Q · 01Do I need a managed SOC if I already run EDR?+
EDR is a sensor, not a response. CrowdStrike, SentinelOne, and Defender for Endpoint generate hundreds of alerts a week on a mid-sized fleet; without analysts to triage, the bulk sit in a console nobody is reading on a Tuesday at 2 AM. A managed SOC consumes those EDR alerts alongside firewall, identity, email, and cloud telemetry, correlates them into actual incidents, suppresses the false-positive chaff, and calls a human at 2 AM when a ransomware staging pattern actually shows up. If you already own EDR, you’re most of the way to SOC Core — we just add the analysts and the 24/7 eyes.
Q · 02What’s the difference between MDR and MSSP?+
An MSSP (Managed Security Services Provider) is the older model — they typically forward you tickets from a SIEM, manage your firewall rules, and hand you 200-page reports nobody reads. MDR (Managed Detection and Response) is outcome-focused: analysts own the detection, triage, and containment loop on your behalf, and are measured on MTTD and MTTR rather than ticket volume. We operate as an MDR provider with MSSP-style transparency — you get the containment authority and detection outcomes of MDR, plus full access to every log, every query, and every custom detection we build for your environment. No black-box dashboards, no “call us for the raw data” nonsense.
Q · 03How do you handle false positives?+
False positives are the core failure mode of bad SIEM operations — analysts get fatigued, real alerts get missed, clients lose trust in the console. We run a named false-positive tuning cycle on every new client for the first 90 days: every triaged alert is tagged with a disposition, recurring FPs get a suppression rule written into the SIEM with a justification comment, and every suppression gets re-reviewed every 90 days so stale suppressions don’t hide real signal. Typical client goes from 300+ alerts/week in week one to under 40 actionable alerts/week by day 90. We publish the FP rate as a monthly line item — if it’s creeping above 15%, that’s a tuning review trigger, not a “we’ll get to it.”
Q · 04Do you replace my IT team?+
No. We complement them. Your IT team owns endpoint deployment, patching, identity provisioning, and the day-to-day operations of the systems we monitor. We own the detection, triage, and escalation loop on top of their work. When we catch something — say, a suspicious service account login from Lagos at 3 AM — we investigate, contain if authorized, and hand the remediation work to your IT team with full context: what happened, what we did, what they need to do. Your IT team stops being the midnight escalation for every Defender alert that could be anything; we are. Many of our clients tell us their IT team reclaims 8–14 hours a week of reactive alert-chasing once we’re live.
Q · 05What’s your P1 alert response time?+
P1 is defined as confirmed active compromise, ransomware staging, data exfiltration in progress, or privileged account takeover. On SOC Core the SLA is 10 minutes from alert fire to analyst engagement, with containment authorized within 30 minutes. On SOC Advanced it tightens to 5 and 15 minutes. In practice our 2025 YTD metro median for P1 engagement is 3 minutes 42 seconds — faster than the SLA because P1 alerts page the named on-call analyst directly, not the shared queue. If a P1 breaches SLA on your account, the monthly invoice automatically credits a percentage of base fee; you don’t file a ticket, the system credits itself.
Q · 06Can you integrate with my existing SIEM?+
Yes. We deploy into whatever you already have, or we rebuild on our preferred stack — your call. We have named-analyst-certified depth in LogRhythm, Splunk (Cloud & Enterprise), Microsoft Sentinel, and Wazuh (our open-source option for cost-sensitive clients and smaller fleets). We also operate Elastic Security, Chronicle, Exabeam, Sumo Logic, and QRadar environments on a co-management basis. If you’re already licensed on Splunk and happy with it, we don’t ask you to rip-and-replace — we just stand up our analyst team on top of your existing instance and write the detections you’re missing.
Q · 07Do you support bring-your-own cloud SIEM?+
Yes. BYO cloud SIEM is actually our most common pattern for M365-centric clients — you already pay for Microsoft Sentinel on your E5 license, so we simply build out the connectors, ingest rules, workbooks, and detection content in your Azure tenant and operate it under co-management. Your data stays in your tenant, your license stays in your Microsoft agreement, and we bring the analyst hours and the detection engineering. Same pattern works for Splunk Cloud, Elastic Cloud, Chronicle, and Sumo Logic. No data egress to a vendor cloud, no second SIEM bill, full admin transparency in your own console.
Q · 08What does “tied to physical dispatch” mean for a cyber SOC?+
Most cyber incidents have a physical component — a badge that shouldn’t have worked, a rogue access-point plugged in overnight, a server-room door propped open, a disgruntled ex-employee tailgating into a field office. When our SOC analysts see a badge anomaly or an unauthorized device on the network, we can dispatch a licensed officer from the Memphis center to walk the site, verify what’s happening, pull the device, and secure the scene — often within the same hour. Pure-cyber SOCs can’t do that; they file a ticket and hope your facilities team handles it by morning. Our 24/7 physical dispatch is already live for the alarm-response side of the business, so tying the cyber SOC into it was a natural step. Metro coverage is included on Core; statewide on Advanced.
Q · 09How long do you retain logs, and what about compliance archive?+
Standard retention is 12 months hot (queryable, indexed, available for real-time hunting and incident investigation) plus 7 years cold archive (compressed, SHA-256 integrity-hashed per shard, retrievable within 72 hours for audit or legal hold). The hot tier lets us hunt historically across an entire year of logs without a restore request; the cold tier meets the long-tail retention clauses in HIPAA (6 year minimum), PCI-DSS (1 year hot + 3 year archive), CMMC Level 2, FINRA, SOX, GLBA, and most state-level breach-notification statutes. For CMMC-regulated clients we additionally write logs to a FedRAMP-Moderate archive in a separate tenant, with chain-of-custody documentation maintained for every retrieval.
Q · 10What platforms and vendors do you support for EDR?+
We are vendor-agnostic on EDR by policy — no kickbacks, no “preferred partner” quotas, no lock-in. Our named-analyst depth is strongest on CrowdStrike Falcon, SentinelOne Singularity, and Microsoft Defender for Endpoint (including the Defender for Business SKU for sub-300-endpoint clients). We also fully support Sophos Intercept X, Carbon Black, Cortex XDR, and Huntress (which we recommend for managed-IT partners who want us to layer detection on top). If you already own a license, we deploy into it. If you’re greenfield, we recommend based on your fleet size, OS mix, and budget — and we’ll quote you the license through us at cost or point you at a direct-to-vendor buy, your call. License pass-through is never marked up.
Q · 11What about threat hunting — is it included or extra?+
SOC Core includes monthly themed hunts mapped to MITRE ATT&CK (e.g., one month we hunt lateral-movement patterns, next month persistence mechanisms, then defense-evasion, then credential-access — rotating through the matrix over a quarter). SOC Advanced includes weekly hypothesis-driven hunts customized to your environment and industry threat model — e.g., for a healthcare client we might hunt for ePHI staging behavior, for a defense contractor we hunt for nation-state TTPs seen in DIB-targeting campaigns. Every hunt produces a written finding, even when the finding is “no evidence observed” — that negative result is itself valuable for audit trails and board reporting.
Q · 12What happens when an alert becomes a confirmed incident?+
The analyst who triaged the alert stays with it — we do not hand off mid-incident. On SOC Core, the analyst contains (isolate host, disable account, block IOC at firewall/EDR) under pre-authorized containment authority captured in your onboarding runbook, then pages our incident-response lead for anything beyond simple containment. On SOC Advanced, the named analyst quarterbacks the whole incident through closure, with our DFIR team joining automatically for forensic preservation. Either way, you get a live Slack or Teams channel opened for the incident, a phone call to your designated incident contact within 15 minutes of confirmation, and a written timeline with evidence chain delivered within 24 hours of close, plus a regulatory notification-clock assessment if the incident triggers HIPAA, PCI, or state-level breach reporting thresholds.
Q · 13How long does onboarding take?+
Standard onboarding is 14 days from signed contract to full 24/7 coverage. Day 1–3 is discovery and runbook build: asset inventory, crown-jewel identification, pre-authorized containment scope, designated incident contacts, escalation matrix. Day 4–9 is connector deployment and data-flow validation: every telemetry plane wired into the SIEM, detection content deployed, parsing validated, alert routing tested. Day 10–14 is a parallel-run period where we watch the console live, baseline your FP volume, and start the 90-day tuning sprint. Go-live is day 14. For BYO-Sentinel M365 clients we routinely cut that to 9 days because half the connectors are already running.