About The Position

V2X is seeking an Information Assurance (IA) Compliance Specialist (SIAC2) for our Guam location. The position is required to be onsite and requires an active Secret clearance. V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.

Requirements

  • BS in Information Technology (or equivalent technical degree) or 6+ years technical experience in related discipline required.
  • 6+ years of experience with DoD enterprise or Navy networks.
  • 6+ years of experience in troubleshooting networks and operating system, data systems support with 2 years of focus on cybersecurity auditing, RMF package preparations and/or control validations.
  • IAT2 certifications required for IA (Security + CE or equivalent) required.
  • One or more of the following certifications are required: CompTIA-Cybersecurity Analyst (CySA+), ISC2-Systems Security Certified Practitioner (SSCP), GIAC-Security Essentials (GSEC), ISC2-Certified in Governance, Risk and Compliance (CGRC), ISACA-Certified Information Systems Auditor (CISA) or equivalent.
  • BS in Information Technology (or equivalent technical degree) or 6+ years technical experience with Navy or Marine Corps C4I systems required.
  • Certification as IAT2 (per DoD Inst 8750.1 and Navy requirements) with appropriate IA certification required and computing environment certification highly desired.
  • Operating systems can include Windows, Linux, Cisco and Solaris.
  • Must be able to provide OJT to technical personnel.
  • Must be able to communicate well both orally and in writing.

Nice To Haves

  • VMWare and NetApp highly desired.

Responsibilities

  • Create, complete, and maintain security documents such as Assess and Authorization packages in eMASS.
  • Develop Plans of Action and Milestones (POA&Ms) and support systems in achieving an Authorization to Operate (ATO).
  • Perform vulnerability and discovery scans (ACAS, STIG) and investigate rogue devices.
  • Process SAAR-N forms, manage user access and tokens, and track cybersecurity workforce training.
  • Inspect and certify physical security requirements for Restricted and Controlled Access Areas.
  • Conduct Risk Management Framework (RMF) assessments and maintain continuous monitoring.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service