Independent cost reference. Not affiliated with any security vendor or MSSP.

SOC Cost for a 1,000-Employee Company in 2026

At 1,000 employees the right model is co-managed SOC, an internal team of three to four owning business hours plus an MSSP carrying nights and weekends. The realistic budget is $500,000 to $1,200,000 per year.

Co-Managed Range

$500K - $1.2M

per year

Internal Team

3 - 4 FTEs

12-hour business-day coverage

SIEM Load

50 - 150 GB

per day, selective ingest

The co-managed SOC architecture

Co-managed SOC at 1,000 employees works like this. The customer owns the SIEM (typically Splunk, Microsoft Sentinel, or Elastic), the detection rule content, the playbook library, and the case management system. The MSSP provides round-the-clock analyst coverage operating against that customer-owned platform. The internal team works business hours (a typical 12-hour window covering both US coasts or the European working day) and the MSSP carries the remaining 12 hours plus weekends and holidays.

The advantage over pure MSSP is that the customer keeps detection content portable. If the MSSP relationship ends, the SIEM, the detection rules, the historical data, and the institutional knowledge stay with the customer. A different MSSP can be onboarded in 60 to 90 days. In a pure MSSP model where the MSSP owns the SIEM, switching providers is typically a 9 to 12 month exercise with a content rebuild from scratch.

The advantage over full in-house is the staffing math. Full in-house 24/7 SOC at 1,000 employees needs 8 to 12 FTEs, which costs $1.5M to $2.5M per year fully loaded. Co-managed with 3 to 4 internal FTEs plus an MSSP at $150,000 to $400,000 per year costs $600K to $1M, a 40% to 60% saving. The trade-off is that the after-hours response quality depends on the MSSP, which means selecting an MSSP that genuinely understands the customer environment, not just one that takes the alert and creates a ticket.

Annual cost build

Cost LineLowHighNotes
SOC Manager / Director (1 FTE)$220,000$320,000Loaded, US average to high-cost metro
Senior Security Engineer (1-2 FTE)$180,000$420,000Detection engineering focus
Security Analyst (1-2 FTE)$130,000$280,000Tier 2 triage and investigation
Co-managed MSSP contract$150,000$400,000After-hours coverage on customer SIEM
SIEM (50-150 GB/day)$80,000$340,000Sentinel commitment tier to Splunk retail
EDR (1,000 endpoints)$40,000$90,000CrowdStrike / SentinelOne enterprise tier
Identity threat detection$30,000$80,000Defender for Identity / Okta / Falcon Identity
SOAR / automation$50,000$200,000Tines / Splunk SOAR / Torq / Palo Alto XSOAR
Threat intelligence$30,000$120,000Recorded Future / Mandiant / open-source mix
Vulnerability management$40,000$90,000Qualys / Tenable / Rapid7
Independent IR retainer$50,000$120,000Mandiant / Unit 42 / Stroz Friedberg
Training and certification$20,000$60,000SANS, vendor courses, conferences
Annual total$1,020,000$2,520,000Median lands $1.0M-$1.4M

The high end of the headline range ($1.2M) reflects a leaner staffing pattern (three internal FTEs not four), a smaller MSSP commitment, and selective SIEM ingest. Organisations with strong compliance drivers or complex environments often land above the $1.2M ceiling, with the largest line items being SIEM ingest and the senior engineer headcount. The under-$500K floor is achievable for cloud-native organisations on Sentinel with first-party Microsoft ingestion, three internal FTEs, and a focused MSSP relationship.

SIEM selection and ingest math

At 1,000 employees, the SIEM decision dominates the second-largest budget line. Three patterns dominate. Microsoft-heavy organisations land on Sentinel because Microsoft 365 logs ingest free into the same tenant and the commitment tier pricing at $1.50 to $5.00 per GB per day undercuts everything else for that workload. Splunk-heavy organisations with on-premises and legacy infrastructure get correlation depth that Sentinel still struggles with on Windows and Linux events. Elastic-heavy organisations with a development-team culture run a self-hosted Elastic Security stack at infrastructure-only cost.

The 50 to 150 GB per day range covers most 1,000-employee companies, with selective ingest. The mistake is shipping every log source at default verbosity into the SIEM, which often pushes a 1,000-employee company past 300 GB per day and the SIEM bill toward $500K. The correct approach is to tier sources: hot (30 days, queryable) for high-signal sources like authentication, DNS, EDR alerts, and cloud control plane; warm (90 days, cheaper storage) for proxy, firewall, and DHCP; cold (12 to 24 months, object storage) for everything else. Tools like Cribl, Tenzir, or the native Sentinel basic logs tier reduce ingest into the expensive SIEM tier by 40% to 70%.

For full vendor pricing details see the SIEM cost comparison page on this site. For per-vendor deep dives see the Splunk cost, Microsoft Sentinel cost, and IBM QRadar cost pages.

Vendor shortlist for co-managed at 1,000 employees

For Splunk-on-prem environments, the strongest co-managed MSSPs are Trustwave, Optiv, and Deepwatch. Each has a Splunk delivery practice with hundreds of engineers, can integrate with customer-owned ES, and offers tiered after-hours coverage at $150K to $350K per year. Deepwatch in particular has built a Splunk-native co-managed offering with workflow templates that reduce onboarding time to roughly 60 days.

For Sentinel-native environments, Difenda, BlueVoyant, and Critical Start are the named leaders. Difenda is Microsoft Verified MXDR and has Sentinel content libraries that ship at onboarding. BlueVoyant scales well from mid-market to enterprise. Critical Start has the strongest co-managed contractual model with zero-trust escalation (only escalate when confirmed).

For Elastic environments, the market is smaller but Elastic's own consulting team plus regional partners (Mandiant, Cyderes, Rapid7 MDR) deliver co-managed against Elastic Security. Pricing tends to be at the higher end ($300K to $450K per year) because the engineering depth is less commoditised.

Common mistakes at 1,000 employees

The first common mistake is hiring a SOC manager and then leaving the role under-resourced. A SOC manager without engineers underneath becomes a glorified ticket-routing function. The minimum viable team is the manager plus at least one detection engineer plus one analyst, so the manager has people to manage. Hiring the manager alone and waiting on engineers usually results in the manager leaving within 18 months.

The second common mistake is buying SOAR before the team has stable detections. SOAR automates existing playbooks; if the playbooks do not exist, SOAR has nothing to automate and the implementation cost (typically $50K to $150K in professional services) burns budget that should have gone to detection content. The right order is: stable detections, mature playbooks, then SOAR to scale them.

The third common mistake is treating the MSSP as a black box. The MSSP should be reporting weekly metrics (alerts received, alerts triaged, mean time to triage, false positive rate, escalations to customer) and quarterly trends. If the MSSP cannot produce these numbers, the customer cannot tell whether the contract is delivering. A 1,000-employee company should expect the MSSP to bring 8 to 15 actionable escalations per month, of which 2 to 4 turn out to be genuine incidents requiring customer action.

Related pages

Frequently Asked Questions

Why is co-managed the right model at 1,000 employees?
At 1,000 employees, the customer can justify three or four internal security operations staff but still cannot economically staff a 24/7 in-house SOC. Co-managed splits the day: the internal team owns 12 hours (typically 7am to 7pm in the headquarters time zone) and the MSSP carries the remaining 12. The internal team builds environment-specific detections; the MSSP runs them after hours.
What is the difference between co-managed SOC and pure MSSP?
In pure MSSP, the MSSP owns the SIEM, the detections, and the response procedures. In co-managed, the customer owns the SIEM and detection rules, and the MSSP operates them. Co-managed gives the customer more control over what gets detected and faster ability to add custom detections, at the cost of more internal effort.
How much SIEM data does a 1,000-employee company generate?
Plan for 50 to 150 GB per day depending on cloud footprint and log selectivity. A finance-heavy or compliance-heavy organisation lands at the higher end. At Sentinel pricing of around $5 per GB per day commitment tier, that is $90,000 to $275,000 per year of SIEM ingest. Selective ingest and tiered retention can reduce this by 30% to 50%.
What roles staff a 1,000-employee co-managed SOC?
One Director of Security Operations or SOC Manager, one to two senior security engineers, and one to two security analysts. Total four to five internal FTEs covering business hours, plus the MSSP carrying after-hours. The Director owns budget and vendor relationships; the engineers own detection content; the analysts triage.
Is a 1,000-employee company too small for SOAR?
Probably not. SOAR (Security Orchestration, Automation, and Response) starts paying back at the volume of alerts a 1,000-employee company generates, typically 50 to 300 alerts per day. A SOAR platform like Tines or Splunk SOAR at $50K to $200K per year reduces analyst toil by 30% to 50% and is a meaningful budget line at this scale.
Should the 1,000-employee company build or buy threat intelligence?
Buy for tactical, build for strategic. A commercial threat intel feed (Recorded Future, Mandiant Advantage) at $30,000 to $100,000 per year delivers indicator feeds and finished intelligence. The internal team adds environment context. At 1,000 employees there is rarely justification for a dedicated threat intel analyst, but pieces of the role can sit with a senior engineer.

Updated May 2026. Cost figures sourced from Ponemon SOC Performance Report 2024, Gartner Magic Quadrant for SIEM, BLS OEWS 15-1212, and vendor pricing pages.

Updated 2026-05-11