In this role, you will validate and reproduce findings from External Attack Surface Management (EASM) and Vulnerability Disclosure Program (VDP) submissions, focusing on internet exposed assets, misconfigurations, leaked services, weak cryptography, and open ports. You will utilize manual techniques and penetration testing frameworks to confirm exploitability and assess business impact. Your responsibilities will include right-sizing severity and priority using various exploitability signals, documenting rationale and evidence for developers and risk owners, and ensuring findings are deduplicated, enriched, and routed to the correct owners. You will partner with secure business enablement and product teams to negotiate remediation paths and SLAs, propose compensating controls when necessary, and manage governance workflows for risk acceptances. Additionally, you will close the loop with researchers through clear communications and proof-of-fix retesting, continuously improve signal quality, and contribute as an adversary when needed to validate edge case chains.