Luke Gill work email
- Valid
- Valid
Luke Gill personal email
Luke Gill phone numbers
Long time security and IT professional with both deep technical knowledge and leadership experience.
-
Chief Product Owner, SecurityBloomberg Lp Oct 2020 - PresentNew York, Ny, Us -
Manager, Security Policy And InfrastructureBloomberg Lp Mar 2018 - Oct 2020New York, Ny, UsCurrently responsible for all technical security infrastructure and network security policy for both the Enterprise systems in the offices world-wide and for the production and development environments in the data centers.Those teams are:- InfoSec Project Management- Network Security and Policy- Global Security Architecture -
Manager, Network And System Security (Nss)Bloomberg Lp Nov 2013 - Mar 2018New York, Ny, UsManaging ~40 employees across 5 teams, and responsible for technical security in the Bloomberg production data centers.System Security- System Security is responsible for authentication and authorization services, including SSO, Certificate Authorities both public and private, and development of those services.Security Infrastructure- Security Infrastructure is responsible for all deployment of firewalls, load balancers, proxies, and interception technologies.Security Policy- Security Policy is responsible for enforcing the standards via policy on the devices listed above under Security Infrastructure.Mail, DNS, and Network Services- MDNS is responsible for the anti-spam technologies we have in place, along with any cast services such as NTP, DNS, etc. This team also IP Address Management end to end, e.g. DHCP and DNS servicesHFN and Tools-HFN is the internal CDN used by BLP to deliver images and documents to the users of the Bloomberg Professional Service, and support several origins and delivery services. This team also houses a handful of developers that provide automation and tools to the teams above. -
Head Of It & SecurityMike Bloomberg 2020 Nov 2019 - Apr 2020
-
Director, Vss CdnComcast Jan 2012 - Oct 2013Philadelphia, Pa, UsWe deployed a 130 servers into 23 locations around the country. These are:82 Dell R720xd Edge caches18 HP DL380 Edge caches30 Dell R720xd Mid Tier cachesHow did we get here? - We literally wrote the requirements in January 2012- Finalized the detailed requirements in March 2012- Picked the application software in March 2012 - Picked the hardware platform in April 2012 and ordered the first batch of hosts also- Ran the trial from July to mid-September 2012So from the end of April to today, we have went through deployment, to trial, and to full operational capability in less than 7 months. Personally, I feel this is quite a feat and am proud of my teams supporting this effort as well as the efforts of the numerous others who spent significant effort to get us here; many of whom I have copied on this email. I would also like to point out that we had two other internal development efforts going during this same time. One was to build a configuration management tool and source of truth for all things ipCDN. This tool is called Twelve Monkeys and it can rebuild and reconfigure a cache; and it can also be used to develop and deploy a new delivery service to the Comcast Content Router (CCR) and to the caches necessary. The second effort was to build a tool to utilize the source of truth in Twelve Monkeys to generate our graphs based on how the caches are configured and by delivery service. -
Sr Manager, Ne&ToComcast Oct 2009 - Feb 2012Philadelphia, Pa, UsCurrently responsible for operations of the Xfinity CDN's for delivery of content to set top boxes in subscriber homes and IP delivery to web browsers, tablets, and mobile devices. Xbox coming soon.Responsible for the teams that maintain and operate Origins, Storage, mid-tier and edge caches.Utilizing Cisco's CDS-TV and CDS-IS technologies to deliver content today, and continuing to investigate new technology solutions. -
Technical DirectorAol Apr 2003 - Oct 2009New York, Ny, UsManages Technical Security for AOL's production and enterprise networks. Directs and leads Technical Security consisting of system, enterprise, and network security. Responsible for designing, deploying, operating, and maintaining the entire security-related infrastructure and systems for AOL. These systems include but are not limited to Secure Remote Access, Kerberos, Public Key Infrastructure (PKI), TACACS, and network access controls (firewalls, VPNs). These solutions cover the worldwide enterprise of the office networks, the production network servicing AOL's products and websites, and the AOL Transit Data Network (ATDN). Together these provide infrastructure security for approximately 38,000 hosts, ~4000 switches, and ~600 routers. Chairs the AOL Corporate Data Security Controls Committee and represents AOL on the Time Warner IT Security Committee reporting to the TW CIO’s. -
Director Of Technical ServicesPredictive Systems 1999 - 2000UsManaged and led ~170 consultants in the Mid-Atlantic region for Predictive. Predictive was focused on the verticals of Enterprise Network Management, Network Engineering, Security, and Project Management. Our customers at this time included Qwest, First Union Bank, and others.Responsible for all operations and service delivery in the nine-state Mid-Atlantic region. Responsible for maintaining and forecasting revenue and profitability goals for the region for a publicly traded company. Grew revenue 98% from September 1999 to March 2000, while maintaining an operating income goal of 129%. Directed the strategic growth of the region into the financial vertical market, then spinning it off to become its own region. Worked to create a mission, vision, and value statement that worked within the region and the company. Determined which projects were strategically important to the region, and focused sales efforts in those areas. -
Branch Technical ManagerSprint Paranet Nov 1997 - Sep 1999Overland Park, Kansas, UsResponsible for consulting practice of the Washington DC office. Included management responsibility for all of the consultants as well as pre-sales support and statement of work writing.Technical Management duties include hiring of Technical Analysts, training, and all other management and personnel activities for the Washington D.C. Branch. Managed 63 Technical Analysts and provided service delivery to customers in the Virginia, Maryland and Metro DC area. Responsible for growing monthly branch revenues from $30,000.00 to over $900,000. Assisted in developing business plan that focused the sales efforts on the core competencies of consulting and high-level network engineering. Plan utilized the five CCIE’s in the branch and growing three more internally by the end of the 1999. -
Sr. Project Management SpecialistLockheed Martin Sep 1996 - Nov 1997Bethesda, Md, UsLead Firewall Architect for several firewall systems, including a multiple-level security solution using Gauntlet Firewall and Cisco routers to provide screening and authorization of packets traversing the firewall subsystem. This configuration was the first of its kind, required much coordination of requirements from two different government agencies. Implemented a Wide Area Network (WAN) firewall solution using Cisco Pix Firewall and Gauntlet Firewall. -
Us Air ForceDefense Intelligence Agency Oct 1992 - Oct 1996Washington, D.C., UsDuty assignment was Intelligence Operations Officer working on standing up the new Defense HUMINT Service.Lead Engineer and Chief Architect for Department of Defense (DOD) Human Intelligence (HUMINT) Operational Communications Network Program Management Office, supporting the Defense HUMINT Service. Coordinated requirements and assisted with the development of the HUMINT Operational Communications Network (HOCNET), including automated data processing and communications improvements to support the DOD HUMINT System. Personally installed all the major locations around the globe connected to the network. Oversaw implementation to ensure connectivity to all other sites, including other government agencies. Designed and implemented the firewall router topology and security architecture to ensure complete security and privacy of HOCNET from outside agencies and unauthorized personnel.
Luke Gill Skills
Luke Gill Education Details
-
University Of ArkansasComputer Science
Frequently Asked Questions about Luke Gill
What company does Luke Gill work for?
Luke Gill works for Bloomberg Lp
What is Luke Gill's role at the current company?
Luke Gill's current role is Chief Product Owner, Security at Bloomberg LP.
What is Luke Gill's email address?
Luke Gill's email address is lu****@****onix.us
What is Luke Gill's direct phone number?
Luke Gill's direct phone number is +121261*****
What schools did Luke Gill attend?
Luke Gill attended University Of Arkansas.
What skills is Luke Gill known for?
Luke Gill has skills like Security, Network Security, Disaster Recovery, Firewalls, Enterprise Architecture, Networking, Management, Information Security, Cloud Computing, Cisco Technologies, Integration, Analysis.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial