Thank you for the response.
Most enterprise environments, if following CIS standards, or other security guides will have the "noexec" option applied to "/var" which again, if following most security guides, will be its own filesystem. So it is not a matter of ossec user and file permissions, but rather nothing can be executed from the "/var" filesystem so even the post-install scripts from the RPM fail. For those that are adhering to strict security compliance guidelines, as we must for contractual reasons, it is not possible to run anything from the "/var" filesystem.
I have followed the instructions for building custom RPMs, and have gotten them to install successfully (using "/opt/wazuh" as install path), but I have not completed testing to know if it will be problematic (outside of the fact that updates will require manual intervention and will need to be built from scratch with each version that gets installed).
So my earlier comment was about the irony that a product that scans for compliance against security standards, has to go against one of the rules of said guidelines to install and function.
Thank you for understanding the concern, and working towards and alternative solution.