I’m glad you got my point about scanners. It’s not something bad, but it’s not something helpful. And if you care about a career in security or something like that, I don’t see how “running Burp scanner since 2018” in your CV is going to help (maybe it does!)
You can get a better idea about what I’m talking about after reading many reports and write-ups. Notice how many times they mention or quote something about a programming language.
The best you can do, is to start with what you know. Make time to read everything about vulnerabilities (reports, write-ups, papers, etc), and at the same time try to find bugs. When I started, one thing that helped me (and I think I still do it), is that I tried to find the same bug I read in a write-up or test that endpoint mentioned in a report or things like that. I found my first bug after reading a write-up from Jack Whitton and testing the same Facebook feature he mentioned in it. What I found was not as critical as his, but it was enough to get a 1000 bounty.
I hope you find some guidance there. Maybe it works for you, maybe it doesn’t.