Goldman Sachs backs security startup founded by former GCHQ researcher
.jpg)
Immersive Labs, a cyber security training platform founded by a former GCHQ researcher, has raised $8m (£6.2m) in Series A funding led by Goldman Sachs.
The Bristol-based startup was launched by James Hadley (pictured) in 2017 after he ran a cyber summer school for teenagers on behalf of the UK’s signals intelligence agency.
Hadley had noticed that the most successful classes focused on ethical hacking challenges and subsequently built Immersive Labs around that model of teaching.
The platform combines threat data with gamified learning and can, the company claims, teach cyber security and IT staff new skills within hours of a threat appearing.
It has already been adopted by a number of businesses, including BAE Systems, Sophos and Goldman Sachs. The government’s Cyber Security Immediate Impact Fund also uses the platform to teach the next generation of cyber security workers.
“Having rolled out the Immersive Lab platform globally ourselves, we are aware of the benefits it brings to large organisations,” said Goldman’s chief information security officer Andy Ozment. “The Immersive platform has helped us hone the skills of the people at the front line of our cyber defenses and identify new talent throughout the organisation.”
Since the company was founded two years ago, it has grown to 65 people and has established offices in Bristol, London and New York. Robert Hannigan, the former director of GCHQ, has also joined the company as the chair of its advisory board.
“It is great to see a company with the reputation of Goldman Sachs getting firmly behind one of the fastest-growing UK cyber security success stories,” said Hannigan. “Not only does it speak volumes of everything the team at Immersive Labs has achieved to date, but also of the massive growth potential the company has.”
Hadley added: “Large organisations are facing a dual cyber security talent problem; not only is the number of professionals seriously lagging but so is the pace at which their skills are developed. If you are able to recruit the right people in the first place, today’s attackers move so fast your team may quickly fall behind.
“Our goal is to reduce this gap. With increased capital, we can help more companies continue to upskill their cyber talent in a way which keeps pace with the threat landscape.”
source newstatesman
Industry: Cyber Security News

Latest Jobs
-
- Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project, £75,000+
- United Kingdom
- 75000
-
Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project DCL Search exclusive Identifier Project. To join a financial services business. Key hire to be part of / influence the cyber security capability and direction within the business. Hands on experience managing / monitoring / upgrading / implementing / using the following; · Firewalls: SonicWall and or Palo Alto · NAC: Cisco OR Macmon · WAF | CASB | MDM Experience with SIEM monitoring / vulnerability analysis also highly desirable. MUST have current hands on experience with vulnerability management tooling and best practice. Current Financial services is a nice to have. Learn new skills working within a collaborative team. Grow as a security professional.
-
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
- N/A
- 500
-
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
-
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
- 90,000+
-
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.
-
- Contact 12 month- Security Operations- Tanium Engineer / Analyst.
- United Kingdom
- Dependent on experience
-
Security Operations engineer / Analyst with Tanium for a 12 month contract. Experience configuring using, managing, supporting troubleshooting Tanium's suite of end point solutions is essential. The opportunity is due to a client expanding its international capability to a follow the sun model. To be involved in spinning up a European capability. Based in the UK. English essential and ideally being fluent in French.