Johannes Dahse
About Johannes Dahse
Johannes Dahse serves as the Head of R&D at SonarSource since 2020, bringing extensive experience in IT security and software development. He previously held leadership roles at RIPS Technologies and has contributed to various security consulting positions while earning advanced degrees in IT Security from Ruhr University Bochum.
Work at SonarSource
Johannes Dahse has served as the Head of R&D at SonarSource since 2020. In this role, he leads research and development initiatives, focusing on enhancing the company's software quality and security solutions. His expertise in static analysis and application security contributes to the development of advanced tools that help organizations improve their code quality and security posture.
Previous Experience at RIPS Technologies
Before joining SonarSource, Johannes Dahse was the CEO and Co-Founder of RIPS Technologies from 2016 to 2020. In this position, he was responsible for overseeing the company's strategic direction and product development, particularly in the field of security solutions for web applications. His leadership helped establish RIPS Technologies as a notable player in the security industry.
Education and Expertise
Johannes Dahse studied at Ruhr University Bochum, where he earned a Diplom in IT Security from 2006 to 2012. He continued his education at the same institution, achieving a Dr. Ing. in Static Analysis from 2013 to 2016. His academic background provides a strong foundation for his work in software security and static application security testing.
Professional Background in Security Consulting
Johannes Dahse has extensive experience in security consulting, having worked at various organizations. He served as a Security Research Consultant at Qualys for 11 months in 2012 and held positions at SektionEins GmbH and Cure53 from 2011 to 2016. His roles involved assessing security vulnerabilities and providing expert advice on security best practices.
Contributions to Security Discussions
Johannes Dahse has actively participated in discussions related to software security. He has been involved in conversations about enhancing Static Application Security Testing (SAST) capabilities. Additionally, he participated in a podcast focusing on the significance of Clean Code in software development and explained a Remote Code Execution vulnerability (CVE-2022-30129) in Visual Studio Code.