Computer World Services (CWS)Corporation
Washington, Washington DC
Job Description The mission of the OFR is to support the Financial Stability Oversight Council (FSOC) in promoting financial stability by: collecting data on behalf of FSOC; providing such data to FSOC and member agencies; standardizing the types and formats of data reported and collected; performing applied research and essential long-term research; developing tools for risk measurement and monitoring; performing other related services; making the results of the activities of the OFR available to financial regulatory agencies; and assisting such member agencies in determining the types of formats of data authorized to be collected by such member agencies. The Incident Response Analyst is an on-call role providing day-to-day incident response across the OFRAE and JADE networks. This includes investigating alerts from the SOC, third party notifications, and other security tools; working with Enterprise System owners to remediate immediate threats and incidents; knowledge capture and investigation tracking documentation to maintain knowledge on the team; monitor and notify of security tool outages and issues; participate in process enhancements through after-action reports, tabletop exercises, and peer consulting as needed. The role will advise and build automations and complex playbooks to further grow the response capability of the team. This is a highly technical role that requires a solid understanding of incident response and security practices. As part of a growing team this role will have the ability to leverage and work with new capabilities as they are deployed including deception infrastructure, continuous penetration testing, data loss prevention (DLP), and machine learning capabilities. The analyst should have experience in ticketing workflow, EDR and endpoint data investigations, network pcap and netflow investigation, and other security tool alerting workflow and pivoting. This role is expected to contribute to maturing the overall IR and security capability through experience and recommendations at every level of security. A successful candidate should also have an area of expertise in at least one blue team capability be it CTI, forensics, malware, etc. Key Tasks and Responsibilities Assess cybersecurity incidents to investigate, validate, respond, and recover the environment, and perform additional activities such as root cause analysis and resilience recommendations. Serve as the primary escalation point for the SOC in the event of an incident. Communicate and coordinate with internal and external teams during incidents and breaches. Design, implement, and document IR processes, procedures, playbooks, and guidelines. Participate in breach and attack simulation and purple teaming exercises to stress test the incident response plans and playbooks. Compose and deliver executive-level reports, presentations, and postmortems for key stakeholders. Provide relevant, strategic recommendations to help improve the security posture of an organization during and after an incident. Analyze emerging threats to improve and maintain the detection and response capabilities of the organization. EDR/IDS/IPS NDR/Network Identity Provider (IdP) authentication policies Email defense platforms Integration of threat intelligence feeds with security policy enforcement points SIEM and XDR detections Security orchestration, automation, and response (SOAR) playbook development Apply knowledge of monitoring, analyzing, detecting, and responding to cyber events to develop clever, efficient methods and technology to detect all types of threat. Document specifications, playbooks, and detections - not as an afterthought, but through the whole process. Work with developers to build security automation workflows, enrichments, and mitigations. Evaluate policies and procedures and recommend updates to management as appropriate. Education & Experience Bachelor's degree or equivalent practical experience in incident response, computer science, cybersecurity, information technology, software engineering, information systems, or computer engineering Four or more years in an incident response role required. Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling preferred. Programming and scripting languages, preferably Python and PowerShell. Scripting and automation for use in SOAR is a plus. Strong written and verbal communication skills; must be able to effectively communicate to all levels of staff up to executive-level management, customers (internal and external), and vendors. Deep understanding of computer systems and concepts, including operating systems, computer networking, cloud computing. Continually updated understanding of and ability to recognize and categorize types of vulnerabilities, exploits, and associated attacks. Continually updated understanding of and ability to identify, capture, contain, and report malware. Ability to preserve evidence integrity in keeping with standard operating procedures and/or national standards. Motivation to continually improve the incident response program and associated policies and procedures. Identification of opportunities to improve collaboration and communication with internal and external stakeholders to mitigate incidents and follow protocols. On-Call nights and weekends based on response SLA requirements. Curiosity and tenacity as related to forensic investigations and threat hunting. Ability to work effectively under pressure; previous experience as an emergency medical responder, firefighter, or related high-pressure environment preferred but not required. Willingness and experience in supporting people from a variety of backgrounds and areas across the organization. Common attacker types and motivations (e.g., nation-state sponsored, ransomware gang, script kiddie, insider threat, etc.) Familiar with and have worked within security frameworks such as: NIST SP 800-61, Attack lifecycle, SANS Security Controls, MITRE ATT&CK, Kill chain, OWASP Top 10 SANS Security 500 Series or other industry standard equivalent recommended but not required. Certifications Preference given for CCE, CCFE, CEH, CPT, CREA, GCFE, GCFA, GCIH, GCIA GIAC, Splunk Core, OSCP, SANS Security 500 Series or other industry standard equivalent Security Clearance Public Trust Must be a U.S. Citizen Other (Travel, Work Environment, DoD 8570 Requirements, Administrative Notes, etc.) This is a remote/work from home role Computer World Services is an affirmative action and equal employment opportunity employer. Current employees and/or qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, disability, protected veteran status, genetic information or any other characteristic protected by local, state, or federal laws, rules, or regulations. Computer World Services is committed to the full inclusion of all qualified individuals. As part of this commitment, Computer World Services will ensure that individuals with disabilities (IWD) are provided reasonable accommodations. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Aaron McClellan in Human Resources at or
Job Description The mission of the OFR is to support the Financial Stability Oversight Council (FSOC) in promoting financial stability by: collecting data on behalf of FSOC; providing such data to FSOC and member agencies; standardizing the types and formats of data reported and collected; performing applied research and essential long-term research; developing tools for risk measurement and monitoring; performing other related services; making the results of the activities of the OFR available to financial regulatory agencies; and assisting such member agencies in determining the types of formats of data authorized to be collected by such member agencies. The Incident Response Analyst is an on-call role providing day-to-day incident response across the OFRAE and JADE networks. This includes investigating alerts from the SOC, third party notifications, and other security tools; working with Enterprise System owners to remediate immediate threats and incidents; knowledge capture and investigation tracking documentation to maintain knowledge on the team; monitor and notify of security tool outages and issues; participate in process enhancements through after-action reports, tabletop exercises, and peer consulting as needed. The role will advise and build automations and complex playbooks to further grow the response capability of the team. This is a highly technical role that requires a solid understanding of incident response and security practices. As part of a growing team this role will have the ability to leverage and work with new capabilities as they are deployed including deception infrastructure, continuous penetration testing, data loss prevention (DLP), and machine learning capabilities. The analyst should have experience in ticketing workflow, EDR and endpoint data investigations, network pcap and netflow investigation, and other security tool alerting workflow and pivoting. This role is expected to contribute to maturing the overall IR and security capability through experience and recommendations at every level of security. A successful candidate should also have an area of expertise in at least one blue team capability be it CTI, forensics, malware, etc. Key Tasks and Responsibilities Assess cybersecurity incidents to investigate, validate, respond, and recover the environment, and perform additional activities such as root cause analysis and resilience recommendations. Serve as the primary escalation point for the SOC in the event of an incident. Communicate and coordinate with internal and external teams during incidents and breaches. Design, implement, and document IR processes, procedures, playbooks, and guidelines. Participate in breach and attack simulation and purple teaming exercises to stress test the incident response plans and playbooks. Compose and deliver executive-level reports, presentations, and postmortems for key stakeholders. Provide relevant, strategic recommendations to help improve the security posture of an organization during and after an incident. Analyze emerging threats to improve and maintain the detection and response capabilities of the organization. EDR/IDS/IPS NDR/Network Identity Provider (IdP) authentication policies Email defense platforms Integration of threat intelligence feeds with security policy enforcement points SIEM and XDR detections Security orchestration, automation, and response (SOAR) playbook development Apply knowledge of monitoring, analyzing, detecting, and responding to cyber events to develop clever, efficient methods and technology to detect all types of threat. Document specifications, playbooks, and detections - not as an afterthought, but through the whole process. Work with developers to build security automation workflows, enrichments, and mitigations. Evaluate policies and procedures and recommend updates to management as appropriate. Education & Experience Bachelor's degree or equivalent practical experience in incident response, computer science, cybersecurity, information technology, software engineering, information systems, or computer engineering Four or more years in an incident response role required. Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling preferred. Programming and scripting languages, preferably Python and PowerShell. Scripting and automation for use in SOAR is a plus. Strong written and verbal communication skills; must be able to effectively communicate to all levels of staff up to executive-level management, customers (internal and external), and vendors. Deep understanding of computer systems and concepts, including operating systems, computer networking, cloud computing. Continually updated understanding of and ability to recognize and categorize types of vulnerabilities, exploits, and associated attacks. Continually updated understanding of and ability to identify, capture, contain, and report malware. Ability to preserve evidence integrity in keeping with standard operating procedures and/or national standards. Motivation to continually improve the incident response program and associated policies and procedures. Identification of opportunities to improve collaboration and communication with internal and external stakeholders to mitigate incidents and follow protocols. On-Call nights and weekends based on response SLA requirements. Curiosity and tenacity as related to forensic investigations and threat hunting. Ability to work effectively under pressure; previous experience as an emergency medical responder, firefighter, or related high-pressure environment preferred but not required. Willingness and experience in supporting people from a variety of backgrounds and areas across the organization. Common attacker types and motivations (e.g., nation-state sponsored, ransomware gang, script kiddie, insider threat, etc.) Familiar with and have worked within security frameworks such as: NIST SP 800-61, Attack lifecycle, SANS Security Controls, MITRE ATT&CK, Kill chain, OWASP Top 10 SANS Security 500 Series or other industry standard equivalent recommended but not required. Certifications Preference given for CCE, CCFE, CEH, CPT, CREA, GCFE, GCFA, GCIH, GCIA GIAC, Splunk Core, OSCP, SANS Security 500 Series or other industry standard equivalent Security Clearance Public Trust Must be a U.S. Citizen Other (Travel, Work Environment, DoD 8570 Requirements, Administrative Notes, etc.) This is a remote/work from home role Computer World Services is an affirmative action and equal employment opportunity employer. Current employees and/or qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, disability, protected veteran status, genetic information or any other characteristic protected by local, state, or federal laws, rules, or regulations. Computer World Services is committed to the full inclusion of all qualified individuals. As part of this commitment, Computer World Services will ensure that individuals with disabilities (IWD) are provided reasonable accommodations. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Aaron McClellan in Human Resources at or
Base One Technologies
Chandler, Arizona
Primary Responsibilities • In-depth knowledge of each phase of the Incident Response life cycle • Expertise of Operating Systems (Windows/Linux) operations and artifacts • Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc) • Ability to recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents • Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies • Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations • Promote and drive implementation of automation and process efficiencies • Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations • Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high quality analysis and work products • Establish trust and business relationships with customer and other relevant stakeholders Basic Qualifications • All Senior Incident Response Analyst candidates shall have a minimum of a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics. • Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program. • 4+ years of supervising and/or managing teams • 5+ years of intrusion detection and/or incident handling experience • CISSP and SANS GCIH or GCIA required upon start • Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise • Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation • Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations; • Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings. • Strong analytical and troubleshooting skills. Preferred Qualifications • Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities. • Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response. • Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments Potential for Telework: No Clearance Level Required: Top Secret/SCI Travel: No Scheduled Weekly Hours:40 Shift: Day
Primary Responsibilities • In-depth knowledge of each phase of the Incident Response life cycle • Expertise of Operating Systems (Windows/Linux) operations and artifacts • Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc) • Ability to recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents • Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies • Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations • Promote and drive implementation of automation and process efficiencies • Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations • Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high quality analysis and work products • Establish trust and business relationships with customer and other relevant stakeholders Basic Qualifications • All Senior Incident Response Analyst candidates shall have a minimum of a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics. • Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program. • 4+ years of supervising and/or managing teams • 5+ years of intrusion detection and/or incident handling experience • CISSP and SANS GCIH or GCIA required upon start • Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise • Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation • Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations; • Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings. • Strong analytical and troubleshooting skills. Preferred Qualifications • Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities. • Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response. • Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments Potential for Telework: No Clearance Level Required: Top Secret/SCI Travel: No Scheduled Weekly Hours:40 Shift: Day
Emergent BioSolutions
Gaithersburg, Maryland
Those who join Emergent BioSolutions feel a sense of ownership about their future. You will excel in an environment characterized by respect, innovation and growth opportunities. Here, you will join passionate professionals who advance their scientific, technical and professional skills to develop products designed-to protect life. I. JOB SUMMARY The Lead Cyber Security Operations Analyst works both independently and collaboratively with EBSI Managed Security Service Provider, Incident Response Team, Information Security Engineers, IT systems engineers, and software engineers. The primary responsibility for this individual will be operate as the tier three security operations analyst, subject matter expert, e-discovery/Digital forensics and cyber threat intelligence fusion cell on the cybersecurity operations team. II. ESSENTIAL FUNCTIONS Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Lead cyber security operations analysts have the responsibility of being the highest technical escalation point of a cyber incident investigating and determining, based on analysis, if an Incident is to be decleared and board reportable. Manage internal/external interactions and communications with stakeholders in a professional manner, referring problems to and communicating with the appropriate department manager/director. Follow legal evidentiary chain of custody during compromise investigations by documenting and communicating findings in the system of record for case management solution and after-action reporting Perform and validate network and host level digital forensic investigations to determine root cause of the compromise, intrusion, or breach Develop and implement cyber security playbooks and process flows in line with industry best pracitces and standards Developing, implementing, and documenting signatures and behavioral detection/prevention strategies that keep pace with emerging cyber threats Identify, drive, track, and document compromise remediaton efforts Declare EBSI official Incidents and be the transition point to the Incident Response team Process cyber threat intelligence in accordance with the "intelligence cycle": direction, collection, processing, analysis, dissemination, and feedback from open source, paid subscriptions, and government sources. The above statements are intended to describe the nature of work performed by those in this job and are not an exhaustive list of all duties. Nothing in this job description restricts managements right to assign or reassign duties and responsibilities to this job at any time which reflects management's assignment of essential functions. III. MINIMUM EDUCATION, EXPERIENCE, SKILLS 3+ years of relevant commercial security operations experience or equivalent USCYBERCOM National Defense Team, MSSP, CERT, CNDSP work experience Must have at least one of the following cyber security technical certifications: SEC+/GSEC/CCSP/CYSA+ In addition to one of the following: GCIH/GCFA/GNFA/GREM Familiarity with Linux, Windows, and cyber forensic evidence concepts Knowledge of malware families and network attack vectors. Knowledge about exploits, vulnerabilities, and cyber attacks Familiarity with performing host and network level analysis to determine if compromise occured. Familiarity with the Lockheed Cyber Kill Chain and MITRE AT&CK frameworks Must have the ability to attain at least a Secret US government clearance Possess planning, interpersonal, and motivational skills, able to write clearly and succinctly in technical and non-technical formats. Ability to speak both extemporaneously and in formal business settings. Have the ability to apply logic and reason to solve complex problems. Ability to establish and maintain multi-functional and positive working relationships. Advanced computer skills and proficiency. Strong interpersonal and networking skills with a solid ability to work in a team environment. Ability to work under stressful and tight deadlines as well as the ability to lead in a fast-paced environment. Above average computer hardware and software knowledge. Ability to multi-task, discerns patterns in detail. Think through problems for logical solutions and remain calm and professional under stress. Strong decision-making ability during both crisis and non-crisis situations. Able to work with highly confidential information. There are physical/mental demands and work environment characteristics that must be met by an individual to successfully perform the essential functions of the job. This information is available upon request from the candidate. Reasonable accommodations may be made to enable individuals with disabilities to perform all essential functions. Emergent BioSolutions is an Equal Opportunity/Affirmative Action Employer and values the diversity of our workforce. Emergent does not discriminate on the basis of race, color, creed, religion, sex or gender (including pregnancy, childbirth, and related medical conditions), gender identity or gender expression (including transgender status), sexual orientation, age, national origin, ancestry, citizenship status, marital status, physical or mental disability, military service or veteran status, genetic information or any other characteristics protected by applicable federal, state or local law. Information submitted will be used by Emergent BioSolutions for activities related to your prospective employment. Emergent BioSolutions respects your privacy and any use of the information submitted will be subject to the terms of our Privacy Policy . Emergent BioSolutions does not accept non-solicited resumes or candidate submittals from search/recruiting agencies not already on Emergent BioSolutions' approved agency list. Unsolicited resumes or candidate information submitted to Emergent BioSolutions by search/recruiting agencies not already on Emergent BioSolutions' approved agency list shall become the property of Emergent BioSolutions and if the candidate is subsequently hired by Emergent BioSolutions, Emergent BioSolutions shall not owe any fee to the submitting agency. .buttontextde38d a{ border: 1px solid transparent; } .buttontextde38d a:focus{ border: 1px dashed #c11d4b !important; outline: none !important; }
Those who join Emergent BioSolutions feel a sense of ownership about their future. You will excel in an environment characterized by respect, innovation and growth opportunities. Here, you will join passionate professionals who advance their scientific, technical and professional skills to develop products designed-to protect life. I. JOB SUMMARY The Lead Cyber Security Operations Analyst works both independently and collaboratively with EBSI Managed Security Service Provider, Incident Response Team, Information Security Engineers, IT systems engineers, and software engineers. The primary responsibility for this individual will be operate as the tier three security operations analyst, subject matter expert, e-discovery/Digital forensics and cyber threat intelligence fusion cell on the cybersecurity operations team. II. ESSENTIAL FUNCTIONS Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Lead cyber security operations analysts have the responsibility of being the highest technical escalation point of a cyber incident investigating and determining, based on analysis, if an Incident is to be decleared and board reportable. Manage internal/external interactions and communications with stakeholders in a professional manner, referring problems to and communicating with the appropriate department manager/director. Follow legal evidentiary chain of custody during compromise investigations by documenting and communicating findings in the system of record for case management solution and after-action reporting Perform and validate network and host level digital forensic investigations to determine root cause of the compromise, intrusion, or breach Develop and implement cyber security playbooks and process flows in line with industry best pracitces and standards Developing, implementing, and documenting signatures and behavioral detection/prevention strategies that keep pace with emerging cyber threats Identify, drive, track, and document compromise remediaton efforts Declare EBSI official Incidents and be the transition point to the Incident Response team Process cyber threat intelligence in accordance with the "intelligence cycle": direction, collection, processing, analysis, dissemination, and feedback from open source, paid subscriptions, and government sources. The above statements are intended to describe the nature of work performed by those in this job and are not an exhaustive list of all duties. Nothing in this job description restricts managements right to assign or reassign duties and responsibilities to this job at any time which reflects management's assignment of essential functions. III. MINIMUM EDUCATION, EXPERIENCE, SKILLS 3+ years of relevant commercial security operations experience or equivalent USCYBERCOM National Defense Team, MSSP, CERT, CNDSP work experience Must have at least one of the following cyber security technical certifications: SEC+/GSEC/CCSP/CYSA+ In addition to one of the following: GCIH/GCFA/GNFA/GREM Familiarity with Linux, Windows, and cyber forensic evidence concepts Knowledge of malware families and network attack vectors. Knowledge about exploits, vulnerabilities, and cyber attacks Familiarity with performing host and network level analysis to determine if compromise occured. Familiarity with the Lockheed Cyber Kill Chain and MITRE AT&CK frameworks Must have the ability to attain at least a Secret US government clearance Possess planning, interpersonal, and motivational skills, able to write clearly and succinctly in technical and non-technical formats. Ability to speak both extemporaneously and in formal business settings. Have the ability to apply logic and reason to solve complex problems. Ability to establish and maintain multi-functional and positive working relationships. Advanced computer skills and proficiency. Strong interpersonal and networking skills with a solid ability to work in a team environment. Ability to work under stressful and tight deadlines as well as the ability to lead in a fast-paced environment. Above average computer hardware and software knowledge. Ability to multi-task, discerns patterns in detail. Think through problems for logical solutions and remain calm and professional under stress. Strong decision-making ability during both crisis and non-crisis situations. Able to work with highly confidential information. There are physical/mental demands and work environment characteristics that must be met by an individual to successfully perform the essential functions of the job. This information is available upon request from the candidate. Reasonable accommodations may be made to enable individuals with disabilities to perform all essential functions. Emergent BioSolutions is an Equal Opportunity/Affirmative Action Employer and values the diversity of our workforce. Emergent does not discriminate on the basis of race, color, creed, religion, sex or gender (including pregnancy, childbirth, and related medical conditions), gender identity or gender expression (including transgender status), sexual orientation, age, national origin, ancestry, citizenship status, marital status, physical or mental disability, military service or veteran status, genetic information or any other characteristics protected by applicable federal, state or local law. Information submitted will be used by Emergent BioSolutions for activities related to your prospective employment. Emergent BioSolutions respects your privacy and any use of the information submitted will be subject to the terms of our Privacy Policy . Emergent BioSolutions does not accept non-solicited resumes or candidate submittals from search/recruiting agencies not already on Emergent BioSolutions' approved agency list. Unsolicited resumes or candidate information submitted to Emergent BioSolutions by search/recruiting agencies not already on Emergent BioSolutions' approved agency list shall become the property of Emergent BioSolutions and if the candidate is subsequently hired by Emergent BioSolutions, Emergent BioSolutions shall not owe any fee to the submitting agency. .buttontextde38d a{ border: 1px solid transparent; } .buttontextde38d a:focus{ border: 1px dashed #c11d4b !important; outline: none !important; }