Summary
Security Operations Centre (SOC) services and SIEM platform procurement represent some of the largest and highest-value cybersecurity contracts in European public procurement. The EU Cyber Solidarity Act has directly funded national SOC establishment, while NIS2 compliance is driving demand for managed detection and response among thousands of public bodies that cannot sustain in-house 24/7 security monitoring. SIEM contracts for Splunk, Microsoft Sentinel, IBM QRadar, and competing platforms โ plus the managed services to operate them โ are among the fastest-growing segments on TED. This guide explains the market, what is being bought, and how to position for it.
SOC-as-a-Service Procurement Growth
The fundamental driver of SOC procurement is a staffing crisis: EU public sector organisations face severe shortages of qualified security operations analysts. The EU Cybersecurity Skills Framework estimates a shortage of over 300,000 cybersecurity professionals across the EU, with the public sector disproportionately affected due to salary constraints relative to private sector competitors.
This shortage makes SOC-as-a-Service the pragmatic option for the majority of public bodies with NIS2 detection and monitoring obligations. Rather than building and staffing an internal SOC โ requiring multiple analysts per shift for genuine 24/7 coverage, plus SIEM infrastructure, threat intelligence feeds, and incident response capability โ organisations procure this as a managed service.
Key procurement categories within SOC services:
- Fully managed SOC: Complete outsourcing of security monitoring. The provider supplies platform, analysts, processes, and reporting. Contract values โฌ200Kโโฌ5M+ per year for significant public bodies.
- SOC co-management: Provider operates SIEM and tier-1/2 analysis; client retains tier-3 and incident response. Hybrid model increasingly favoured by authorities wanting to build internal capability over time.
- MDR (Managed Detection and Response): Endpoint-focused variant combining EDR tooling with analyst oversight. Often procured separately from network SOC services.
- CSIRT/CERT services: Computer Security Incident Response Team support โ particularly relevant for national-level procurement under the Cyber Solidarity Act.
SIEM Platform Contracts
Many public bodies procure the SIEM platform itself separately from managed services, through software licensing contracts. The dominant platforms appearing in EU public procurement:
- Microsoft Sentinel: Gaining rapidly due to deep integration with the Microsoft 365 environments already prevalent in government. Azure-native, consumption-based pricing. Often included in broader Microsoft enterprise agreements.
- Splunk Enterprise/Cloud: Long the incumbent in large government environments. High capability, high cost. Cisco acquisition has raised data sovereignty concerns in some EU member states.
- IBM QRadar: Strong in defence-adjacent and intelligence-community-adjacent procurement. On-premise deployment option maintains appeal for air-gapped environments.
- Elastic SIEM / OpenSearch: Open-source options appearing in cost-sensitive procurement, particularly in smaller member states and local government.
- EU-origin platforms: Data sovereignty concerns are driving some member states to prefer European-headquartered SIEM vendors, creating an opening for vendors like LogPoint (Denmark) and others.
24/7 Monitoring Requirements
NIS2 Article 21 requires significant entities to be capable of detecting and responding to incidents continuously. Contracts for SOC services therefore typically specify:
- 24/7/365 monitoring with defined response SLAs (e.g., acknowledge critical alerts within 15 minutes)
- Minimum analyst staffing levels per shift
- Escalation procedures and named incident response contacts
- Integration with national CSIRT/CERT for incident reporting under NIS2 Article 23 (24-hour early warning, 72-hour full notification)
- Threat intelligence feeds and regular threat landscape reporting
- Monthly KPI reporting covering alert volumes, detection rates, mean-time-to-detect, and mean-time-to-respond
Key CPV Codes
- 72700000 โ Computer network services (primary code for managed network security and SOC)
- 72212730 โ Security software development services
- 48730000 โ Security software package (SIEM platform licensing)
- 72222300 โ Information technology services
- 72250000 โ System and support services (managed service operations)
- 72315000 โ Data network management and support services
Qualification Requirements
SOC and SIEM contracts carry the highest qualification bars in cybersecurity procurement, reflecting the sensitive nature of the access involved:
- ISO 27001 certification โ mandatory for virtually all SOC service contracts
- ISO 27035 (Incident Management) โ increasingly specified alongside 27001
- SOC 2 Type II report โ for cloud-delivered SOC services, particularly in contracts with data residency requirements
- National CSIRT accreditation โ in several member states, operating a CSIRT/CERT requires formal accreditation by the national authority
- Data residency documentation โ proof that all monitoring data remains within EU jurisdiction; US Cloud Act exposure is a disqualifying factor in some tenders
- Demonstrable 24/7 operational capability โ staffing schedules, analyst CVs, escalation matrices
Key Differentiators When Bidding
SOC tenders are highly competitive and often evaluated on quality scores of 70% or more. Winning differentiators include: demonstrated knowledge of the specific threat landscape facing the contracting authority's sector; existing integrations with the platforms already deployed in the client environment; a proven track record of detecting and responding to incidents (case studies, metrics, references); a clear knowledge transfer plan if the client wants to build internal capability; and EU data residency commitments backed by legal guarantees. Providers that can demonstrate alignment with national CSIRT frameworks and offer seamless NIS2 incident reporting support will score significantly higher than those offering generic SOC services.