SOC Cost for a 1,000-Employee Company in 2026
At 1,000 employees the right model is co-managed SOC, an internal team of three to four owning business hours plus an MSSP carrying nights and weekends. The realistic budget is $500,000 to $1,200,000 per year.
Co-Managed Range
$500K - $1.2M
per year
Internal Team
3 - 4 FTEs
12-hour business-day coverage
SIEM Load
50 - 150 GB
per day, selective ingest
The co-managed SOC architecture
Co-managed SOC at 1,000 employees works like this. The customer owns the SIEM (typically Splunk, Microsoft Sentinel, or Elastic), the detection rule content, the playbook library, and the case management system. The MSSP provides round-the-clock analyst coverage operating against that customer-owned platform. The internal team works business hours (a typical 12-hour window covering both US coasts or the European working day) and the MSSP carries the remaining 12 hours plus weekends and holidays.
The advantage over pure MSSP is that the customer keeps detection content portable. If the MSSP relationship ends, the SIEM, the detection rules, the historical data, and the institutional knowledge stay with the customer. A different MSSP can be onboarded in 60 to 90 days. In a pure MSSP model where the MSSP owns the SIEM, switching providers is typically a 9 to 12 month exercise with a content rebuild from scratch.
The advantage over full in-house is the staffing math. Full in-house 24/7 SOC at 1,000 employees needs 8 to 12 FTEs, which costs $1.5M to $2.5M per year fully loaded. Co-managed with 3 to 4 internal FTEs plus an MSSP at $150,000 to $400,000 per year costs $600K to $1M, a 40% to 60% saving. The trade-off is that the after-hours response quality depends on the MSSP, which means selecting an MSSP that genuinely understands the customer environment, not just one that takes the alert and creates a ticket.
Annual cost build
| Cost Line | Low | High | Notes |
|---|---|---|---|
| SOC Manager / Director (1 FTE) | $220,000 | $320,000 | Loaded, US average to high-cost metro |
| Senior Security Engineer (1-2 FTE) | $180,000 | $420,000 | Detection engineering focus |
| Security Analyst (1-2 FTE) | $130,000 | $280,000 | Tier 2 triage and investigation |
| Co-managed MSSP contract | $150,000 | $400,000 | After-hours coverage on customer SIEM |
| SIEM (50-150 GB/day) | $80,000 | $340,000 | Sentinel commitment tier to Splunk retail |
| EDR (1,000 endpoints) | $40,000 | $90,000 | CrowdStrike / SentinelOne enterprise tier |
| Identity threat detection | $30,000 | $80,000 | Defender for Identity / Okta / Falcon Identity |
| SOAR / automation | $50,000 | $200,000 | Tines / Splunk SOAR / Torq / Palo Alto XSOAR |
| Threat intelligence | $30,000 | $120,000 | Recorded Future / Mandiant / open-source mix |
| Vulnerability management | $40,000 | $90,000 | Qualys / Tenable / Rapid7 |
| Independent IR retainer | $50,000 | $120,000 | Mandiant / Unit 42 / Stroz Friedberg |
| Training and certification | $20,000 | $60,000 | SANS, vendor courses, conferences |
| Annual total | $1,020,000 | $2,520,000 | Median lands $1.0M-$1.4M |
The high end of the headline range ($1.2M) reflects a leaner staffing pattern (three internal FTEs not four), a smaller MSSP commitment, and selective SIEM ingest. Organisations with strong compliance drivers or complex environments often land above the $1.2M ceiling, with the largest line items being SIEM ingest and the senior engineer headcount. The under-$500K floor is achievable for cloud-native organisations on Sentinel with first-party Microsoft ingestion, three internal FTEs, and a focused MSSP relationship.
SIEM selection and ingest math
At 1,000 employees, the SIEM decision dominates the second-largest budget line. Three patterns dominate. Microsoft-heavy organisations land on Sentinel because Microsoft 365 logs ingest free into the same tenant and the commitment tier pricing at $1.50 to $5.00 per GB per day undercuts everything else for that workload. Splunk-heavy organisations with on-premises and legacy infrastructure get correlation depth that Sentinel still struggles with on Windows and Linux events. Elastic-heavy organisations with a development-team culture run a self-hosted Elastic Security stack at infrastructure-only cost.
The 50 to 150 GB per day range covers most 1,000-employee companies, with selective ingest. The mistake is shipping every log source at default verbosity into the SIEM, which often pushes a 1,000-employee company past 300 GB per day and the SIEM bill toward $500K. The correct approach is to tier sources: hot (30 days, queryable) for high-signal sources like authentication, DNS, EDR alerts, and cloud control plane; warm (90 days, cheaper storage) for proxy, firewall, and DHCP; cold (12 to 24 months, object storage) for everything else. Tools like Cribl, Tenzir, or the native Sentinel basic logs tier reduce ingest into the expensive SIEM tier by 40% to 70%.
For full vendor pricing details see the SIEM cost comparison page on this site. For per-vendor deep dives see the Splunk cost, Microsoft Sentinel cost, and IBM QRadar cost pages.
Vendor shortlist for co-managed at 1,000 employees
For Splunk-on-prem environments, the strongest co-managed MSSPs are Trustwave, Optiv, and Deepwatch. Each has a Splunk delivery practice with hundreds of engineers, can integrate with customer-owned ES, and offers tiered after-hours coverage at $150K to $350K per year. Deepwatch in particular has built a Splunk-native co-managed offering with workflow templates that reduce onboarding time to roughly 60 days.
For Sentinel-native environments, Difenda, BlueVoyant, and Critical Start are the named leaders. Difenda is Microsoft Verified MXDR and has Sentinel content libraries that ship at onboarding. BlueVoyant scales well from mid-market to enterprise. Critical Start has the strongest co-managed contractual model with zero-trust escalation (only escalate when confirmed).
For Elastic environments, the market is smaller but Elastic's own consulting team plus regional partners (Mandiant, Cyderes, Rapid7 MDR) deliver co-managed against Elastic Security. Pricing tends to be at the higher end ($300K to $450K per year) because the engineering depth is less commoditised.
Common mistakes at 1,000 employees
The first common mistake is hiring a SOC manager and then leaving the role under-resourced. A SOC manager without engineers underneath becomes a glorified ticket-routing function. The minimum viable team is the manager plus at least one detection engineer plus one analyst, so the manager has people to manage. Hiring the manager alone and waiting on engineers usually results in the manager leaving within 18 months.
The second common mistake is buying SOAR before the team has stable detections. SOAR automates existing playbooks; if the playbooks do not exist, SOAR has nothing to automate and the implementation cost (typically $50K to $150K in professional services) burns budget that should have gone to detection content. The right order is: stable detections, mature playbooks, then SOAR to scale them.
The third common mistake is treating the MSSP as a black box. The MSSP should be reporting weekly metrics (alerts received, alerts triaged, mean time to triage, false positive rate, escalations to customer) and quarterly trends. If the MSSP cannot produce these numbers, the customer cannot tell whether the contract is delivering. A 1,000-employee company should expect the MSSP to bring 8 to 15 actionable escalations per month, of which 2 to 4 turn out to be genuine incidents requiring customer action.
Related pages
Frequently Asked Questions
Why is co-managed the right model at 1,000 employees?
What is the difference between co-managed SOC and pure MSSP?
How much SIEM data does a 1,000-employee company generate?
What roles staff a 1,000-employee co-managed SOC?
Is a 1,000-employee company too small for SOAR?
Should the 1,000-employee company build or buy threat intelligence?
Updated May 2026. Cost figures sourced from Ponemon SOC Performance Report 2024, Gartner Magic Quadrant for SIEM, BLS OEWS 15-1212, and vendor pricing pages.