It depends on how the security monitoring system is working and where (in the tiering model) it is placed.
As an example: a SIEM that is using agents (fetching the events) running with either a dedicated account or local system on T0 computers MUST as well be located and operated as Tier0.
Another SIEM that will get the events using eventlog forwarding (by eventlog subscriptions) from T0 computers does not necessarily be a T0 asset.
The difference in the above is that we always assume: No software is bug free! In case of operating agents on T0 computers there might be a change for someone getting control over the SIEM and is able to manipulate the agents to do malicious things. While in the second example, the OS is shipping eventlogs to another system and the SIEM in that case has no possibility to manipulate the event sender.
I hope that explains the strategy.