Jonathan recently discovered a zero-day vulnerability in a public-facing system. He took the responsible approach by notifying the system owner via email, detailing the issue and suggesting protective measures. Additionally, he reached out to Apple, alerting them to the vulnerability affecting their systems. What type of hacker does Jonathan fall under?