Independent cost reference. Not affiliated with any security vendor or MSSP.

24/7 SOC Cost in 2026: Why Round-the-Clock Coverage Costs 5x

The single most important number in SOC economics is 4.87. Eight thousand seven hundred sixty hours of coverage divided by 1,800 productive hours per FTE forces five analysts per chair, which is why 24/7 SOC capacity costs five to six times what a single business-hours analyst does.

Per-Chair Cost

$580K - $760K

single 24/7 tier-1 seat

FTE Multiplier

5 - 6x

per 24/7 coverage seat

24/7 MSSP

$100K - $400K

per year, full outsourced coverage

The 8,760 / 1,800 math

A year contains 8,760 hours. A SOC seat that needs continuous coverage must have a human in it for all of them. One full-time employee in the US delivers roughly 1,800 productive hours per year after subtracting 10 to 15 holidays, 15 to 20 vacation days, 5 to 10 sick days, and 5 to 10 training days. The exact number varies by country and employer: 1,800 is a US-private-sector midpoint; UK and EU figures are closer to 1,650 because of higher statutory vacation entitlement. 8,760 divided by 1,800 equals 4.87, which rounds up to five FTEs per single 24/7 chair. A SOC that wants resilience (the ability to absorb one resignation or extended leave without a coverage gap) plans six FTEs per chair.

This math compounds for every position the SOC wants on duty around the clock. A single tier-1 analyst on shift needs five FTEs; two analysts on shift needs ten; a dedicated tier-2 investigator on shift adds another five. A minimum viable 24/7 SOC with one tier-1 and one tier-2 on shift at all times needs ten FTEs of analysts plus the daytime-only positions (manager, detection engineer, threat hunter). That is the entire reason 24/7 SOCs cost what they do: it is not the tooling, it is the labour.

The math is invariant to automation. SOAR, AI-assisted triage, and noise reduction tools change what each FTE can accomplish per hour, but they do not change the number of hours in a year or the number of productive hours per FTE. Automation lets a 5-FTE chair handle 3x the alert volume, but the chair still needs five humans because the constraint is calendar-time presence, not throughput. This is why headline claims that AI will "replace the SOC analyst" are not yet visible in the staffing data: AI is reducing toil per alert, not eliminating the requirement for analyst-hours of coverage.

Per-position cost build

PositionBase salaryLoaded (per FTE)5 FTEs (1 seat)6 FTEs (resilient seat)
Tier 1 analyst$80K - $100K$105K - $135K$525K - $675K$630K - $810K
Tier 1 with night differential$95K - $115K$120K - $155K$600K - $775K$720K - $930K
Tier 2 investigator$110K - $145K$145K - $195K$725K - $975K$870K - $1,170K
Tier 3 / IR (always-on retainer)$140K - $185K$185K - $250K$925K - $1,250K$1,110K - $1,500K

Most enterprise 24/7 SOCs run two tier-1 chairs (to handle parallel alerts and provide peer-review on shift), one tier-2 chair, and tier-3 on call from home with an on-call premium rather than always physically present. That configuration costs roughly $1.85M to $2.5M per year for the round-the-clock chair staffing alone, plus business-hours-only positions (manager, engineering, threat hunter) at another $700K to $1.2M. Total in-house staffing for a mature 24/7 SOC therefore runs $2.5M to $3.7M, which matches the staffing-share component (60% to 70%) of the headline $3M to $5M enterprise SOC budgets observed in the field.

24/7 outsourcing as an alternative

For organisations below the 5,000-employee crossover, paying an MSSP for 24/7 coverage is significantly cheaper than building it in-house. Arctic Wolf, Critical Start, Expel, ReliaQuest, and a dozen comparable vendors offer 24/7 SOC-as-a-Service at $100K to $400K per year for the small-to-mid-market segment. That contract delivers what an in-house team of five to ten people would cost between $700K and $1.5M to provide, with the difference being amortisation of the MSSP analyst pool across multiple customers.

The trade-off is environment knowledge. An MSSP analyst handles dozens of customers and cannot know any one as well as an internal team would. The MSSPs that compete on quality (Expel, Critical Start, ReliaQuest) invest heavily in onboarding and named-analyst models to compensate; the MSSPs that compete on price (Trustwave's lower tiers, Secureworks at the entry level) accept the environment-knowledge gap and operate on standardised playbooks. The customer's choice depends on whether response quality matters more than cost predictability.

The hybrid pattern (internal team for business hours, MSSP for after hours) often delivers the best blend for mid-market organisations. The internal team carries the environment knowledge and handles the high-severity escalations; the MSSP handles after-hours triage with playbooks the internal team has authored. Total cost lands at 40% to 60% of full in-house and the response quality lands closer to in-house than pure MSSP. See the hybrid SOC architecture page for the operational model.

Does the organisation actually need 24/7?

The honest answer is that not every organisation does, but the threat data argues strongly in favour for any organisation with material data assets or revenue dependence on systems. Sophos's 2024 State of Ransomware report shows 60% of confirmed ransomware incidents began outside normal business hours, with attackers explicitly preferring weekends and US public holidays. Mandiant's M-Trends 2024 reports the mean attacker dwell time is now 10 days globally and 13 days in North America. Detecting an attack at 3am Saturday rather than 9am Monday saves 54 hours of dwell, and dwell time is the single largest determinant of breach cost (IBM Cost of a Data Breach 2024 shows breaches contained under 200 days cost $1.4M less than those over 200 days).

The organisations that can legitimately skip 24/7 are those where (a) the attack-surface is limited to business-hours systems (e.g. retail stores that close at night, B2B services that batch overnight), (b) the data sensitivity is genuinely low (no PII, PHI, payment data, or regulated information), and (c) cyber insurance does not require it. For everyone else, the question is not whether to do 24/7 but how (in-house, MSSP, hybrid). See the 8x5 SOC cost page for organisations where business-hours-only is a defensible choice.

Automation impact on 24/7 cost

The dominant cost-reduction lever in 2025-2026 is not headcount reduction; it is per-FTE throughput improvement. A tier-1 analyst in 2020 handled roughly 20 to 40 alerts per shift after triage. A tier-1 analyst in 2026 with SOAR enrichment, AI-assisted triage (Microsoft Security Copilot, Google SecOps Gemini, Crowdstrike Charlotte), and a maturity-driven low false-positive rate handles 80 to 200 alerts per shift. That 3-5x throughput improvement does not reduce the FTE count for the chair, but it does mean that a single chair can cover a larger organisation, deferring the need for a second 24/7 chair from roughly 1,000-employee scale to roughly 3,000-employee scale.

The cost of this automation is non-trivial: SOAR platforms run $50K to $250K per year, AI triage assistants add $30 to $80 per analyst per month, and detection engineering effort to build and maintain the automation typically takes 0.5 to 1 dedicated FTE. Net impact is positive at organisations with high alert volume (above 100 alerts per day) and break-even-to-negative at organisations with lower volume. Smaller organisations should not invest heavily in SOAR until alert volume justifies it.

Related pages

Frequently Asked Questions

Why does 24/7 SOC coverage need 5 to 6 FTEs per seat?
One FTE delivers around 1,800 productive hours per year after holidays, vacation, training, and sick leave. Round-the-clock coverage needs 8,760 hours. 8,760 divided by 1,800 equals 4.87, rounded up to five FTEs for a single seat with no resilience, six for a seat that survives one resignation. This math is invariant: it applies to a tier-1 analyst, a tier-2 investigator, and any other 24/7 position.
What is the total cost of a single 24/7 tier-1 position?
A tier-1 analyst at $90K base plus 28% benefits is $115K fully loaded. Five analysts at this level is $575K; six is $690K. Most enterprises plan five with the sixth slot filled by a senior analyst at higher rate, landing the seat at roughly $580K to $760K per year. That is for one chair providing 24/7 alert triage, without the manager, the tier-2, or the tier-3.
Can automation reduce the FTE multiplier?
Not the headcount math, but the per-analyst alert throughput. SOAR automation, AI-assisted triage, and case management tools reduce per-alert handling time by 30% to 60%, which lets the same five-FTE chair handle a larger alert volume. A 24/7 chair still needs five FTEs because human availability over time is the constraint, not alerts per hour.
When does shift differential apply, and how much?
Most US enterprises pay a 10% to 20% shift differential for night work (typically defined as 10pm to 6am or similar) and a 5% to 10% premium for weekends. A tier-1 night-shift analyst at $90K base plus 15% differential is $103K base, $132K fully loaded. The differential typically adds 8% to 12% to total 24/7 staffing cost versus a model where night shift is paid the same as day shift.
Is 24/7 outsourcing cheaper than 24/7 in-house?
Below 5,000 employees, yes. A 24/7 MSSP for a 1,000-employee company costs $150K to $400K per year versus $1.5M to $2.5M for in-house 24/7. The crossover where in-house starts winning per-employee is around 5,000 employees, where the fixed staffing cost amortises across enough users to compete with linear-scaling MSSP fees.
Do we need 24/7 if attacks happen at all hours?
The data is unambiguous. Approximately 60% of ransomware incidents in 2023-2024 began outside normal business hours, with attackers deliberately choosing weekends and holidays. The mean dwell time from initial access to deployment is 7 days; the mean dwell time once detected to containment is 24 hours. Detecting the attack at 3am Saturday versus 9am Monday saves 54 hours of dwell.

Updated May 2026. Cost figures sourced from BLS OEWS 15-1212, SANS 2024 SOC Survey, Sophos State of Ransomware 2024, Mandiant M-Trends 2024, and IBM Cost of a Data Breach 2024.

Updated 2026-05-11