the UK

Metasploit
Salary Histogram

Salary distribution for jobs citing Metasploit over the 6 months to 31 October 2020.

Salary histogram for Metasploit in the UK

Metasploit
Top 11 Job Locations

The table below looks at the demand and provides a guide to the median salaries quoted in IT jobs citing Metasploit within the UK over the 6 months to 31 October 2020. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 6 month period last year.

Location Rank Change
on Same Period
Last Year
Matching
Permanent
IT Job Ads
Median Salary
Past 6 Months
Median Salary
% Change
on Same Period
Last Year
Live
Job
Vacancies
UK excluding London +317 33 £62,500 +16.28% 9
England +333 20 £62,500 +13.64% 8
Wales +59 8 - -
Midlands +125 7 - - 2
Scotland +101 7 £65,000 +30.00% 3
East Midlands +81 7 - - 1
South East +218 6 £62,500 +13.64%
North of England +176 3 £45,000 - 3
North West +128 3 £45,000 - 2
London +235 2 £70,000 -9.68% 2
East of England - 2 £36,000 -

For the 6 months to 31 October 2020, IT jobs citing Metasploit also mentioned the following skills in order of popularity. The figures indicate the absolute number co-occurrences and as a proportion of all permanent job ads with a requirement for Metasploit.

1 25 (71.43%) Penetration Testing
2 22 (62.86%) Microsoft
3 21 (60.00%) SQL
4 19 (54.29%) SIEM
4 19 (54.29%) Cybersecurity
5 18 (51.43%) Kali Linux
6 17 (48.57%) Vulnerability Scanning
6 17 (48.57%) Firewall
6 17 (48.57%) TCP/IP
7 16 (45.71%) Information Security
7 16 (45.71%) Ethical Hacking
7 16 (45.71%) CREST Certified
8 15 (42.86%) Office 365
8 15 (42.86%) Azure
8 15 (42.86%) AWS
8 15 (42.86%) Linux
9 14 (40.00%) Security Testing
10 13 (37.14%) Mobile App
11 12 (34.29%) Security Operations
12 10 (28.57%) Burp Suite
12 10 (28.57%) Nessus
12 10 (28.57%) CEH
12 10 (28.57%) Snort
12 10 (28.57%) Manufacturing
13 9 (25.71%) ITIL
13 9 (25.71%) Security Cleared
14 8 (22.86%) Bash Shell
14 8 (22.86%) Wireshark
14 8 (22.86%) Finance
14 8 (22.86%) GCIA

Metasploit
Co-occurring IT Skills by Category

The follow tables expand on the table above by listing co-occurrences grouped by category. The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories:

Business Applications
1 8 (22.86%) Sentinel
Cloud Services
1 15 (42.86%) AWS
1 15 (42.86%) Azure
1 15 (42.86%) Office 365
2 8 (22.86%) Logic Apps
3 7 (20.00%) GCP
3 7 (20.00%) IaaS
3 7 (20.00%) SaaS
Communications & Networking
1 17 (48.57%) Firewall
1 17 (48.57%) TCP/IP
2 8 (22.86%) DKIM
2 8 (22.86%) DMARC
2 8 (22.86%) DNS
2 8 (22.86%) Wireshark
3 7 (20.00%) CTI
3 7 (20.00%) Intrusion Detection
3 7 (20.00%) LAN
3 7 (20.00%) Software-Defined Networking
3 7 (20.00%) WAN
4 2 (5.71%) Network Security
Development Applications
1 10 (28.57%) Burp Suite
2 7 (20.00%) WebScarab
3 6 (17.14%) JIRA
General
1 10 (28.57%) Manufacturing
2 8 (22.86%) Finance
3 2 (5.71%) Military
Job Titles
1 19 (54.29%) Analyst
2 16 (45.71%) Security Analyst
3 7 (20.00%) Architect
3 7 (20.00%) Cloud Architect
3 7 (20.00%) Cloud Solutions Architect
3 7 (20.00%) Penetration Tester
3 7 (20.00%) Solutions Architect
3 7 (20.00%) Tester
4 6 (17.14%) Senior Penetration Tester
4 6 (17.14%) Senior Tester
5 5 (14.29%) Junior
5 5 (14.29%) Junior Analyst
5 5 (14.29%) Junior Security Analyst
6 4 (11.43%) SOC Analyst
7 2 (5.71%) Senior Analyst
7 2 (5.71%) SIEM Analyst
Libraries, Frameworks & Software Standards
1 8 (22.86%) Web Services
2 7 (20.00%) OAuth
2 7 (20.00%) OAuth2
2 7 (20.00%) OpenID
2 7 (20.00%) SAML
Miscellaneous
1 13 (37.14%) Mobile App
2 8 (22.86%) Cyberthreat
2 8 (22.86%) Security Operations Centre
3 7 (20.00%) Cloud Native
3 7 (20.00%) Hybrid Cloud
4 6 (17.14%) PKI
5 1 (2.86%) Virtual Team
Operating Systems
1 18 (51.43%) Kali Linux
2 15 (42.86%) Linux
3 8 (22.86%) Windows
4 7 (20.00%) Unix
Processes & Methodologies
1 25 (71.43%) Penetration Testing
2 19 (54.29%) Cybersecurity
2 19 (54.29%) SIEM
3 17 (48.57%) Vulnerability Scanning
4 16 (45.71%) Ethical Hacking
4 16 (45.71%) Information Security
5 14 (40.00%) Security Testing
6 12 (34.29%) Security Operations
7 9 (25.71%) ITIL
8 8 (22.86%) Analytics
8 8 (22.86%) Cyber Intelligence
8 8 (22.86%) Cyber Threat Intelligence
8 8 (22.86%) Data Privacy
8 8 (22.86%) Database Security
8 8 (22.86%) Malware Reverse Engineering
8 8 (22.86%) Purple Team
8 8 (22.86%) Reverse Engineering
8 8 (22.86%) Threat Intelligence
9 7 (20.00%) Line Management
9 7 (20.00%) Technical Leadership
Programming Languages
1 21 (60.00%) SQL
2 8 (22.86%) Bash Shell
Qualifications
1 16 (45.71%) CREST Certified
2 10 (28.57%) CEH
3 9 (25.71%) Security Cleared
4 8 (22.86%) GCIA
4 8 (22.86%) GCIH
4 8 (22.86%) SANS
5 7 (20.00%) AWS Certification
5 7 (20.00%) CCNA
5 7 (20.00%) CCNP
5 7 (20.00%) Cisco Certification
5 7 (20.00%) MCSE
5 7 (20.00%) Microsoft Certification
6 4 (11.43%) OSCP
7 1 (2.86%) CCSA
7 1 (2.86%) CompTIA Security+
7 1 (2.86%) EC-Council LPT
7 1 (2.86%) ECSA
7 1 (2.86%) SC Cleared
Quality Assurance & Compliance
1 8 (22.86%) HMG Security Policy Framework
2 6 (17.14%) GDPR
3 2 (5.71%) SLA
System Software
1 10 (28.57%) Snort
2 8 (22.86%) Active Directory
3 7 (20.00%) Docker
Systems Management
1 10 (28.57%) Nessus
2 7 (20.00%) Core Impact
2 7 (20.00%) Kubernetes
2 7 (20.00%) Nexpose
3 2 (5.71%) QRadar
4 1 (2.86%) Nmap
Vendors
1 22 (62.86%) Microsoft
2 7 (20.00%) Cisco
2 7 (20.00%) Google
3 4 (11.43%) LogRhythm
4 2 (5.71%) ArcSight
4 2 (5.71%) Splunk
5 1 (2.86%) CheckPoint