Loading headlines…

About Me

I’m Niher Halder — an engineer–strategist with over 15 years of experience in safety-critical infrastructure, spanning power projects, industrial plants, metro rail, bridges, and large-scale civil works. My foundation comes from environments where failure has real consequences, and where reliability and disciplined execution are essential.

Niher Halder
Current direction: Critical infrastructure risk & resilience for power and industrial systems, transitioning into OT/ICS cybersecurity with a focus on explainable, process-aware security aligned with real operations.
Security focus: Building depth in network security and defensive monitoring, emphasizing system behavior, operational baselines, and meaningful anomaly detection — not alert noise.

My Core Direction

My work is centered on applying engineering-grounded thinking to cybersecurity for industrial systems, with a focused interest in how automation and AI can support anomaly detection and threat modeling without compromising safety or uptime. My learning is oriented toward power and energy, where security must work alongside operational continuity. I’m especially drawn to approaches that stay process-aware and explainable under real constraints.

ICS/OT AI for defense Power & Energy

What This Website Represents

This website is a structured space where I share my transition — what I’m studying, what I’m building, and the way I think about security in industrial contexts. It will grow through field perspective, focused writing, and carefully documented projects, reflecting steady progress rather than a finished destination.

Learning Writing Projects

Why OT/ICS Cybersecurity?

Industrial systems operate under constraints very different from traditional IT environments. In OT/ICS, security decisions must respect operations — excessive alerts, disruptive controls, or poorly understood changes can introduce real operational risk. My background in safety-critical execution naturally aligns with this way of thinking.

Safety & Uptime

In industrial environments, availability is a core requirement. Security mechanisms must be predictable, controlled, and compatible with existing operational practices.

Reliability Uptime Operational safety

Process Integrity

In gas and power systems, cyber events can translate into physical consequences. Understanding processes, assets, and operational states is essential to meaningful risk management.

Critical assets Physical impact Resilience

Explainable AI Defense

AI supports security teams only when outputs are understandable and actionable. I’m particularly interested in approaches that explain anomalies in operational terms rather than abstract model scores.

Explainability Anomaly detection Usable alerts

Current Focus

My current work focuses on building strong fundamentals first, then applying them through realistic exercises, writing, and small projects.

OT/ICS Foundations

Understanding industrial architectures, segmentation concepts, visibility challenges, and how OT environments differ from enterprise IT in both design and operation.

Purdue model Segmentation Visibility

Network Security & Monitoring

Developing strong network fundamentals for defensive monitoring, including traffic behavior, baselining, and interpreting deviations in context.

TCP/IP Monitoring Detection

AI for Time-Series Anomaly Detection

Exploring techniques for working with noisy, time-dependent data and learning how to evaluate anomalies in ways that remain meaningful to operators.

Time-series Validation Alert quality

Looking Ahead

My work is guided by a long-term view of how cybersecurity can responsibly support power and gas infrastructure as these systems become more connected and automated. Through gradual learning and practical engagement — both in field environments and technical work — I aim to deepen my understanding of how AI, machine learning, networking, security, and automation intersect in industrial systems.

I’m particularly interested in approaches that strengthen visibility and resilience without compromising safety or operational stability. As my experience grows, my focus will remain on contributing in ways that respect the realities of critical infrastructure: reliability first, clarity over complexity, and security that supports operations rather than disrupts them.